#include #include "stralloc.h" #include "buffer.h" #include "getln.h" #include "exit.h" #include "open.h" #include "scan.h" #include "fmt.h" #include "case.h" #include "now.h" #include "str.h" #include "datetime.h" #include "logmsg.h" #define WHO "qmail-mrtg" #define TAI64NLEN 24 /** @file qmail-mrtg.c @return 0: ok 1: Error: No TAI64N timestamp available 2: Warning: Not enough time left between calls */ /* qmail-send */ int local = 0; int remote = 0; int success = 0; int failure = 0; int bytes = 0; int tlstrans = 0; int deferral = 0; int bounces = 0; int triples = 0; int qmtp = 0; int qmtps = 0; /* qmail-smtpd */ int asessions = 0; int rsessions = 0; int aorig = 0; int arcpt = 0; int rsend = 0; int rhelo = 0; int rorigbad = 0; int rorigdns = 0; int rrcptbad = 0; int rrcptfail = 0; int rsize = 0; int rmime = 0; int rloader = 0; int rvirus = 0; int rspam = 0; int aauth = 0; int rauth = 0; int atls = 0; int rtls = 0; int spfpass = 0; int spfail = 0; /* qmail-pop3d */ int apop = 0; int rpop = 0; int pok = 0; int pdeny = 0; /* *server + rblsmtpd */ int sok = 0; int sdeny = 0; int greet = 0; int grey = 0; int rbl = 0; char bufsmall[BUFFER_SMALL]; buffer bo = BUFFER_INIT(write,1,bufsmall,sizeof(bufsmall)); static void outs(char *s) { if (buffer_puts(&bo,s) == -1) _exit(1); if (buffer_puts(&bo,"\n") == -1) _exit(1); if (buffer_flush(&bo) == -1) _exit(1); } static void out(int i) { char num[FMT_ULONG]; if (buffer_put(&bo,num,fmt_ulong(num,(unsigned long) i)) == -1) _exit(1); if (buffer_puts(&bo,"\n") == -1) _exit(1); if (buffer_flush(&bo) == -1) _exit(1); } char bufspace[1024]; buffer bi = BUFFER_INIT(read,0,bufspace,sizeof(bufspace)); void mrtg_results(char flag) { switch (flag) { case '1': out(success); out(tlstrans); break; case '2': bytes = bytes/1024; out(bytes); out(bytes); break; case '3': out(local); out(remote); break; case '4': out(failure); out(deferral); break; case '5': out(bounces); out(triples); break; case '6': qmtps += qmtp; out(qmtp); out(qmtps); break; /* QMTP */ case 'a': out(asessions); out(rsessions); break; /* total */ case 'b': out(aorig); out(arcpt); break; /* accepted */ case 'c': out(rsend); out(rhelo); break; /* rejected MTA */ case 'd': out(rorigbad); out(rorigdns); break; /* Orig */ case 'e': out(rrcptbad); out(rrcptfail); break; /* Recipient */ case 'f': out(rmime); out(rloader); break; /* Warlord */ case 'g': out(rvirus); out(rspam); break; /* Infected/Spam */ case 'h': out(aauth); out(rauth); break; /* Auth */ case 'i': out(atls); out(rtls); break; /* TLS */ case 'j': out(spfpass); out(spfail); break; /* SPF */ case 'k': out(grey); break; /* Greylisted */ case 'z': sdeny +=rbl; out(sok); out(sdeny); break; /* reject session */ case 'A': out(apop); out(rpop); break; case 'B': out(pok); out(pdeny); break; default: break; } } void mrtg_sendlog(char *in, char flag) { int i, j, k = 0; switch (flag) { case '1': if (case_starts(in,"delivery")) { i = str_chr(in,':') + 2; if (case_starts(in + i,"success:")) success++; i = str_chr(in,'T'); if (case_starts(in + i,"TLS_")) tlstrans++; }; break; case '2': if (case_starts(in,"info msg")) { i = str_chr(in,':') + 8; if ((j = str_chr(in + i,' '))) in[i + j] = '\0'; bytes += atoi(in + i); }; break; case '3': if (case_starts(in,"status:")) { i = str_rchr(in,'c') + 4; k = str_rchr(in,'r') + 7; if ((j = str_chr(in + i,'/'))) in[i + j] = '\0'; if (atoi(in + i) > local) local = atoi(in + i); if ((j = str_chr(in + k,'/'))) in[k + j] = '\0'; if (atoi(in + k) > remote) remote = atoi(in + k); }; break; case '4': if (case_starts(in,"delivery")) { i = str_chr(in,':') + 2; if (case_starts(in + i,"failure:")) failure++; if (case_starts(in + i,"deferral:")) deferral++; }; break; case '5': if (case_starts(in,"bounce msg")) bounces++; if (case_starts(in,"triple bounce:")) triples++; break; case '6': if (case_starts(in,"delivery")) { i = str_chr(in,'q'); if (case_starts(in + i,"qmtp:_ok")) qmtp++; if (case_starts(in + i,"qmtps:_ok")) qmtps++; }; break; default: break; } } void mrtg_smtplog(char *in, char flag) { int i, j, k = 0; i = str_chr(in,'A'); j = str_chr(in,'R'); k = str_chr(in,'P'); switch (flag) { case 'a': if (case_starts(in + i,"Accept")) asessions++; if (case_starts(in + j,"Reject")) rsessions++; break; case 'b': if (case_starts(in + i,"Accept::ORIG:")) aorig++; if (case_starts(in + i,"Accept::RCPT:")) arcpt++; break; case 'c': if (case_starts(in + j,"Reject::SNDR::Invalid_Relay")) rsend++; if (case_starts(in + j,"Reject::SNDR::Bad_Helo")) rhelo++; if (case_starts(in + j,"Reject::SNDR::DNS_Helo")) rhelo++; break; case 'd': if (case_starts(in + j,"Reject::ORIG::Bad_Mailfrom")) rorigbad++; if (case_starts(in + j,"Reject::ORIG::DNS_MF")) rorigdns++; break; case 'e': if (case_starts(in + j,"Reject::RCPT::Bad_Rcptto")) rrcptbad++; if (case_starts(in + j,"Reject::RCPT::Failed_Rcptto")) rrcptfail++; break; case 'f': if (case_starts(in + j,"Reject::DATA::Invalid_Size")) rsize++; if (case_starts(in + j,"Reject::DATA::Bad_MIME")) rmime++; if (case_starts(in + j,"Reject::DATA::MIME_Attach")) rmime++; if (case_starts(in + j,"Reject::DATA::Bad_Loader")) rloader++; break; case 'g': if (case_starts(in + j,"Reject::DATA::Spam_Message")) rspam++; if (case_starts(in + j,"Reject::DATA::Virus_Infected")) rvirus++; break; case 'h': if (case_starts(in + i,"Accept::AUTH:")) aauth++; if (case_starts(in + j,"Reject::AUTH:")) rauth++; break; case 'i': if (case_starts(in + k,"P:ESMTPS")) atls++; if (case_starts(in + j,"Reject::TLS:")) rtls++; break; case 'j': if (case_starts(in + i,"Accept::SPF:")) spfpass++; if (case_starts(in + j,"Reject::SPF:")) spfail++; break; case 'k': if (case_starts(in + i,"Deferred::SNDR::Grey_Listed")) grey++; break; case 'z': if (case_starts(in,"tcpserver") || case_starts(in,"sslserver") || case_starts(in,"rblsmtpd")) { i = str_chr(in,':') + 2; if (case_starts(in + i,"ok")) sok++; if (case_starts(in + i,"deny")) sdeny++; j = str_chr(in+i,':') + 2; if (case_starts(in + i + j,"451")) rbl++; if (case_starts(in + i + j,"553")) rbl++; if (case_starts(in + i + j,"greetdelay:")) greet++; } break; default: break; } } void mrtg_pop3log(char *in, char flag) { int i, j = 0; switch (flag) { case 'A': i = str_chr(in,'A'); j = str_chr(in,'R'); if (case_starts(in + i,"Accept::AUTH:")) apop++; if (case_starts(in + j,"Reject::AUTH:")) rpop++; break; case 'B': if (case_starts(in,"tcpserver:") || case_starts(in,"sslserver:")) { i = str_chr(in,':') + 2; if (case_starts(in + i,"ok")) pok++; if (case_starts(in + i,"deny")) pdeny++; }; break; default: break; } } int main(int argc, char **argv) { int i; int c; int match; int enoughtime = 0; unsigned long u; unsigned long calltime; unsigned long seconds; unsigned long nanoseconds; unsigned int history = 305; char flag; stralloc line = {0}; calltime = now(); if (argc < 2) logmsg(WHO,100,USAGE,"qmail-mrtg [ -1 | -2 | -3 | -4 | -5 | -6 |\ -a | -b | -c | -d | -e | -f | -g | -h | -i | -j | -k | -z | -A | -B ] [time (min)] \n\ qmail-mrtg needs to be called every [time] minutes (i.e. by crontab) - default 305 secs"); flag = *(argv[1] + 1); if (argc == 3) { scan_ulong(argv[2],&u); history = 60 * u + 5; } /* Read input lines sequentially */ buffer_init(&bi,read,0,bufspace,sizeof(bufspace)); for (;;) { if (getln(&bi,&line,&match,'\n') != 0) _exit(1); if (!match) break; if (!stralloc_0(&line)) _exit(1); seconds = 0; nanoseconds = 0; if (line.s[0] == '@') { /* tai64 timestamp */ for (i = 1; i <= TAI64NLEN; i++) { c = (int)line.s[i]; u = c - '0'; if (u >= 10) { u = c - 'a'; if (u >= 6) break; u += 10; } seconds <<= 4; seconds += nanoseconds >> 28; nanoseconds &= 0xfffffff; nanoseconds <<= 4; nanoseconds += u; } seconds -= 4611686018427387914ULL; seconds = seconds > 0 ? seconds : 0; } else { outs("Error: No TAI64N timestamp available."); _exit(1); } if (enoughtime) { /* default history = 305 sec => evaluate logs every ~5 mins */ if (seconds <= calltime && seconds >= (calltime - history)) { if (flag >= '1' && flag <= '9') mrtg_sendlog(line.s + TAI64NLEN + 2,flag); else if (flag >= 'a' && flag <= 'z') mrtg_smtplog(line.s + TAI64NLEN + 2,flag); else if (flag >= 'A' && flag <= 'Z') mrtg_pop3log(line.s + TAI64NLEN + 2,flag); } } else { if (seconds) { enoughtime++; } else { outs("Warning: Not enough time left between calls"); _exit(1); } } } mrtg_results(flag); _exit(0); }