This is an unpleasant hack to accept potentially malformed mail from
clients who have authenticated to the SMTP server. I don't think it's
actually needed any more, because the specific client in question has
since been re-educated about how to construct mail properly.
+ if (getenv("RELAYCLIENT")) goto exec;
m.max_len = intenv("QMAIL_CHECKSPAM_MAXLEN", 2 * 1024 * 1024);
m.timeout = intenv("QMAIL_CHECKSPAM_TIMEOUT", 300);
rc = message_read(0, 0, &m);
m.max_len = intenv("QMAIL_CHECKSPAM_MAXLEN", 2 * 1024 * 1024);
m.timeout = intenv("QMAIL_CHECKSPAM_TIMEOUT", 300);
rc = message_read(0, 0, &m);
close(fd_e[0]);
close(fd_m[1]);
close(fd_e[1]);
close(fd_e[0]);
close(fd_m[1]);
close(fd_e[1]);
qmq = strenv("QMAIL_CHECKSPAM_QUEUE", "/var/qmail/bin/qmail-queue");
execlp(qmq, qmq, (char *)0);
fprintf(stderr, "failed to exec: %s\n", strerror(errno));
qmq = strenv("QMAIL_CHECKSPAM_QUEUE", "/var/qmail/bin/qmail-queue");
execlp(qmq, qmq, (char *)0);
fprintf(stderr, "failed to exec: %s\n", strerror(errno));