]> jfr.im git - irc/quakenet/newserv.git/blob - trojanscan/trojanscan.c
More small error fixes.
[irc/quakenet/newserv.git] / trojanscan / trojanscan.c
1 /*
2 * Trojanscan version 2
3 *
4 * Trojanscan copyright (C) Chris Porter 2002-2005
5 * Newserv bits copyright (C) David Mansell 2002-2003
6 *
7 * TODO: CHECK::
8 * - Poke splidge about +r'ing bots, potential problems:
9 * - users might whine about T clone stealing account
10 * - would have to steal one already in use, so if trojans start using /msg q whois they'll see
11 * (though they have to be authed for this, they could use a clone of their own however)
12 */
13
14 #include "trojanscan.h"
15 #include "../lib/strlfunc.h"
16
17 void _init() {
18 trojanscan_cmds = newcommandtree();
19
20 addcommandtotree(trojanscan_cmds, "showcommands", TROJANSCAN_ACL_UNAUTHED, 0, &trojanscan_showcommands);
21 addcommandtotree(trojanscan_cmds, "help", TROJANSCAN_ACL_UNAUTHED, 1, &trojanscan_help);
22 addcommandtotree(trojanscan_cmds, "hello", TROJANSCAN_ACL_UNAUTHED | TROJANSCAN_ACL_OPER, 1, &trojanscan_hello);
23
24 addcommandtotree(trojanscan_cmds, "join", TROJANSCAN_ACL_STAFF, 1, &trojanscan_userjoin);
25 addcommandtotree(trojanscan_cmds, "chanlist", TROJANSCAN_ACL_STAFF, 0, &trojanscan_chanlist);
26 addcommandtotree(trojanscan_cmds, "whois", TROJANSCAN_ACL_STAFF, 1, &trojanscan_whois);
27
28 addcommandtotree(trojanscan_cmds, "changelev", TROJANSCAN_ACL_STAFF | TROJANSCAN_ACL_OPER, 2, &trojanscan_changelev);
29 addcommandtotree(trojanscan_cmds, "deluser", TROJANSCAN_ACL_TEAMLEADER | TROJANSCAN_ACL_OPER, 2, &trojanscan_deluser);
30 addcommandtotree(trojanscan_cmds, "mew", TROJANSCAN_ACL_STAFF | TROJANSCAN_ACL_OPER, 2, &trojanscan_mew);
31 addcommandtotree(trojanscan_cmds, "status", TROJANSCAN_ACL_STAFF | TROJANSCAN_ACL_OPER, 0, &trojanscan_status);
32 addcommandtotree(trojanscan_cmds, "listusers", TROJANSCAN_ACL_TEAMLEADER, 0, &trojanscan_listusers);
33
34 addcommandtotree(trojanscan_cmds, "rehash", TROJANSCAN_ACL_WEBSITE, 0, &trojanscan_rehash);
35
36 addcommandtotree(trojanscan_cmds, "cat", TROJANSCAN_ACL_CAT | TROJANSCAN_ACL_OPER, 1, &trojanscan_cat);
37
38 addcommandtotree(trojanscan_cmds, "reschedule", TROJANSCAN_ACL_DEVELOPER | TROJANSCAN_ACL_OPER, 0, &trojanscan_reschedule);
39
40 srand((int)time(NULL));
41
42 trojanscan_connect_schedule = scheduleoneshot(time(NULL) + 1, &trojanscan_connect, NULL);
43 }
44
45 void _fini(void) {
46 int i;
47 struct trojanscan_realchannels *rp = trojanscan_realchanlist, *oldrp;
48 struct trojanscan_rejoinlist *rj = trojanscan_schedulerejoins, *oldrj;
49
50 if (trojanscan_nick)
51 deregisterlocaluser(trojanscan_nick, NULL);
52
53 if (trojanscan_connect_schedule)
54 deleteschedule(trojanscan_connect_schedule, &trojanscan_connect, NULL);
55
56 if(trojanscan_schedule)
57 deleteschedule(trojanscan_schedule, &trojanscan_dojoin, NULL);
58
59 if(trojanscan_poolschedule)
60 deleteschedule(trojanscan_poolschedule, &trojanscan_repool, NULL);
61
62 if(trojanscan_cloneschedule)
63 deleteschedule(trojanscan_poolschedule, &trojanscan_registerclones, NULL);
64
65 while(rp) {
66 deleteschedule(rp->schedule, &trojanscan_dopart, (void *)rp);
67 oldrp = rp;
68 rp = rp->next;
69 free(oldrp);
70 }
71
72 while(rj) {
73 deleteschedule(rj->schedule, &trojanscan_rejoin_channel, (void *)rj);
74 freesstring(rj->channel);
75 oldrj = rj;
76 rj = rj->next;
77 free(oldrj);
78 }
79
80 if(trojanscan_initialschedule)
81 deleteschedule(trojanscan_initialschedule, &trojanscan_fill_channels, NULL);
82
83 deleteschedule(trojanscan_rehashschedule, &trojanscan_rehash_schedule, NULL);
84
85 for (i=0;i<TROJANSCAN_CLONE_TOTAL;i++)
86 if(trojanscan_swarm[i].clone) {
87 deregisterlocaluser(trojanscan_swarm[i].clone, NULL);
88 trojanscan_swarm[i].clone = NULL;
89 }
90 trojanscan_free_database();
91 trojanscan_free_channels();
92
93 for (i=0;i<trojanscan_hostpoolsize;i++)
94 freesstring(trojanscan_hostpool[i]);
95
96 for (i=0;i<trojanscan_tailpoolsize;i++)
97 freesstring(trojanscan_tailpool[i]);
98 trojanscan_database_close();
99 }
100
101 void trojanscan_connect(void *arg) {
102 sstring *mnick, *myident, *myhost, *myrealname, *myauthname;
103 sstring *dbhost, *dbuser, *dbpass, *db, *dbport, *temp;
104 channel *cp;
105 int length, i;
106 char buf[10];
107
108 trojanscan_connect_schedule = NULL;
109
110 for(i=0;i<TROJANSCAN_CLONE_TOTAL;i++)
111 trojanscan_swarm[i].index = i; /* sure this could be done with pointer arithmetic... */
112
113 trojanscan_hostpoolsize = 0;
114 trojanscan_tailpoolsize = 0;
115 trojanscan_hostmode = 0;
116 trojanscan_poolschedule = NULL;
117 trojanscan_cloneschedule = NULL;
118 trojanscan_realchanlist = NULL;
119 trojanscan_database.glines = 0;
120 trojanscan_database.detections = 0;
121
122 mnick = getcopyconfigitem("trojanscan", "nick", "T", NICKLEN);
123 myident = getcopyconfigitem("trojanscan", "ident", "trojanscan", NICKLEN);
124 myhost = getcopyconfigitem("trojanscan", "hostname", "trojanscan.slug.netsplit.net", HOSTLEN);
125 myrealname = getcopyconfigitem("trojanscan", "realname", "Trojanscan v" TROJANSCAN_VERSION, REALLEN);
126 myauthname = getcopyconfigitem("trojanscan", "authname", "T", ACCOUNTLEN);
127
128 dbhost = getcopyconfigitem("trojanscan", "dbhost", "localhost", HOSTLEN);
129 dbuser = getcopyconfigitem("trojanscan", "dbuser", "", NICKLEN);
130 dbpass = getcopyconfigitem("trojanscan", "dbpass", "", REALLEN);
131 db = getcopyconfigitem("trojanscan", "db", "", NICKLEN);
132
133 dbport = getcopyconfigitem("trojanscan", "dbport", "3306", ACCOUNTLEN);
134
135 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_MAXCHANS);
136 temp = getcopyconfigitem("trojanscan", "maxchans", buf, length);
137
138 trojanscan_maxchans = atoi(temp->content);
139 freesstring(temp);
140
141 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_CYCLETIME);
142 temp = getcopyconfigitem("trojanscan", "cycletime", buf, length);
143
144 trojanscan_cycletime = atoi(temp->content);
145 freesstring(temp);
146
147 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_PARTTIME);
148 temp = getcopyconfigitem("trojanscan", "parttime", buf, length);
149 trojanscan_part_time = atoi(temp->content);
150 freesstring(temp);
151
152 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_MAXUSERS);
153 temp = getcopyconfigitem("trojanscan", "maxusers", buf, length);
154 trojanscan_maxusers = atoi(temp->content);
155 freesstring(temp);
156
157 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_MINIMUM_HOSTS_BEFORE_POOL);
158 temp = getcopyconfigitem("trojanscan", "minpoolhosts", buf, length);
159 trojanscan_min_hosts = atoi(temp->content);
160 freesstring(temp);
161
162 if ((trojanscan_cycletime / trojanscan_maxchans) < 1) {
163 Error("trojanscan", ERR_FATAL, "Cycletime / maxchans < 1, increase cycletime or decrease maxchans else cycling breaks.");
164 return; /* PPA: module failed to load */
165 }
166
167 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_MINIMUM_CHANNEL_SIZE);
168 temp = getcopyconfigitem("trojanscan", "minchansize", buf, length);
169 trojanscan_minchansize = atoi(temp->content);
170 freesstring(temp);
171
172 trojanscan_nick = registerlocaluser(mnick->content, myident->content, myhost->content, myrealname->content, myauthname->content, UMODE_SERVICE | UMODE_DEAF |
173 UMODE_OPER | UMODE_INV |
174 UMODE_ACCOUNT,
175 &trojanscan_handlemessages);
176
177 if (trojanscan_database_connect(dbhost->content, dbuser->content, dbpass->content, db->content, atoi(dbport->content)) < 0) {
178 Error("trojanscan", ERR_FATAL, "Cannot connect to database host!");
179 return; /* PPA: module failed to load */
180 }
181
182 trojanscan_database_query("CREATE TABLE phrases (id INT(10) PRIMARY KEY AUTO_INCREMENT, wormid INT(10) NOT NULL, phrase TEXT NOT NULL, priority INT(10) DEFAULT 0 NOT NULL, dateadded int(10))");
183 trojanscan_database_query("CREATE TABLE worms (id INT(10) PRIMARY KEY AUTO_INCREMENT, wormname TEXT NOT NULL, glinetype INT DEFAULT 0, data text, hitmsgs BOOL DEFAULT 1, hitchans BOOL DEFAULT 0, epidemic BOOL DEFAULT 0, privinfo text)");
184 trojanscan_database_query("CREATE TABLE logs (id INT(10) PRIMARY KEY AUTO_INCREMENT, userid INT(10) NOT NULL, act TEXT NOT NULL, description TEXT NOT NULL, ts TIMESTAMP)");
185 trojanscan_database_query("CREATE TABLE channels (id INT(10) PRIMARY KEY AUTO_INCREMENT, channel VARCHAR(%d) NOT NULL, exempt BOOL DEFAULT 0)", CHANNELLEN);
186 trojanscan_database_query("CREATE TABLE users (id INT(10) PRIMARY KEY AUTO_INCREMENT, authname VARCHAR(%d) NOT NULL, authlevel TINYINT(4) NOT NULL)", ACCOUNTLEN);
187 trojanscan_database_query("CREATE TABLE hits (id INT(10) PRIMARY KEY AUTO_INCREMENT, nickname VARCHAR(%d) NOT NULL, ident VARCHAR(%d) NOT NULL, host VARCHAR(%d) NOT NULL, phrase INT(10) NOT NULL, ts TIMESTAMP, messagetype VARCHAR(1) NOT NULL DEFAULT 'm', glined BOOL DEFAULT 1)", NICKLEN, USERLEN, HOSTLEN);
188 trojanscan_database_query("CREATE TABLE settings (id INT(10) PRIMARY KEY AUTO_INCREMENT, setting VARCHAR(15) NOT NULL, value VARCHAR(15) NOT NULL)");
189 trojanscan_database_query("CREATE TABLE wwwlogs (id INT(10) PRIMARY KEY AUTO_INCREMENT, authid INT(10) NOT NULL, ip VARCHAR(15), action TEXT, ts TIMESTAMP)");
190 trojanscan_database_query("CREATE TABLE unknownlog (id INT(10) PRIMARY KEY AUTO_INCREMENT, data TEXT, user VARCHAR(%d) NOT NULL, ts TIMESTAMP)", NICKLEN+USERLEN+HOSTLEN+3);
191
192 trojanscan_database_query("DELETE FROM settings");
193 trojanscan_database_query("INSERT INTO settings (setting, value) VALUES ('rehash','0')");
194 trojanscan_database_query("INSERT INTO settings (setting, value) VALUES ('changed','0')");
195
196 trojanscan_read_database(1);
197
198 cp = findchannel(TROJANSCAN_OPERCHANNEL);
199 if (!cp) {
200 localcreatechannel(trojanscan_nick, TROJANSCAN_OPERCHANNEL);
201 } else {
202 if(!localjoinchannel(trojanscan_nick, cp))
203 localgetops(trojanscan_nick, cp);
204 }
205
206 cp = findchannel(TROJANSCAN_CHANNEL);
207 if (!cp) {
208 localcreatechannel(trojanscan_nick, TROJANSCAN_CHANNEL);
209 } else {
210 if(!localjoinchannel(trojanscan_nick, cp))
211 localgetops(trojanscan_nick, cp);
212 }
213
214 cp = findchannel(TROJANSCAN_PEONCHANNEL);
215 if (!cp) {
216 localcreatechannel(trojanscan_nick, TROJANSCAN_PEONCHANNEL);
217 } else {
218 if(!localjoinchannel(trojanscan_nick, cp))
219 localgetops(trojanscan_nick, cp);
220 }
221
222 freesstring(mnick);
223 freesstring(myident);
224 freesstring(myhost);
225 freesstring(myrealname);
226 freesstring(myauthname);
227 freesstring(dbhost);
228 freesstring(dbuser);
229 freesstring(dbpass);
230 freesstring(db);
231 freesstring(dbport);
232 trojanscan_registerclones(NULL);
233
234 trojanscan_initialschedule = scheduleoneshot(time(NULL) + 300, &trojanscan_fill_channels, NULL);
235 trojanscan_rehashschedule = scheduleoneshot(time(NULL) + 60, &trojanscan_rehash_schedule, NULL);
236
237 }
238
239 void trojanscan_rehash_schedule(void *arg) {
240 trojanscan_rehashschedule = scheduleoneshot(time(NULL) + 60, &trojanscan_rehash_schedule, NULL);
241 if (!(trojanscan_database_query("SELECT value FROM settings WHERE setting = 'rehash'"))) {
242 trojanscan_database_res *res;
243 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
244 if (trojanscan_database_num_rows(res) > 0) {
245 trojanscan_database_row sqlrow = trojanscan_database_fetch_row(res);
246 if (sqlrow && (sqlrow[0][0] == '1')) {
247 trojanscan_mainchanmsg("n: rehash initiated by website. . .");
248 trojanscan_read_database(0);
249 }
250 }
251 trojanscan_database_free_result(res);
252 }
253 }
254
255 }
256
257 void trojanscan_free_database(void) {
258 int i;
259 for(i=0;i<trojanscan_database.total_channels;i++)
260 freesstring(trojanscan_database.channels[i].name);
261 free(trojanscan_database.channels);
262 for(i=0;i<trojanscan_database.total_phrases;i++)
263 if (trojanscan_database.phrases[i].phrase) {
264 free(trojanscan_database.phrases[i].phrase);
265 free(trojanscan_database.phrases[i].hint);
266 }
267 free(trojanscan_database.phrases);
268 for(i=0;i<trojanscan_database.total_worms;i++)
269 freesstring(trojanscan_database.worms[i].name);
270 free(trojanscan_database.worms);
271 trojanscan_database.total_channels = 0;
272 trojanscan_database.total_phrases = 0;
273 trojanscan_database.total_worms = 0;
274
275 }
276
277 sstring *trojanscan_getsstring(char *string, int length) {
278 int i;
279
280 for(i=0;i<length;i++) {
281 if ((string[i] == '\r') || (string[i] == '\n')) {
282 Error("trojanscan", ERR_WARNING, "Error reading %s at position %d, set to ERROR!", string, i+1);
283 return getsstring("ERROR", sizeof("ERROR"));
284 }
285 }
286
287 return getsstring(string, length);
288 }
289
290 int trojanscan_strip_codes(char *buf, size_t max, char *original) {
291 int i, j, length = TROJANSCAN_MMIN(strlen(original), max-1);
292 char *p2 = original, *p3, flag = 0;
293 p3 = buf;
294 for(i=0;i<length+1;i++) {
295 switch (*p2) {
296 case '\002':
297 case '\017':
298 case '\026':
299 case '\037':
300 break;
301 case '\003':
302 for(j=0;j<6;j++) {
303 if ((i + 1) > length)
304 break;
305 if ((j == 4) && flag)
306 break;
307 p2++;
308 i++;
309 if ((j == 0) && (!((*p2 >= '0') && (*p2 <= '9'))))
310 break;
311 if (j == 1) {
312
313 if (*p2 == ',') {
314 if ((i + 1) > length)
315 break;
316 if (!((*(p2 + 1) >= '0') && (*(p2 + 1) <= '9')))
317 break;
318 flag = 1;
319 } else if ((*p2 >= '0') && (*p2 <= '9')) {
320 flag = 0;
321 } else {
322 break;
323 }
324 }
325 if (j == 2) {
326 if (flag) {
327 if (!((*p2 >= '0') && (*p2 <= '9')))
328 break;
329 } else {
330 if (*p2 != ',') {
331 break;
332 } else {
333 if ((i + 1) > length)
334 break;
335 if (!((*(p2 + 1) >= '0') && (*(p2 + 1) <= '9')))
336 break;
337 }
338 }
339 }
340 if ((j == 3) && (!((*p2 >= '0') && (*p2 <= '9'))))
341 break;
342 if ((j == 4) && (!((*p2 >= '0') && (*p2 <= '9'))))
343 break;
344 }
345 p2--;
346 i--;
347 break;
348
349 default:
350 *p3 = *p2;
351 p3++;
352 break;
353 }
354 p2++;
355 }
356 return p3 - buf;
357 }
358
359 struct trojanscan_worms *trojanscan_find_worm_by_id(int id) {
360 int i;
361 for(i=0;i<trojanscan_database.total_worms;i++)
362 if ((trojanscan_database.worms[i].id == id))
363 return &trojanscan_database.worms[i];
364 return NULL;
365 }
366
367 void trojanscan_read_database(int first_time) {
368 const char *error;
369 int erroroffset, i, tempresult;
370
371 trojanscan_database_res *res;
372 trojanscan_database_row sqlrow;
373
374 if (!first_time) {
375 trojanscan_free_database();
376 } else {
377 trojanscan_database.total_channels = 0;
378 trojanscan_database.total_phrases = 0;
379 trojanscan_database.total_worms = 0;
380 }
381
382 if (!(trojanscan_database_query("SELECT channel, exempt FROM channels"))) {
383 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
384 trojanscan_database.total_channels = trojanscan_database_num_rows(res);
385 if (trojanscan_database.total_channels > 0) {
386 if ((trojanscan_database.channels = (trojanscan_channels *)malloc(sizeof(trojanscan_channels) * trojanscan_database.total_channels))) {
387 if ((trojanscan_database.total_channels>0) && trojanscan_database.channels) {
388 i = 0;
389 while((sqlrow = trojanscan_database_fetch_row(res))) {
390 trojanscan_database.channels[i].name = trojanscan_getsstring(sqlrow[0], strlen(sqlrow[0]));
391 trojanscan_database.channels[i].exempt = (sqlrow[1][0] == '1');
392 i++;
393 }
394 }
395 }
396 }
397 trojanscan_database_free_result(res);
398 }
399 }
400
401 if (!(trojanscan_database_query("SELECT id, wormname, glinetype, length(data), hitmsgs, hitchans, epidemic FROM worms"))) {
402 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
403 trojanscan_database.total_worms = trojanscan_database_num_rows(res);
404 if (trojanscan_database.total_worms > 0) {
405 if ((trojanscan_database.worms = (trojanscan_worms *)malloc(sizeof(trojanscan_worms) * trojanscan_database.total_worms))) {
406 i = 0;
407 while((sqlrow = trojanscan_database_fetch_row(res))) {
408 trojanscan_database.worms[i].id = atoi(sqlrow[0]);
409 trojanscan_database.worms[i].name = trojanscan_getsstring(sqlrow[1], strlen(sqlrow[1]));
410 tempresult = atoi(sqlrow[2]);
411 trojanscan_database.worms[i].glineuser = (tempresult == 0);
412 trojanscan_database.worms[i].glinehost = (tempresult == 1);
413 trojanscan_database.worms[i].monitor = (tempresult == 2);
414 if(sqlrow[3]) {
415 trojanscan_database.worms[i].datalen = ((atoi(sqlrow[3]) == 0) ? 0 : 1);
416 } else {
417 trojanscan_database.worms[i].datalen = 0;
418 }
419
420 trojanscan_database.worms[i].hitpriv = (atoi(sqlrow[4]) == 1);
421 trojanscan_database.worms[i].hitchans = (atoi(sqlrow[5]) == 1);
422 trojanscan_database.worms[i].epidemic = (atoi(sqlrow[6]) == 1);
423
424 i++;
425 }
426 }
427 }
428 trojanscan_database_free_result(res);
429 }
430 }
431
432 if (!(trojanscan_database_query("SELECT id, phrase, wormid FROM phrases ORDER BY priority DESC"))) {
433 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
434 trojanscan_database.total_phrases = trojanscan_database_num_rows(res);
435 if (trojanscan_database.total_phrases > 0) {
436 if ((trojanscan_database.phrases = (trojanscan_phrases *)malloc(sizeof(trojanscan_phrases) * trojanscan_database.total_phrases))) {
437 i = 0;
438 while((sqlrow = trojanscan_database_fetch_row(res))) {
439 trojanscan_database.phrases[i].id = atoi(sqlrow[0]);
440 trojanscan_database.phrases[i].worm = trojanscan_find_worm_by_id(atoi(sqlrow[2]));
441 if (!(trojanscan_database.phrases[i].phrase = pcre_compile(sqlrow[1], PCRE_CASELESS, &error, &erroroffset, NULL))) {
442 Error("trojanscan", ERR_WARNING, "Error compiling expression %s at offset %d: %s", sqlrow[1], erroroffset, error);
443 } else {
444 if ((trojanscan_database.phrases[i].hint = pcre_study(trojanscan_database.phrases[i].phrase, 0, &error))) {
445 Error("trojanscan", ERR_WARNING, "Error studying expression %s: %s", sqlrow[1], error);
446 free(trojanscan_database.phrases[i].phrase);
447 trojanscan_database.phrases[i].phrase = NULL;
448 }
449 }
450 i++;
451 }
452 }
453 }
454 trojanscan_database_free_result(res);
455 }
456 }
457
458 trojanscan_database_query("UPDATE settings SET value = '0' where setting = 'rehash'");
459
460 }
461
462 void trojanscan_log(nick *np, char *event, char *details, ...) {
463 int nickid = 0;
464 char eevent[TROJANSCAN_QUERY_TEMP_BUF_SIZE], edetails[TROJANSCAN_QUERY_TEMP_BUF_SIZE], buf[513];
465 va_list va;
466
467 va_start(va, details);
468 vsnprintf(buf, sizeof(buf) - 1, details, va);
469 va_end(va);
470
471 if (np)
472 if (IsAccount(np))
473 nickid = trojanscan_user_id_by_authname(np->authname);
474
475 trojanscan_database_escape_string(eevent, event, strlen(event));
476 trojanscan_database_escape_string(edetails, buf, strlen(buf));
477 trojanscan_database_query("INSERT INTO logs (userid, act, description) VALUES ('%d', '%s', '%s')", nickid, eevent, edetails);
478 }
479
480 void trojanscan_generateclone(void *arg) {
481 int i, loops = 0, modes = UMODE_XOPER | UMODE_INV;
482 char c_nick[NICKLEN+1], c_ident[USERLEN+1], c_host[HOSTLEN+1], c_real[REALLEN+1];
483 long fakeip;
484
485 i = (int)arg;
486
487 /* PPA: unlikely to be infinite */
488 do {
489 c_nick[0] = '\0';
490 if (!loops && trojanscan_hostmode) /* only have one go at this */
491 trojanscan_generatenick(c_nick, NICKLEN);
492 if(!c_nick[0])
493 trojanscan_gennick(c_nick, trojanscan_minmaxrand(7, TROJANSCAN_MMIN(13, NICKLEN)));
494 loops++;
495 } while ((getnickbynick(c_nick) != NULL));
496
497 trojanscan_generateident(c_ident, USERLEN);
498 if(!c_ident[0])
499 trojanscan_genident(c_ident, trojanscan_minmaxrand(4, TROJANSCAN_MMIN(8, USERLEN)));
500
501 if(trojanscan_hostmode) {
502 trojanscan_generatehost(c_host, HOSTLEN, &fakeip);
503 if(!c_host[0])
504 trojanscan_genhost(c_host, HOSTLEN, &fakeip);
505 } else {
506 trojanscan_genhost(c_host, HOSTLEN, &fakeip);
507 }
508
509 trojanscan_generaterealname(c_real, REALLEN);
510 if(!c_real[0])
511 trojanscan_genreal(c_real, trojanscan_minmaxrand(15, TROJANSCAN_MMIN(50, REALLEN)));
512
513 trojanscan_swarm[i].clone = registerlocaluser(c_nick, c_ident, c_host, c_real, NULL, modes, &trojanscan_clonehandlemessages);
514 trojanscan_swarm[i].fakeip = fakeip;
515
516 if(trojanscan_swarm[i].clone && !trojanscan_swarm_created) {
517 nick *np = trojanscan_selectuser();
518 if(np) /* select a 'random' sign on time for whois generation */
519 trojanscan_swarm[i].clone->timestamp = np->timestamp;
520 }
521 trojanscan_swarm[i].remaining = trojanscan_minmaxrand(5, 100);
522
523 trojanscan_swarm[i].sitting = 0;
524
525 }
526
527 void trojanscan_free_channels(void) {
528 int i;
529 if(trojanscan_chans) {
530 for(i=0;i<trojanscan_activechans;i++)
531 freesstring(trojanscan_chans[i].channel);
532 free(trojanscan_chans);
533 trojanscan_chans = NULL;
534 trojanscan_activechans = 0;
535 }
536 }
537
538 void trojanscan_repool(void *arg) {
539 if (trojanscan_generatepool() < TROJANSCAN_MINPOOLSIZE) {
540 trojanscan_hostmode = 0;
541 return;
542 } else {
543 trojanscan_hostmode = 1;
544 trojanscan_poolschedule = scheduleoneshot(time(NULL) + TROJANSCAN_POOL_REGENERATION, &trojanscan_repool, NULL);
545 }
546 }
547
548 void trojanscan_registerclones(void *arg) {
549 unsigned int i;
550
551 if (trojanscan_generatepool() < TROJANSCAN_MINPOOLSIZE) {
552 trojanscan_hostmode = 0;
553 trojanscan_cloneschedule = scheduleoneshot(time(NULL) + 10, &trojanscan_registerclones, NULL);
554 return;
555 } else {
556 trojanscan_hostmode = 1;
557 trojanscan_poolschedule = scheduleoneshot(time(NULL) + TROJANSCAN_POOL_REGENERATION, &trojanscan_repool, NULL);
558 trojanscan_cloneschedule = NULL;
559 }
560
561 for (i=0;i<TROJANSCAN_CLONE_TOTAL;i++)
562 trojanscan_generateclone((void *)i);
563 trojanscan_mainchanmsg("n: swarm (%d clones) created.", TROJANSCAN_CLONE_TOTAL);
564 trojanscan_swarm_created = 1;
565 }
566
567 int trojanscan_status(void *sender, int cargc, char **cargv) {
568 nick *np = (nick *)sender;
569 trojanscan_log(np, "status", "");
570 trojanscan_reply(np, "Channels in schedule: %d", trojanscan_activechans);
571 trojanscan_reply(np, "Channels in database: %d", trojanscan_database.total_channels);
572 trojanscan_reply(np, "Phrases: %d", trojanscan_database.total_phrases);
573 trojanscan_reply(np, "Worms: %d", trojanscan_database.total_worms);
574 trojanscan_reply(np, "Detections: %d", trojanscan_database.detections);
575 trojanscan_reply(np, "Glines: %d", trojanscan_database.glines);
576 trojanscan_reply(np, "Host/tail pool size: %d", TROJANSCAN_POOLSIZE);
577 trojanscan_reply(np, "Cycletime: %d", trojanscan_cycletime);
578 trojanscan_reply(np, "Clones: %d", TROJANSCAN_CLONE_TOTAL);
579 return CMD_OK;
580 }
581
582 int trojanscan_chanlist(void *sender, int cargc, char **cargv) {
583 int i;
584 nick *np = (nick *)sender;
585 char buf[CHANNELLEN * 2 + 20];
586 trojanscan_reply(np, "Channel list (%d total):", trojanscan_activechans);
587 buf[0] = '\0';
588
589 for(i=0;i<trojanscan_activechans;i++) {
590 if(trojanscan_chans[i].channel->length + 3 > sizeof(buf) - strlen(buf)) {
591 trojanscan_reply(np, "%s", buf);
592 buf[0] = '\0';
593 }
594
595 /* if splidge sees this I'm going to die */
596 strlcat(buf, trojanscan_chans[i].channel->content, sizeof(buf));
597 strlcat(buf, " ", sizeof(buf));
598 }
599 if(buf[0])
600 trojanscan_reply(np, "%s", buf);
601
602 trojanscan_reply(np, "Done.");
603 return CMD_OK;
604 }
605
606 int trojanscan_whois(void *sender, int cargc, char **cargv) {
607 char *tochange;
608 nick *np = (nick *)sender, *np2;
609 int templevel;
610
611 if (cargc < 1) {
612 trojanscan_reply(np, "Not enough parameters.");
613 return CMD_ERROR;
614 }
615
616 if (cargv[0][0] == '#') {
617 tochange = cargv[0] + 1;
618 } else {
619 int i;
620 np2 = getnickbynick(cargv[0]);
621 if (!np2) {
622 trojanscan_reply(np, "That nickname is not on the network.");
623 return CMD_ERROR;
624 }
625 for(i=0;i<TROJANSCAN_CLONE_TOTAL;i++) {
626 if(trojanscan_swarm[i].clone->nick && !ircd_strcmp(trojanscan_swarm[i].clone->nick, np2->nick)) {
627 trojanscan_reply(np, "Nickname : %s", np2->nick);
628 trojanscan_reply(np, "Swarm : yes", trojanscan_swarm[i].clone->nick);
629 return CMD_OK;
630 }
631 }
632 if (!IsAccount(np2)) {
633 trojanscan_reply(np, "User is not authed.");
634 return CMD_OK;
635 }
636 tochange = np2->authname;
637 }
638
639 templevel = trojanscan_user_level_by_authname(tochange);
640 if (templevel == -1) {
641 trojanscan_reply(np, "User does not exist.");
642 } else {
643 union trojanscan_userlevel flags;
644 flags.number = templevel;
645 trojanscan_reply(np, "Authname : %s", tochange);
646 trojanscan_reply(np, "Flags : +" TROJANSCAN_FLAG_MASK, TrojanscanFlagsInfo(flags));
647 }
648
649 return CMD_OK;
650 }
651
652 void trojanscan_privmsg_chan_or_nick(channel *cp, nick *np, char *message, ...) {
653 char buf[513];
654 va_list va;
655
656 if (!trojanscan_nick)
657 return;
658
659 va_start(va, message);
660 vsnprintf(buf, sizeof(buf) - 1, message, va);
661 va_end(va);
662
663 if (cp) {
664 sendmessagetochannel(trojanscan_nick, cp, buf);
665 } else {
666 sendmessagetouser(trojanscan_nick, np, buf);
667 }
668
669 }
670
671 int trojanscan_mew(void *sender, int cargc, char **cargv) {
672 nick *np = (nick *)sender, *np2 = NULL;
673 channel *cp = NULL;
674
675 if (cargc < 2) {
676 trojanscan_reply(np, "Not enough paramaters.");
677 return CMD_ERROR;
678 }
679
680 if(cargv[0][0] == '#') {
681 if (!(cp = findchannel(cargv[0]))) {
682 trojanscan_reply(np, "Channel not found.");
683 return CMD_ERROR;
684 }
685 trojanscan_log(np, "mew", "%s %s", cp->index->name->content, cargv[1]);
686 } else {
687 if (!(np2 = getnickbynick(cargv[0]))) {
688 trojanscan_reply(np, "Nickname is not present on the network.");
689 return CMD_ERROR;
690 }
691 trojanscan_log(np, "mew", "%s %s", np2->nick, cargv[1]);
692 }
693
694 trojanscan_privmsg_chan_or_nick(cp, np2, "\001ACTION mews hopefully at %s\001", cargv[1]);
695
696 if (cp) {
697 trojanscan_reply(np, "Mewed at %s in %s.", cargv[1], cp->index->name->content);
698 } else {
699 trojanscan_reply(np, "Mewed at %s at %s.", cargv[1], np2->nick);
700 }
701 return CMD_OK;
702 }
703
704 int trojanscan_cat(void *sender, int cargc, char **cargv) {
705 nick *np = (nick *)sender, *np2 = NULL;
706 channel *cp = NULL;
707 FILE *cat;
708 char buf[513], *p;
709
710 if (cargc < 1) {
711 trojanscan_reply(np, "Not enough paramaters.");
712 return CMD_ERROR;
713 }
714
715 if(cargv[0][0] == '#') {
716 if (!(cp = findchannel(cargv[0]))) {
717 trojanscan_reply(np, "Channel not found.");
718 return CMD_ERROR;
719 }
720 trojanscan_log(np, "cat", cp->index->name->content);
721 } else {
722 if (!(np2 = getnickbynick(cargv[0]))) {
723 trojanscan_reply(np, "Nickname is not present on the network.");
724 return CMD_ERROR;
725 }
726 trojanscan_log(np, "cat", np2->nick);
727 }
728
729 if ((!(cat = fopen(TROJANSCAN_CAT, "r")))) {
730 trojanscan_reply(np, "Unable to open cat!");
731 return CMD_ERROR;
732 }
733
734 while (fgets(buf, sizeof(buf) - 1, cat)) {
735 if ((p = strchr(buf, '\n'))) {
736 *p = '\0';
737 trojanscan_privmsg_chan_or_nick(cp, np2, "%s", buf);
738 } else if (feof(cat)) {
739 trojanscan_privmsg_chan_or_nick(cp, np2, "%s", buf);
740 }
741 }
742
743 fclose(cat);
744
745 if (cp) {
746 trojanscan_reply(np, "Spammed cat in %s.", cp->index->name->content);
747 } else {
748 trojanscan_reply(np, "Spammed cat at %s.", np2->nick);
749 }
750
751 return CMD_OK;
752 }
753
754 int trojanscan_reschedule(void *sender, int cargc, char **cargv) {
755 nick *np = (nick *)sender;
756 trojanscan_log(np, "reschedule", "");
757 trojanscan_fill_channels(NULL);
758
759 trojanscan_reply(np, "Rescheduled.");
760 return CMD_OK;
761 }
762
763 int trojanscan_listusers(void *sender, int cargc, char **cargv) {
764 nick *np = (nick *)sender;
765
766 trojanscan_log(np, "listusers", "");
767
768 trojanscan_reply(np, "User list:");
769
770 if (!(trojanscan_database_query("SELECT authname, authlevel FROM users ORDER BY authlevel DESC, authname"))) {
771 trojanscan_database_res *res;
772 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
773 if (trojanscan_database_num_rows(res)) {
774 trojanscan_database_row sqlrow;
775 union trojanscan_userlevel flags;
776 while((sqlrow = trojanscan_database_fetch_row(res))) {
777 flags.number = atoi(sqlrow[1]);
778 trojanscan_reply(np, "%s +" TROJANSCAN_FLAG_MASK, sqlrow[0], TrojanscanIsDeveloper(flags) ? "d" : "", TrojanscanIsTeamLeader(flags) ? "t" : "", TrojanscanIsStaff(flags) ? "s" : "", TrojanscanIsWebsite(flags) ? "w" : "", TrojanscanIsCat(flags) ? "c" : "");
779 }
780 }
781 trojanscan_database_free_result(res);
782 }
783 }
784
785 trojanscan_reply(np, "Done.");
786 return CMD_OK;
787 }
788
789 int trojanscan_help(void *sender, int cargc, char **cargv) {
790 nick *np = (nick *)sender;
791
792 if (cargc == 0) {
793 trojanscan_reply(np, "Not enough parameters.");
794 return CMD_ERROR;
795 }
796
797 if (!strcasecmp("help", cargv[0])) {
798 trojanscan_reply(np, "Syntax: help <command name>");
799 trojanscan_reply(np, "Gives help on commands.");
800 } else if (!strcasecmp("status", cargv[0])) {
801 trojanscan_reply(np, "Syntax: status");
802 trojanscan_reply(np, "Gives statistical information about the bot.");
803 } else if (!strcasecmp("join", cargv[0])) {
804 trojanscan_reply(np, "Syntax: join <#channel>");
805 trojanscan_reply(np, "Orders a clone to join supplied channel.");
806 } else if (!strcasecmp("showcommands", cargv[0])) {
807 trojanscan_reply(np, "Syntax: showcommands");
808 trojanscan_reply(np, "Pretty obvious.");
809 } else if (!strcasecmp("hello", cargv[0])) {
810 trojanscan_reply(np, "Syntax: hello ?nickname?");
811 trojanscan_reply(np, "Creates a new user.");
812 } else if (!strcasecmp("rehash", cargv[0])) {
813 trojanscan_reply(np, "Syntax: rehash");
814 trojanscan_reply(np, "Reloads bot database.");
815 } else if (!strcasecmp("changelev", cargv[0])) {
816 trojanscan_reply(np, "Syntax: changelev <nickname or #authname> <flags>");
817 trojanscan_reply(np, "Changes access flags of selected user to supplied input.");
818 trojanscan_reply(np, "+d -> developer");
819 trojanscan_reply(np, "+t -> team leader");
820 trojanscan_reply(np, "+s -> staff");
821 trojanscan_reply(np, "+w -> web management");
822 trojanscan_reply(np, "+c -> cat access");
823 } else if (!strcasecmp("deluser", cargv[0])) {
824 trojanscan_reply(np, "Syntax: deluser <nickname or #authname>");
825 trojanscan_reply(np, "Deletes selected user from my database.");
826 } else if (!strcasecmp("mew", cargv[0])) {
827 trojanscan_reply(np, "Syntax: mew <#channel or nickname> <nickname>");
828 trojanscan_reply(np, "Gracefully mews at target in selected channel or query.");
829 } else if (!strcasecmp("cat", cargv[0])) {
830 trojanscan_reply(np, "Syntax: cat <#channel or nickname>");
831 trojanscan_reply(np, "Shows the almightly cat.");
832 } else if (!strcasecmp("reschedule", cargv[0])) {
833 trojanscan_reply(np, "Syntax: reschedule");
834 trojanscan_reply(np, "Recalculates bots schedule.");
835 } else if (!strcasecmp("chanlist", cargv[0])) {
836 trojanscan_reply(np, "Syntax: chanlist");
837 trojanscan_reply(np, "Displays bots current channel list.");
838 } else if (!strcasecmp("whois", cargv[0])) {
839 trojanscan_reply(np, "Syntax: whois <nickname or #authname>");
840 trojanscan_reply(np, "Displays information on given user.");
841 } else if (!strcasecmp("whois", cargv[0])) {
842 trojanscan_reply(np, "Syntax: listusers <flags>");
843 trojanscan_reply(np, "Displays users with listusersing flags.");
844 } else {
845 trojanscan_reply(np, "Command not found.");
846 return CMD_ERROR;
847 }
848
849 return CMD_OK;
850 }
851
852 int trojanscan_hello(void *sender, int cargc, char **cargv) {
853 nick *np = (nick *)sender, *toadd;
854 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE];
855 int level = 0;
856
857 if (cargc > 0) {
858 toadd = getnickbynick(cargv[0]);
859 if (!toadd) {
860 trojanscan_reply(np, "That nickname is not on the network.");
861 return CMD_ERROR;
862 }
863 if (!IsAccount(toadd)) {
864 trojanscan_reply(np, "That user is not authed with the network.");
865 return CMD_ERROR;
866 }
867 } else {
868 if (!IsAccount(np)) {
869 trojanscan_reply(np, "You are not authed with the network, auth before creating your user.");
870 return CMD_ERROR;
871 }
872 toadd = np;
873 }
874
875 if (trojanscan_user_level_by_authname(toadd->authname)!=-1) {
876 trojanscan_reply(np, "Authname (%s) is already on file.", toadd->authname);
877 return CMD_ERROR;
878 }
879
880 trojanscan_log(np, "hello", toadd->authname);
881
882 if (!(trojanscan_database_query("SELECT id FROM users LIMIT 1"))) {
883 trojanscan_database_res *res;
884 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
885 if (trojanscan_database_num_rows(res) == 0)
886 level = TROJANSCAN_ACL_DEVELOPER | TROJANSCAN_ACL_STAFF | TROJANSCAN_ACL_WEBSITE | TROJANSCAN_ACL_CAT;
887 trojanscan_database_free_result(res);
888 }
889 }
890
891 trojanscan_database_escape_string(eaccount, toadd->authname, strlen(toadd->authname));
892 trojanscan_database_query("INSERT INTO users (authname, authlevel) VALUES ('%s', %d)", eaccount, level);
893 trojanscan_reply(np, "Account added to database, account %s%s.", toadd->authname, level>0?" (first user so developer access)":"");
894
895 return CMD_OK;
896 }
897
898 int trojanscan_user_level_by_authname(char *authname) {
899 int result = -1, sl = strlen(authname);
900 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE];
901
902 trojanscan_database_escape_string(eaccount, authname, sl);
903 if (!(trojanscan_database_query("SELECT authlevel, authname FROM users WHERE authname = '%s'", eaccount))) {
904 trojanscan_database_res *res;
905 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
906 if (trojanscan_database_num_rows(res) > 0) {
907 trojanscan_database_row sqlrow = trojanscan_database_fetch_row(res);
908 result = atoi(sqlrow[0]);
909 strlcpy(authname, sqlrow[1], sl + 1);
910 }
911 trojanscan_database_free_result(res);
912 }
913 }
914 return result;
915 }
916
917 int trojanscan_user_id_by_authname(char *authname) {
918 int result = 0;
919 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE];
920
921 trojanscan_database_escape_string(eaccount, authname, strlen(authname));
922 if (!(trojanscan_database_query("SELECT id FROM users WHERE authname = '%s'", eaccount))) {
923 trojanscan_database_res *res;
924 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
925 if (trojanscan_database_num_rows(res) > 0) {
926 trojanscan_database_row sqlrow = trojanscan_database_fetch_row(res);
927 result = atoi(sqlrow[0]);
928 }
929 trojanscan_database_free_result(res);
930 }
931 }
932 return result;
933 }
934
935 struct trojanscan_clones *trojanscan_selectclone(char type) {
936 struct trojanscan_clones *rc;
937 int randomclone, hits = 0, minlimit, maxlimit;
938
939 if(type == TROJANSCAN_WATCH_CLONES) {
940 minlimit = TROJANSCAN_CLONE_MAX;
941 maxlimit = minlimit + TROJANSCAN_WATCHCLONE_MAX - 1;
942 } else {
943 minlimit = 0;
944 maxlimit = TROJANSCAN_CLONE_MAX - 1;
945 }
946
947 do {
948 randomclone = trojanscan_minmaxrand(minlimit, maxlimit);
949 if (hits++ > 200)
950 return NULL;
951 rc = &trojanscan_swarm[randomclone];
952 if ((type == TROJANSCAN_NORMAL_CLONES) && (rc->sitting == 0) && (rc->remaining == 0))
953 break;
954
955 } while (rc->remaining == 0);
956
957 if(type == TROJANSCAN_NORMAL_CLONES) {
958 if ((rc->sitting == 0) && (rc->remaining == 0)) {
959 if ((!rc->remaining) && (!rc->sitting)) {
960 if (rc->clone) {
961 deregisterlocaluser(rc->clone, NULL);
962 rc->clone = NULL;
963 }
964 trojanscan_generateclone((void *)rc->index);
965 }
966 }
967 }
968
969 return rc;
970
971 }
972
973 /* hack hack hack */
974 int trojanscan_nickbanned(trojanscan_clones *np, channel *cp) {
975 int ret;
976 long realip = np->clone->ipaddress;
977
978 np->clone->ipaddress = np->fakeip;
979
980 ret = nickbanned(np->clone, cp);
981
982 np->clone->ipaddress = realip;
983
984 return ret;
985 }
986
987 struct trojanscan_realchannels *trojanscan_allocaterc(char *chan) {
988 struct trojanscan_realchannels *rc;
989 struct trojanscan_clones *clonep;
990 channel *cp;
991 int attempts_left = 10;
992
993 if (!chan) {
994 trojanscan_errorcode = 1; /* sorry splidge ;( */
995 return NULL;
996 }
997
998 if(chan[0] != '#') {
999 trojanscan_errorcode = 2;
1000 return NULL;
1001 }
1002
1003 if (strlen(chan) > 1) {
1004 if(strrchr(chan, ',')) {
1005 trojanscan_errorcode = 3;
1006 return NULL;
1007 }
1008
1009 if(strrchr(chan, ' ')) {
1010 trojanscan_errorcode = 4;
1011 return NULL;
1012 }
1013 }
1014
1015 cp = findchannel(chan);
1016 if (!cp) {
1017 trojanscan_errorcode = 5;
1018 return NULL;
1019 }
1020
1021 do {
1022 clonep = trojanscan_selectclone(TROJANSCAN_NORMAL_CLONES);
1023 if (!clonep) {
1024 trojanscan_errorcode = 6;
1025 return NULL;
1026 }
1027 if(!trojanscan_nickbanned(clonep, cp))
1028 break;
1029 } while (--attempts_left > 0);
1030
1031 if (!attempts_left) {
1032 trojanscan_errorcode = 7;
1033 return NULL;
1034 }
1035
1036 rc = (struct trojanscan_realchannels *)malloc(sizeof(struct trojanscan_realchannels));
1037
1038 rc->next = NULL;
1039 rc->clone = clonep;
1040 rc->chan = cp;
1041 rc->donotpart = 0;
1042 rc->kickedout = 0;
1043 return rc;
1044 }
1045
1046 void trojanscan_join(struct trojanscan_realchannels *rc) {
1047 struct trojanscan_realchannels *rp = trojanscan_realchanlist;
1048
1049 if (rc->clone && rc->clone->clone) {
1050 if (!localjoinchannel(rc->clone->clone, rc->chan)) {
1051 rc->clone->remaining--;
1052 rc->clone->sitting++;
1053 if (trojanscan_minmaxrand(1, TROJANSCAN_NICKCHANGE_ODDS)%TROJANSCAN_NICKCHANGE_ODDS == 0)
1054 trojanscan_donickchange((void *)rc->clone);
1055
1056 rc->schedule = scheduleoneshot(time(NULL)+trojanscan_part_time, &trojanscan_dopart, (void *)rc);
1057
1058 if (rp) {
1059 for(;rp->next;rp=rp->next);
1060 rp->next = rc;
1061 } else {
1062 trojanscan_realchanlist = rc;
1063 }
1064 }
1065 }
1066
1067 }
1068
1069 int trojanscan_userjoin(void *sender, int cargc, char **cargv) {
1070 nick *np = (nick *)sender;
1071 struct trojanscan_realchannels *rc;
1072
1073 if (cargc < 1) {
1074 trojanscan_reply(np, "Not enough paramaters");
1075 return CMD_ERROR;
1076 }
1077
1078 if (!trojanscan_swarm_created) {
1079 trojanscan_reply(np, "My swarm is currently empty.");
1080 return CMD_OK;
1081 }
1082
1083 if((rc = trojanscan_allocaterc(cargv[0]))) {
1084 trojanscan_log(np, "join", cargv[0]);
1085 trojanscan_join(rc);
1086 trojanscan_reply(np, "Clone has joined channel.");
1087 if(!IsOper(np))
1088 trojanscan_mainchanmsg("n: join: %s (%s/%s)", cargv[0], np->nick, np->authname);
1089 } else {
1090 if (trojanscan_errorcode == 5) {
1091 trojanscan_reply(np, "Not joining empty channel, check you entered the correct channel name.");
1092 } else {
1093 trojanscan_reply(np, "Clone could not join channel (error code %d)!", trojanscan_errorcode);
1094 }
1095 }
1096 return CMD_OK;
1097 }
1098
1099 int trojanscan_rehash(void *sender, int cargc, char **cargv) {
1100 nick *np = (void *)sender;
1101 trojanscan_read_database(0);
1102 trojanscan_log(np, "rehash", "");
1103 trojanscan_reply(np, "Done.");
1104 return CMD_OK;
1105 }
1106
1107 int trojanscan_changelev(void *sender, int cargc, char **cargv) {
1108 nick *np = (nick *)sender, *np2;
1109 int templevel;
1110 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE], *tochange, *p, mode = 1, error = 0, clast = 0, specialcase;
1111 union trojanscan_userlevel flags1, flags2;
1112
1113 if (cargc < 2) {
1114 trojanscan_reply(np, "Not enough parameters.");
1115 return CMD_ERROR;
1116 }
1117
1118 templevel = trojanscan_user_level_by_authname(np->authname);
1119
1120 if (templevel == -1) {
1121 trojanscan_reply(np, "You do not have an account.");
1122 return CMD_ERROR;
1123 }
1124
1125 flags1.number = templevel;
1126
1127 if (cargv[0][0] == '#') {
1128 tochange = cargv[0] + 1;
1129 } else {
1130 np2 = getnickbynick(cargv[0]);
1131 if (!np2) {
1132 trojanscan_reply(np, "That nickname is not on the network.");
1133 return CMD_ERROR;
1134 }
1135 if (!IsAccount(np2)) {
1136 trojanscan_reply(np, "That user is not authed with the network.");
1137 return CMD_ERROR;
1138 }
1139 tochange = np2->authname;
1140 }
1141
1142 templevel = trojanscan_user_level_by_authname(tochange);
1143
1144 if (templevel == -1) {
1145 trojanscan_reply(np, "User does not exist.");
1146 return CMD_ERROR;
1147 }
1148
1149 flags2.number = templevel;
1150
1151 if (!ircd_strcmp(np->authname, tochange)) {
1152 specialcase = 1;
1153 } else {
1154 specialcase = 0;
1155 }
1156
1157 for (p=cargv[1];*p;p++) {
1158 switch (*p) {
1159 case '+':
1160 case '-':
1161 mode = (*p == '+');
1162 break;
1163 case 'd':
1164 if (!TrojanscanIsDeveloper(flags1))
1165 clast = 1;
1166 flags2.values.developer = mode;
1167 break;
1168 case 't':
1169 if (!TrojanscanIsDeveloper(flags1))
1170 clast = 1;
1171 flags2.values.teamleader = mode;
1172 break;
1173 case 's':
1174 if (!TrojanscanIsLeastTeamLeader(flags1))
1175 clast = 1;
1176 flags2.values.staff = mode;
1177 break;
1178 case 'w':
1179 if (!TrojanscanIsDeveloper(flags1))
1180 clast = 1;
1181 flags2.values.website = mode;
1182 break;
1183 case 'c':
1184 if (!TrojanscanIsDeveloper(flags1))
1185 clast = 1;
1186 flags2.values.cat = mode;
1187 break;
1188 default:
1189 error = 1;
1190 goto last;
1191 break;
1192 }
1193 if (clast == 1) {
1194 if (specialcase && !mode) { /* allow user to remove their own flags */
1195 clast = 0;
1196 } else {
1197 goto last;
1198 }
1199 }
1200 }
1201
1202 last:
1203 if (*p) {
1204 if (error) {
1205 trojanscan_reply(np, "Unknown mode: %c%c.", mode?'+':'-', *p);
1206 } else {
1207 trojanscan_reply(np, "You have insufficient privilidges to add/remove one or more flags specified.");
1208 }
1209 return CMD_ERROR;
1210 }
1211
1212 trojanscan_log(np, "changelev", "%s %s", tochange, cargv[1]);
1213 trojanscan_database_escape_string(eaccount, tochange, strlen(tochange));
1214 trojanscan_database_query("UPDATE users SET authlevel = %d WHERE authname = '%s'", flags2.number, eaccount);
1215
1216 trojanscan_reply(np, "Flags changed.");
1217
1218 return CMD_OK;
1219 }
1220
1221 int trojanscan_deluser(void *sender, int cargc, char **cargv) {
1222 nick *np = (nick *)sender, *to;
1223 int templevel;
1224 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE], *account;
1225 union trojanscan_userlevel flags1, flags2;
1226
1227 if (cargc < 1) {
1228 trojanscan_reply(np, "Not enough parameters.");
1229 return CMD_ERROR;
1230 }
1231
1232 if (cargv[0][0] == '#') {
1233 account = cargv[0] + 1;
1234 } else {
1235 to = getnickbynick(cargv[0]);
1236 if (!to) {
1237 trojanscan_reply(np, "That nickname is not on the network.");
1238 return CMD_ERROR;
1239 }
1240 if (!IsAccount(to)) {
1241 trojanscan_reply(np, "That user is not authed with the network.");
1242 return CMD_ERROR;
1243 }
1244 account = to->authname;
1245 }
1246
1247 flags1.number = trojanscan_user_level_by_authname(np->authname);
1248 templevel = trojanscan_user_level_by_authname(account);
1249
1250 if (templevel == -1) {
1251 trojanscan_reply(np, "Auth %s does not exist.", account);
1252 return CMD_ERROR;
1253 }
1254
1255 flags2.number = templevel;
1256
1257 if (!TrojanscanIsDeveloper(flags1) && TrojanscanIsLeastTeamLeader(flags2)) {
1258 trojanscan_reply(np, "Your cannot delete %s as his/her flags equal or surpass your own.", account);
1259 return CMD_ERROR;
1260 }
1261
1262 trojanscan_log(np, "deluser", account);
1263 trojanscan_database_escape_string(eaccount, account, strlen(account));
1264 trojanscan_database_query("DELETE FROM users WHERE authname = '%s'", eaccount);
1265 trojanscan_reply(np, "User deleted.");
1266
1267 return CMD_OK;
1268 }
1269
1270 int trojanscan_add_ll(struct trojanscan_prechannels **head, struct trojanscan_prechannels *newitem) {
1271 struct trojanscan_prechannels *position, *lastitem = NULL, *location = NULL;
1272 if (!*head) {
1273 *head = newitem;
1274 newitem->next = NULL;
1275 if (newitem->exempt) {
1276 return 0;
1277 } else {
1278 return 1;
1279 }
1280 }
1281 /* if its exempt, we don't give a monkeys where it is... */
1282 if (newitem->exempt) {
1283 newitem->next = *head;
1284 *head = newitem;
1285 return 0;
1286 }
1287
1288 for(position=*head;position;lastitem=position,position=position->next) {
1289 if (!ircd_strcmp(position->name->content, newitem->name->content)) {
1290 free(newitem);
1291 return 0;
1292 }
1293 if (!location && (position->size < newitem->size)) {
1294 if (!lastitem) {
1295 location = *head;
1296 } else {
1297 location = lastitem;
1298 }
1299 }
1300 }
1301 if (!location) {
1302 newitem->next = NULL;
1303 lastitem->next = newitem;
1304 } else {
1305 newitem->next = location->next;
1306 location->next = newitem;
1307 }
1308 if(newitem->exempt) {
1309 return 0;
1310 } else {
1311 return 1;
1312 }
1313 }
1314
1315 void trojanscan_watch_clone_update(struct trojanscan_prechannels *hp, int count) {
1316 int i, j, marked;
1317 struct trojanscan_prechannels *lp;
1318 struct trojanscan_templist *markedlist = NULL;
1319
1320 if(count > 0) {
1321 markedlist = (struct trojanscan_templist *)calloc(count, sizeof(struct trojanscan_templist));
1322 if (!markedlist)
1323 return;
1324 }
1325
1326 for(i=0;i<trojanscan_activechans;i++) {
1327 marked = 0;
1328 if(markedlist) {
1329 for(lp=hp,j=0;j<count&&lp;j++,lp=lp->next) {
1330 if(!markedlist[j].active && !lp->exempt && !ircd_strcmp(lp->name->content, trojanscan_chans[i].channel->content)) { /* we're already on the channel */
1331 if(trojanscan_chans[i].watch_clone) {
1332 markedlist[j].active = 1;
1333 markedlist[j].watch_clone = trojanscan_chans[i].watch_clone;
1334 lp->watch_clone = trojanscan_chans[i].watch_clone;
1335 }
1336 marked = 1;
1337 break;
1338 }
1339 }
1340 }
1341 if(!marked && trojanscan_chans[i].watch_clone) {
1342 channel *cp = findchannel(trojanscan_chans[i].channel->content);
1343 if(cp)
1344 localpartchannel(trojanscan_chans[i].watch_clone->clone, cp);
1345 }
1346 }
1347
1348 if(!markedlist)
1349 return;
1350
1351 for(j=0,lp=hp;j<count&&lp;j++,lp=lp->next) {
1352 if((!markedlist[j].active || !markedlist[j].watch_clone) && !lp->exempt) {
1353 channel *cp = findchannel(lp->name->content);
1354 if(cp) {
1355 int attempts = 10;
1356 do {
1357 lp->watch_clone = trojanscan_selectclone(TROJANSCAN_WATCH_CLONES);
1358 if(!lp->watch_clone)
1359 break;
1360 if(!trojanscan_nickbanned(lp->watch_clone, cp)) {
1361 if(localjoinchannel(lp->watch_clone->clone, cp))
1362 lp->watch_clone = NULL;
1363 break;
1364 }
1365 } while(--attempts > 0);
1366 if(!attempts)
1367 lp->watch_clone = NULL;
1368
1369 }
1370 }
1371 }
1372
1373 free(markedlist);
1374 }
1375
1376 void trojanscan_fill_channels(void *arg) {
1377 struct trojanscan_prechannels *head = NULL, *lp, *last = NULL;
1378 int i, count, tempctime = 0;
1379
1380 chanindex *chn;
1381
1382 for (count=i=0;i<trojanscan_database.total_channels;i++) {
1383 lp = (trojanscan_prechannels *)malloc(sizeof(trojanscan_prechannels));
1384 lp->name = trojanscan_database.channels[i].name;
1385 lp->size = 65535;
1386 lp->exempt = trojanscan_database.channels[i].exempt;
1387 lp->watch_clone = NULL;
1388 if (trojanscan_add_ll(&head, lp))
1389 count++;
1390 }
1391
1392 for (i=0;i<CHANNELHASHSIZE;i++) {
1393 for(chn=chantable[i];chn;chn=chn->next) {
1394 if (chn->channel && !IsKey(chn->channel) && !IsInviteOnly(chn->channel) && !IsRegOnly(chn->channel) && (chn->channel->users->totalusers >= trojanscan_minchansize)) {
1395 lp = (trojanscan_prechannels *)malloc(sizeof(trojanscan_prechannels));
1396 lp->name = chn->name;
1397 lp->size = chn->channel->users->totalusers;
1398 lp->exempt = 0;
1399 lp->watch_clone = NULL;
1400 if (trojanscan_add_ll(&head, lp))
1401 count++;
1402 }
1403 }
1404 }
1405
1406 count = TROJANSCAN_MMIN(count, trojanscan_maxchans);
1407
1408 trojanscan_watch_clone_update(head, count);
1409
1410 trojanscan_free_channels();
1411 trojanscan_chans = (struct trojanscan_inchannel *)calloc(count, sizeof(struct trojanscan_inchannel));
1412 trojanscan_activechans = count;
1413 i = 0;
1414
1415 for(lp=head;lp;last=lp,lp=lp->next) {
1416 if (!(lp->exempt) && (i < count)) {
1417 trojanscan_chans[i].channel = getsstring(lp->name->content, lp->name->length);
1418 trojanscan_chans[i++].watch_clone = lp->watch_clone;
1419 }
1420 if (last)
1421 free(last);
1422 }
1423
1424 if (last)
1425 free(last);
1426
1427 if (trojanscan_activechans > 0) {
1428 tempctime = trojanscan_cycletime / trojanscan_activechans;
1429 } else {
1430 tempctime = 60;
1431 trojanscan_mainchanmsg("d: just escaped a divide by zero error (no activechans!), rescheduling in 60 seconds");
1432 }
1433
1434 if(trojanscan_schedule)
1435 deleteschedule(trojanscan_schedule, &trojanscan_dojoin, NULL);
1436
1437 trojanscan_channumber = 0;
1438
1439 trojanscan_schedule = schedulerecurring(time(NULL) + tempctime, trojanscan_activechans + 1, tempctime, trojanscan_dojoin, NULL);
1440
1441 }
1442
1443 void trojanscan_dojoin(void *arg) {
1444 struct trojanscan_realchannels *rc;
1445 if (trojanscan_channumber >= trojanscan_activechans) {
1446 trojanscan_schedule = NULL;
1447 trojanscan_fill_channels(NULL);
1448 } else {
1449 if ((rc = trojanscan_allocaterc(trojanscan_chans[trojanscan_channumber++].channel->content)))
1450 trojanscan_join(rc);
1451 }
1452 }
1453
1454
1455 void trojanscan_dopart(void *arg) {
1456 struct trojanscan_realchannels *rc = (struct trojanscan_realchannels *)arg, *rp, *past = NULL;
1457
1458 if (rc->kickedout) { /* there's a join scheduled, wait for it (reschedule) */
1459 rc->schedule = scheduleoneshot(time(NULL)+5, &trojanscan_dopart, (void *)rc);
1460 return;
1461 }
1462
1463 if (rc->clone->clone && (!(rc->donotpart)))
1464 localpartchannel(rc->clone->clone, rc->chan);
1465
1466 rc->clone->sitting--;
1467
1468 for(rp=trojanscan_realchanlist;rp;rp=rp->next) {
1469 if (rp == rc) {
1470 if (!past) {
1471 trojanscan_realchanlist = rp->next;
1472 } else {
1473 past->next = rp->next;
1474 }
1475 free(rp);
1476 break;
1477 }
1478 past = rp;
1479 }
1480
1481 }
1482
1483 void trojanscan_donickchange(void *arg) { /* just incase I choose to make this schedule at some point */
1484 struct trojanscan_clones *clone = (trojanscan_clones *)arg;
1485 if (clone && clone->clone) {
1486 char c_nick[NICKLEN+1];
1487 int loops = 0;
1488 /* PPA: unlikely to be infinite */
1489 do {
1490 if ((loops++ < 10) && trojanscan_hostmode) {
1491 trojanscan_generatenick(c_nick, NICKLEN);
1492 } else {
1493 trojanscan_gennick(c_nick, trojanscan_minmaxrand(7, TROJANSCAN_MMIN(13, NICKLEN)));
1494 }
1495 } while (c_nick && (getnickbynick(c_nick) != NULL));
1496
1497 renamelocaluser(clone->clone, c_nick);
1498 }
1499
1500 }
1501
1502 int trojanscan_keysort(const void *v1, const void *v2) {
1503 return ((*(trojanscan_prechannels **)v2)->size - (*(trojanscan_prechannels **)v1)->size);
1504 }
1505
1506 int trojanscan_showcommands(void *sender, int cargc, char **cargv) {
1507 nick *np = (nick *)sender;
1508 Command *cmdlist[100];
1509 int i, n;
1510 char level = 0;
1511
1512 n = getcommandlist(trojanscan_cmds, cmdlist, 100);
1513
1514 trojanscan_reply(np, "The following commands are registered at present:");
1515
1516 for(i=0;i<n;i++) {
1517 if (cmdlist[i]->level & TROJANSCAN_ACL_STAFF) {
1518 level = 's';
1519 } else if (cmdlist[i]->level & TROJANSCAN_ACL_DEVELOPER) {
1520 level = 'd';
1521 } else if (cmdlist[i]->level & TROJANSCAN_ACL_TEAMLEADER) {
1522 level = 't';
1523 } else if (cmdlist[i]->level & TROJANSCAN_ACL_CAT) {
1524 level = 'c';
1525 } else if (cmdlist[i]->level & TROJANSCAN_ACL_WEBSITE) {
1526 level = 'w';
1527 } else if (cmdlist[i]->level & TROJANSCAN_ACL_UNAUTHED) {
1528 level = 0;
1529 }
1530 if (level) {
1531 trojanscan_reply(np, "%s (+%c)", cmdlist[i]->command->content, level);
1532 } else {
1533 trojanscan_reply(np, "%s", cmdlist[i]->command->content);
1534 }
1535 }
1536 trojanscan_reply(np, "End of list.");
1537 return CMD_OK;
1538 }
1539
1540 void trojanscan_handlemessages(nick *target, int messagetype, void **args) {
1541 Command *cmd;
1542 char *cargv[50];
1543 int cargc, templevel;
1544 nick *sender;
1545 union trojanscan_userlevel level;
1546
1547 switch(messagetype) {
1548 case LU_PRIVMSG:
1549 case LU_SECUREMSG:
1550 /* If it's a message, first arg is nick and second is message */
1551 sender = (nick *)args[0];
1552
1553 if(strncmp(TROJANSCAN_VERSION_DETECT, args[1], sizeof(TROJANSCAN_VERSION_DETECT)-1)==0) {
1554 char p = ((char *)args[1])[sizeof(TROJANSCAN_VERSION_DETECT)-1];
1555 if((p == ' ') || (p == '\0') || (p == 1)) {
1556 trojanscan_reply(sender, "\001VERSION Trojanscan (or Tigger) Newserv module version %s by Chris Porter (slug), Newserv by David Mansell (splidge). Compiled " __DATE__ " " __TIME__ ".\001", TROJANSCAN_VERSION);
1557 return;
1558 }
1559 }
1560
1561 /* Split the line into params */
1562 cargc = splitline((char *)args[1], cargv, 50, 0);
1563
1564 cmd=findcommandintree(trojanscan_cmds, cargv[0], 1);
1565 if (!cmd) {
1566 trojanscan_reply(sender, "Unknown command.");
1567 return;
1568 }
1569
1570 if ((cmd->level & TROJANSCAN_ACL_OPER) && !IsOper(sender)) {
1571 trojanscan_reply(sender, "You need to be opered to use this command.");
1572 return;
1573 }
1574
1575 /* bit grim code... */
1576
1577 if (!(cmd->level & TROJANSCAN_ACL_UNAUTHED)) {
1578 if (!IsAccount(sender)) {
1579 trojanscan_reply(sender, "You must be authed with the network to access this command!");
1580 return;
1581 }
1582 templevel = trojanscan_user_level_by_authname(sender->authname);
1583
1584 if (templevel == -1) {
1585 trojanscan_reply(sender, "You do not have an account.");
1586 return;
1587 }
1588
1589 level.number = templevel;
1590
1591 if ((cmd->level & TROJANSCAN_ACL_DEVELOPER) && !TrojanscanIsDeveloper(level)) {
1592 trojanscan_reply(sender, "Access denied.");
1593 return;
1594 }
1595 if ((cmd->level & TROJANSCAN_ACL_TEAMLEADER) && !TrojanscanIsLeastTeamLeader(level)) {
1596 trojanscan_reply(sender, "Access denied.");
1597 return;
1598 }
1599 if ((cmd->level & TROJANSCAN_ACL_STAFF) && !TrojanscanIsLeastStaff(level)) {
1600 trojanscan_reply(sender, "Access denied.");
1601 return;
1602 }
1603 if ((cmd->level & TROJANSCAN_ACL_CAT) && !TrojanscanIsCat(level)) {
1604 trojanscan_reply(sender, "Access denied.");
1605 return;
1606 }
1607 if ((cmd->level & TROJANSCAN_ACL_WEBSITE) && !TrojanscanIsLeastWebsite(level)) {
1608 trojanscan_reply(sender, "Access denied.");
1609 return;
1610 }
1611 }
1612
1613 /* Check the maxargs */
1614 if (cmd->maxparams<(cargc-1)) {
1615 /* We need to do some rejoining */
1616 rejoinline(cargv[cmd->maxparams], cargc-(cmd->maxparams));
1617 cargc = (cmd->maxparams) + 1;
1618 }
1619
1620 (cmd->handler)((void *)sender, cargc - 1, &(cargv[1]));
1621 break;
1622
1623 case LU_KILLED:
1624 /* someone killed me? Bastards */
1625 trojanscan_connect_schedule = scheduleoneshot(time(NULL) + 1, &trojanscan_connect, NULL);
1626 trojanscan_nick = NULL;
1627 break;
1628
1629 default:
1630 break;
1631 }
1632 }
1633
1634 char trojanscan_getmtfrommessagetype(int input) {
1635 switch(input) {
1636 case LU_PRIVMSG: return 'm';
1637 case LU_PRIVNOTICE: return 'n';
1638 case LU_SECUREMSG: return 's';
1639 case LU_CHANMSG: return 'M';
1640 case LU_CHANNOTICE: return 'N';
1641 default: return '?';
1642 }
1643 }
1644
1645 void trojanscan_clonehandlemessages(nick *target, int messagetype, void **args) {
1646 char *pretext = NULL, etext[TROJANSCAN_QUERY_TEMP_BUF_SIZE], enick[TROJANSCAN_QUERY_TEMP_BUF_SIZE], eident[TROJANSCAN_QUERY_TEMP_BUF_SIZE], ehost[TROJANSCAN_QUERY_TEMP_BUF_SIZE], text[513], detected = 0;
1647 nick *sender;
1648 struct trojanscan_realchannels *rp;
1649 struct trojanscan_rejoinlist *rj;
1650 unsigned int i, len;
1651 struct trojanscan_worms *worm;
1652 int vector[30];
1653 char mt = trojanscan_getmtfrommessagetype(messagetype);
1654 char *channel_name;
1655
1656 switch(messagetype) {
1657 case LU_PRIVMSG:
1658 case LU_SECUREMSG:
1659 case LU_PRIVNOTICE:
1660
1661 pretext = (char *)args[1];
1662
1663 case LU_CHANMSG:
1664 case LU_CHANNOTICE:
1665
1666 sender = (nick *)args[0];
1667 if (strlen(sender->nick) < 2)
1668 break;
1669
1670 if (!pretext)
1671 pretext = (char *)args[2];
1672
1673 if(strncmp(TROJANSCAN_VERSION_DETECT, pretext, sizeof(TROJANSCAN_VERSION_DETECT)-1)==0) {
1674 char p = pretext[sizeof(TROJANSCAN_VERSION_DETECT)-1];
1675 if((p == ' ') || (p == '\0') || (p == 1)) {
1676 int staff = 0;
1677 if (IsOper(sender)) {
1678 staff = 1;
1679 } else {
1680 if (IsAccount(sender)) {
1681 int templevel = trojanscan_user_level_by_authname(sender->authname);
1682 if (templevel != -1) {
1683 union trojanscan_userlevel level;
1684 level.number = templevel;
1685 if (TrojanscanIsLeastStaff(level))
1686 staff = 1;
1687 }
1688 }
1689 }
1690 if (staff) {
1691 if(trojanscan_nick) {
1692 sendnoticetouser(target, sender, "\001VERSION T clone, check T for confirmation.\001");
1693 sendnoticetouser(trojanscan_nick, sender, "\001VERSION %s is part of my swarm.\001", target->nick);
1694 } else {
1695 sendnoticetouser(target, sender, "\001VERSION T clone, though since T is currently gone you'll have to version me again in a minute for confirmation.\001");
1696 }
1697 } else {
1698 sendnoticetouser(target, sender, "\001VERSION " TROJANSCAN_CLONE_VERSION_REPLY "\001");
1699 }
1700
1701 return;
1702 }
1703 }
1704
1705 trojanscan_strip_codes(text, sizeof(text) - 1, pretext);
1706
1707 len = strlen(text);
1708
1709 for(i=0;i<trojanscan_database.total_phrases;i++) {
1710 if (
1711 (
1712 (worm = trojanscan_database.phrases[i].worm)
1713 ) &&
1714 (
1715 (
1716 (
1717 (messagetype == LU_PRIVMSG) || (messagetype == LU_SECUREMSG) || (messagetype == LU_PRIVNOTICE)
1718 ) &&
1719 (
1720 (trojanscan_database.phrases[i].worm->hitpriv)
1721 )
1722 ) ||
1723 (
1724 (
1725 (messagetype == LU_CHANMSG) || (messagetype == LU_CHANNOTICE)
1726 ) &&
1727 (
1728 (trojanscan_database.phrases[i].worm->hitchans)
1729 )
1730 )
1731 ) &&
1732 (trojanscan_database.phrases[i].phrase)
1733 ) {
1734 int pre = pcre_exec(trojanscan_database.phrases[i].phrase, trojanscan_database.phrases[i].hint, text, len, 0, 0, vector, 30);
1735 if(pre >= 0) {
1736 char glinemask[HOSTLEN + USERLEN + NICKLEN + 4];
1737 char *userbit;
1738 host *hp;
1739 unsigned int j, usercount, frequency;
1740 char ip[TROJANSCAN_IPLEN];
1741 int glining = 1;
1742 channel *chp = (channel *)args[1];
1743
1744 nick *np = NULL; /* sigh at warnings */
1745
1746 detected = 1;
1747
1748 trojanscan_database.detections++;
1749
1750 if (!(hp=findhost(sender->host->name->content))) {
1751 trojanscan_mainchanmsg("w: user %s!%s@%s triggered infection monitor, yet no hosts found at stage 1 -- worm: %s", sender->nick, sender->ident, sender->host->name->content, worm->name->content);
1752 break;
1753 }
1754
1755 usercount = 0; /* stupid warnings */
1756 if (worm->monitor) {
1757 glining = 0;
1758 usercount = -1;
1759 } else if (worm->glinehost) {
1760 snprintf(glinemask, sizeof(glinemask) - 1, "*@%s", trojanscan_iptostr(ip, sizeof(ip) - 1, sender->ipaddress));
1761 usercount = hp->clonecount;
1762 }
1763
1764 /* if the host is >maxusers then it's a trusted host and we can gline by ident */
1765 if (worm->glineuser || (worm->glinehost && (usercount > trojanscan_maxusers))) {
1766 userbit = sender->ident;
1767 if(userbit[0] == '~')
1768 userbit++;
1769 snprintf(glinemask, sizeof(glinemask) - 1, "*%s@%s", userbit, trojanscan_iptostr(ip, sizeof(ip) - 1, sender->ipaddress));
1770 for (j=0;j<NICKHASHSIZE;j++) {
1771 for (np=nicktable[j];np;np=np->next) {
1772 if ((np->host==hp) && (!ircd_strcmp(np->ident,sender->ident)))
1773 usercount++;
1774 }
1775 }
1776 }
1777
1778 if (!usercount) {
1779 trojanscan_mainchanmsg("w: user %s!%s@%s triggered infection monitor, yet no hosts found at stage 2 -- worm: %s", sender->nick, sender->ident, sender->host->name->content, worm->name->content);
1780 break;
1781 }
1782
1783 if (glining && (usercount > trojanscan_maxusers)) {
1784 trojanscan_mainchanmsg("w: not glining %s!%s@%s due to too many users (%d) with mask: *!%s -- worm: %s)", sender->nick, sender->ident, sender->host->name->content, usercount, glinemask, worm->name->content);
1785 break;
1786 }
1787
1788 if (glining && !worm->datalen) {
1789 trojanscan_mainchanmsg("w: not glining %s!%s@%s due to too lack of removal data with mask: *!%s (%d users) -- worm: %s)", sender->nick, sender->ident, sender->host->name->content, glinemask, usercount, worm->name->content);
1790 break;
1791 }
1792
1793 trojanscan_database_escape_string(enick, sender->nick, strlen(sender->nick));
1794 trojanscan_database_escape_string(eident, sender->ident, strlen(sender->ident));
1795 trojanscan_database_escape_string(ehost, sender->host->name->content, sender->host->name->length);
1796
1797 frequency = 1;
1798
1799 if (!(trojanscan_database_query("SELECT COUNT(*) FROM hits WHERE glined = %d AND host = '%s'", glining, ehost))) {
1800 trojanscan_database_res *res;
1801 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
1802 trojanscan_database_row sqlrow;
1803 if ((trojanscan_database_num_rows(res) > 0) && (sqlrow = trojanscan_database_fetch_row(res)))
1804 frequency = atoi(sqlrow[0]) + 1;
1805 trojanscan_database_free_result(res);
1806 }
1807 }
1808
1809 if (!glining) {
1810 char matchbuf[513];
1811 matchbuf[0] = 0;
1812 matchbuf[512] = 0; /* hmm */
1813
1814 if(pre > 1)
1815 if (pcre_copy_substring(text, vector, pre, 1, matchbuf, sizeof(matchbuf) - 1) <= 0)
1816 matchbuf[0] = 0;
1817
1818 trojanscan_mainchanmsg("m: t: %c u: %s!%s@%s%s%s w: %s %s%s", mt, sender->nick, sender->ident, sender->host->name->content, mt=='N'||mt=='M'?" #: ":"", mt=='N'||mt=='M'?chp->index->name->content:"", worm->name->content, matchbuf[0]?" --: ":"", matchbuf[0]?matchbuf:"");
1819 trojanscan_peonchanmsg("m: t: %c u: %s!%s@%s%s%s%s w: %s %s%s", mt, sender->nick, sender->ident, (IsHideHost(sender)&&IsAccount(sender))?sender->authname:sender->host->name->content, (IsHideHost(sender)&&IsAccount(sender))?"."HIS_HIDDENHOST:"", mt=='N'||mt=='M'?" #: ":"", mt=='N'||mt=='M'?chp->index->name->content:"", worm->name->content, matchbuf[0]?" --: ":"", matchbuf[0]?matchbuf:"");
1820 } else {
1821 int glinetime = TROJANSCAN_FIRST_OFFENSE * frequency * (worm->epidemic?TROJANSCAN_EPIDEMIC_MULTIPLIER:1);
1822 if(glinetime > 7 * 24)
1823 glinetime = 7 * 24; /* can't set glines over 7 days with normal non U:lined glines */
1824
1825 trojanscan_database_query("INSERT INTO hits (nickname, ident, host, phrase, messagetype, glined) VALUES ('%s', '%s', '%s', %d, '%c', %d)", enick, eident, ehost, trojanscan_database.phrases[i].id, mt, glining);
1826 trojanscan_database.glines++;
1827
1828 irc_send("%s GL * +%s %d :You (%s!%s@%s) are infected with a trojan (%s), see %s%d for details - banned for %d hours\r\n", mynumeric->content, glinemask, glinetime * 3600, sender->nick, sender->ident, sender->host->name->content, worm->name->content, TROJANSCAN_URL_PREFIX, worm->id, glinetime);
1829
1830 trojanscan_mainchanmsg("g: *!%s t: %c u: %s!%s@%s%s%s c: %d w: %s%s f: %d", glinemask, mt, sender->nick, sender->ident, sender->host->name->content, mt=='N'||mt=='M'?" #: ":"", mt=='N'||mt=='M'?chp->index->name->content:"", usercount, worm->name->content, worm->epidemic?"(E)":"", frequency);
1831 }
1832
1833 break;
1834 }
1835 }
1836 }
1837 if (!detected && (mt != 'N') && (mt != 'M')) {
1838 trojanscan_database_escape_string(etext, text, len);
1839 trojanscan_database_escape_string(enick, sender->nick, strlen(sender->nick));
1840 trojanscan_database_escape_string(eident, sender->ident, strlen(sender->ident));
1841 trojanscan_database_escape_string(ehost, sender->host->name->content, sender->host->name->length);
1842 trojanscan_database_query("INSERT INTO unknownlog (data, user) VALUES ('%s','%s!%s@%s')", etext, enick, eident, ehost);
1843 }
1844 break;
1845 case LU_KILLED:
1846 /* someone killed me? Bastards */
1847
1848 /* PPA: we do NOT rejoin channels at this moment in time, it is possible to do this though */
1849 for (i=0;i<TROJANSCAN_CLONE_TOTAL;i++) {
1850 if (trojanscan_swarm[i].clone == target) {
1851
1852 scheduleoneshot(time(NULL)+1, &trojanscan_generateclone, (void *)i);
1853 if(i >= TROJANSCAN_CLONE_MAX) {
1854 int j;
1855 for(j=0;j<trojanscan_activechans;j++)
1856 if(trojanscan_chans[j].watch_clone == &trojanscan_swarm[i])
1857 trojanscan_chans[j].watch_clone = NULL;
1858 } else {
1859 for(rp=trojanscan_realchanlist;rp;rp=rp->next)
1860 if ((rp->clone == &(trojanscan_swarm[i])))
1861 rp->donotpart = 1;
1862 }
1863 trojanscan_swarm[i].clone = NULL;
1864 trojanscan_swarm[i].remaining = 0; /* bah */
1865 break;
1866 }
1867 }
1868 break;
1869
1870 case LU_KICKED:
1871 channel_name = ((channel *)args[1])->index->name->content;
1872 for (i=0;i<trojanscan_activechans;i++) {
1873 if (!trojanscan_chans[i].watch_clone)
1874 continue;
1875 if ((trojanscan_chans[i].watch_clone->clone == target) && (!strcmp(trojanscan_chans[i].channel->content, channel_name)))
1876 break;
1877 }
1878 if(i != trojanscan_activechans) {
1879 int j;
1880 for(j=0;j<TROJANSCAN_CLONE_TOTAL;j++) {
1881 if(&trojanscan_swarm[j] == trojanscan_chans[i].watch_clone) {
1882 trojanscan_chans[i].watch_clone = NULL;
1883 break;
1884 }
1885 }
1886 } else {
1887 /*
1888 trojanscan_mainchanmsg("k: %s on %s by %s", target->nick, ((channel *)args[1])->index->name->content, (((nick *)args[0])->nick)?(((nick *)args[0])->nick):"(server)");
1889 */
1890 rj = (struct trojanscan_rejoinlist *)malloc(sizeof(struct trojanscan_rejoinlist));
1891 if (rj) {
1892 rj->rp = NULL;
1893 for(rp=trojanscan_realchanlist;rp;rp=rp->next)
1894 if ((rp->clone->clone == target) && (rp->chan == args[1])) {
1895 rp->kickedout++;
1896 rj->rp = rp;
1897 break;
1898 }
1899 if(!rj->rp) {
1900 free(rj);
1901 return;
1902 }
1903
1904 rj->channel = getsstring(((channel *)args[1])->index->name->content, ((channel *)args[1])->index->name->length);
1905 if(!rj->channel) {
1906 trojanscan_mainchanmsg("d: unable to allocate memory for channel: %s upon rejoin", ((channel *)args[1])->index->name->content);
1907 free(rj);
1908 return;
1909 }
1910
1911 rj->clone = rp->clone;
1912 rj->next = trojanscan_schedulerejoins;
1913 trojanscan_schedulerejoins = rj;
1914
1915 rj->schedule = scheduleoneshot(time(NULL)+1, &trojanscan_rejoin_channel, (void *)rj);
1916 }
1917 }
1918 break;
1919 default:
1920 break;
1921 }
1922 }
1923
1924 void trojanscan_rejoin_channel(void *arg) {
1925 struct trojanscan_rejoinlist *rj2, *lrj, *rj = (struct trojanscan_rejoinlist *)arg;
1926
1927 channel *cp = findchannel(rj->channel->content);
1928 freesstring(rj->channel);
1929
1930 if (rj->rp) {
1931 rj->rp->kickedout--;
1932 if (!cp) {
1933 rj->rp->donotpart = 1; /* we were the last user on the channel, so we need to be VERY careful freeing it */
1934 } else {
1935 if(!rj->rp->donotpart && !rj->rp->kickedout) { /* check we're allowed to join channels (not killed), and we're the last one to join */
1936 if (trojanscan_nickbanned(rj->clone, cp)) {
1937 rj->rp->donotpart = 1;
1938 } else {
1939 localjoinchannel(rj->clone->clone, cp);
1940 }
1941 }
1942 }
1943 }
1944
1945 rj2 = trojanscan_schedulerejoins;
1946 lrj = NULL;
1947
1948 if (rj2 == rj) {
1949 trojanscan_schedulerejoins = rj->next;
1950 free(rj);
1951 } else {
1952 for(rj2=trojanscan_schedulerejoins;rj2;lrj=rj2,rj2=rj2->next) {
1953 if (rj2 == rj) {
1954 lrj->next = rj2->next;
1955 free(rj);
1956 break;
1957 }
1958 }
1959 }
1960
1961 }
1962
1963 void trojanscan_reply(nick *target, char *message, ... ) {
1964 char buf[513];
1965 va_list va;
1966
1967 if (!trojanscan_nick)
1968 return;
1969
1970 va_start(va, message);
1971 vsnprintf(buf, sizeof(buf) - 1, message, va);
1972 va_end(va);
1973
1974 sendnoticetouser(trojanscan_nick, target, "%s", buf);
1975 }
1976
1977
1978 void trojanscan_mainchanmsg(char *message, ...) {
1979 char buf[513];
1980 va_list va;
1981 channel *cp;
1982
1983 if (!trojanscan_nick)
1984 return;
1985 if (!(cp = findchannel(TROJANSCAN_CHANNEL)))
1986 return;
1987
1988 va_start(va, message);
1989 vsnprintf(buf, sizeof(buf) - 1, message, va);
1990 va_end(va);
1991
1992 sendmessagetochannel(trojanscan_nick, cp, "%s", buf);
1993 }
1994
1995 void trojanscan_peonchanmsg(char *message, ...) {
1996 char buf[513];
1997 va_list va;
1998 channel *cp;
1999
2000 if (!trojanscan_nick)
2001 return;
2002 if (!(cp = findchannel(TROJANSCAN_PEONCHANNEL)))
2003 return;
2004
2005 va_start(va, message);
2006 vsnprintf(buf, sizeof(buf) - 1, message, va);
2007 va_end(va);
2008
2009 sendmessagetochannel(trojanscan_nick, cp, "%s", buf);
2010 }
2011
2012 int trojanscan_minmaxrand(float min, float max) {
2013 return (int)((max-min+1)*rand()/(RAND_MAX+min))+min;
2014 }
2015
2016 char *trojanscan_iptostr(char *buf, int buflen, unsigned int ip) {
2017 snprintf(buf, buflen, "%d.%d.%d.%d", ip >> 24, (ip >> 16) & 255, (ip >> 8) & 255, ip & 255);
2018 return buf;
2019 }
2020
2021 char trojanscan_genchar(int ty) {
2022 /* hostname and realname characters*/
2023 if (!ty) {
2024 if (!(trojanscan_minmaxrand(0, 40) % 10)) {
2025 return trojanscan_minmaxrand(48, 57);
2026 } else {
2027 return trojanscan_minmaxrand(97, 122);
2028 }
2029 /* ident characters - without numbers*/
2030 } else if (ty == 1) {
2031 return trojanscan_minmaxrand(97, 122);
2032 /* ident characters - with numbers*/
2033 } else if (ty == 2) {
2034 ty = trojanscan_minmaxrand(97, 125);
2035 if (ty > 122) return trojanscan_minmaxrand(48, 57);
2036 return ty;
2037 /* nick characters - with and without numbers*/
2038 } else if (ty == 3 || ty == 4) {
2039 if (!(trojanscan_minmaxrand(0, 59) % 16)) {
2040 char weirdos[6] = { '\\', '|', '[', '{', ']', '}' };
2041 return weirdos[trojanscan_minmaxrand(0, 5)];
2042 }
2043 if (ty == 4) {
2044 ty = trojanscan_minmaxrand(65, 93);
2045 if (ty > 90) return trojanscan_minmaxrand(48, 57);
2046 } else {
2047 ty = trojanscan_minmaxrand(65, 90);
2048 }
2049 if (!(trojanscan_minmaxrand(0, 40) % 8)) return ty;
2050 return ty + 32;
2051 /* moron check */
2052 } else {
2053 return ' ';
2054 }
2055 }
2056
2057 void trojanscan_gennick(char *ptc, char size) {
2058 int i;
2059 for (i=0;i<size;i++) {
2060 if (i == 0) {
2061 ptc[i] = trojanscan_genchar(3);
2062 } else {
2063 ptc[i] = trojanscan_genchar(4);
2064 }
2065 }
2066 ptc[i] = '\0';
2067 }
2068
2069 void trojanscan_genident(char *ptc, char size) {
2070 int i;
2071 for (i=0;i<size;i++) {
2072 if (i == 0) {
2073 ptc[i] = trojanscan_genchar(1);
2074 } else {
2075 ptc[i] = trojanscan_genchar(2);
2076 }
2077 }
2078 ptc[i] = '\0';
2079 }
2080
2081 void trojanscan_genhost(char *ptc, char size, long *fakeip) {
2082 int dots = trojanscan_minmaxrand(2, 5), i, dotexist = 0, cur;
2083
2084 while (!dotexist) {
2085 for (i=0;i<size;i++) {
2086 ptc[i] = trojanscan_genchar(0);
2087 if ((i > 5) && (i < (size-4))) {
2088 if ((ptc[i-1] != '.') && (ptc[i-1] != '-')) {
2089 cur = trojanscan_minmaxrand(1,size / dots);
2090 if (cur < 3) {
2091 if (cur == 1) {
2092 ptc[i] = '.';
2093 dotexist = 1;
2094 } else {
2095 ptc[i] = '-';
2096 }
2097 }
2098 }
2099 }
2100 }
2101 }
2102 ptc[i] = '\0';
2103
2104 *fakeip = (trojanscan_minmaxrand(0, 65535) << 16) | trojanscan_minmaxrand(0, 65535);
2105 }
2106
2107 void trojanscan_genreal(char *ptc, char size) {
2108 int spaces = trojanscan_minmaxrand(2, 4), i;
2109 for (i=0;i<size;i++) {
2110 ptc[i] = trojanscan_genchar(0);
2111 if ((i > 5) && (i < (size-4))) {
2112 if (ptc[i-1] != ' ') {
2113 if (trojanscan_minmaxrand(1,size / spaces) == 1) ptc[i] = ' ';
2114 }
2115 }
2116 }
2117 ptc[i] = '\0';
2118 }
2119
2120 int trojanscan_is_not_octet(char *begin, int length) {
2121 int i;
2122 if(length > 3)
2123 return 0;
2124 for(i=0;i<length;i++) {
2125 if (!((*begin >= '0') && (*begin <= '9')))
2126 return 0;
2127 begin++;
2128 }
2129 return 1;
2130 }
2131
2132 int trojanscan_generatepool(void) {
2133 int i, k = 0, j = 0, loops = 0;
2134 char *p, *pp;
2135 nick *np;
2136
2137 for (i=0;i<NICKHASHSIZE;i++)
2138 for (np=nicktable[i];np;np=np->next)
2139 j++;
2140
2141 if(j < trojanscan_min_hosts)
2142 return 0;
2143
2144 if(TROJANSCAN_HOST_MODE == TROJANSCAN_STEAL_HOST)
2145 return TROJANSCAN_MINPOOLSIZE;
2146
2147 i = 0;
2148 do {
2149 for (j=trojanscan_minmaxrand(0, NICKHASHSIZE-1);j<NICKHASHSIZE;j++) {
2150 if (nicktable[j]) {
2151 for(p=nicktable[j]->host->name->content, pp=p;*p;) {
2152 if (*++p == '.') {
2153 if (!trojanscan_is_not_octet(pp, p-pp)) {
2154 if (i < TROJANSCAN_POOLSIZE) {
2155 if (i < trojanscan_hostpoolsize)
2156 freesstring(trojanscan_hostpool[i]);
2157 trojanscan_hostpool[i] = getsstring(pp, p-pp);
2158 i++;
2159 } else {
2160 if (k >= TROJANSCAN_POOLSIZE)
2161 break;
2162 }
2163 }
2164 pp=++p;
2165 }
2166 }
2167 if (!trojanscan_is_not_octet(pp, p-pp)) {
2168 if (k < TROJANSCAN_POOLSIZE) {
2169 if (k < trojanscan_tailpoolsize)
2170 freesstring(trojanscan_tailpool[k]);
2171 trojanscan_tailpool[k] = getsstring(pp, p-pp);
2172 k++;
2173 } else {
2174 if (i >= TROJANSCAN_POOLSIZE)
2175 break;
2176 }
2177 }
2178 }
2179 }
2180 loops++;
2181 } while ((loops < 5) && ((i < TROJANSCAN_POOLSIZE) || (k < TROJANSCAN_POOLSIZE)));
2182
2183 trojanscan_hostpoolsize = i;
2184 trojanscan_tailpoolsize = k;
2185 return i;
2186 }
2187
2188 nick *trojanscan_selectuser(void) {
2189 int target = trojanscan_minmaxrand(0, 500), loops = 150, j;
2190 nick *np;
2191 do {
2192 for (j=trojanscan_minmaxrand(0, NICKHASHSIZE-1);j<NICKHASHSIZE;j++)
2193 for(np=nicktable[j];np;np=np->next)
2194 if (!--target)
2195 return np;
2196 } while(--loops > 0);
2197 return NULL;
2198 }
2199
2200 host *trojanscan_selecthost(void) {
2201 int target = trojanscan_minmaxrand(0, 500), loops = 150, j;
2202 host *hp;
2203 do {
2204 for (j=trojanscan_minmaxrand(0, HOSTHASHSIZE-1);j<HOSTHASHSIZE;j++)
2205 for(hp=hosttable[j];hp;hp=hp->next)
2206 if (!--target)
2207 return hp;
2208 } while(--loops > 0);
2209
2210 return NULL;
2211 }
2212
2213 void trojanscan_generatehost(char *buf, int maxsize, long *fakeip) {
2214 if(TROJANSCAN_HOST_MODE == TROJANSCAN_STEAL_HOST) {
2215 host *hp;
2216 int loops = 20;
2217
2218 buf[0] = '\0';
2219
2220 do {
2221 hp = trojanscan_selecthost();
2222 if(hp && (hp->clonecount <= TROJANSCAN_MAX_CLONE_COUNT) && !trojanscan_isip(hp->name->content)) {
2223 strlcpy(buf, hp->name->content, maxsize + 1);
2224 if(hp->nicks) {
2225 *fakeip = hp->nicks->ipaddress;
2226 } else {
2227 *fakeip = (trojanscan_minmaxrand(0, 65535) << 16) | trojanscan_minmaxrand(0, 65535);
2228 }
2229 break;
2230 }
2231 } while(--loops > 0);
2232 } else {
2233 char *cpos;
2234 int pieces = trojanscan_minmaxrand(2, 4), totallen = 0, a = 0, i;
2235 int *choices = malloc(sizeof(int) * (pieces + 1));
2236 int *lengths = malloc(sizeof(int) * (pieces + 1));
2237
2238 choices[pieces] = trojanscan_minmaxrand(0, trojanscan_tailpoolsize-1);
2239 lengths[pieces] = strlen(trojanscan_tailpool[choices[pieces]]->content) + 1;
2240 totallen += lengths[pieces];
2241
2242 for (i=0;i<pieces;i++) {
2243 choices[i] = trojanscan_minmaxrand(0, trojanscan_hostpoolsize-1);
2244 lengths[i] = strlen(trojanscan_hostpool[choices[i]]->content) + 1;
2245 if (totallen+lengths[i] > maxsize) {
2246 choices[i] = choices[pieces];
2247 lengths[i] = lengths[pieces];
2248 pieces-=(pieces-i);
2249 break;
2250 }
2251 totallen += lengths[i];
2252 }
2253
2254 for (i=0;i<pieces;i++) {
2255 for (cpos=trojanscan_hostpool[choices[i]]->content; *cpos;)
2256 buf[a++] = *cpos++;
2257 buf[a++] = '.';
2258 }
2259
2260 for (cpos=trojanscan_tailpool[choices[i]]->content; *cpos;) {
2261 buf[a++] = *cpos++;
2262 }
2263
2264 buf[a] = '\0';
2265 free(choices);
2266 free(lengths);
2267
2268 *fakeip = (trojanscan_minmaxrand(0, 65535) << 16) | trojanscan_minmaxrand(0, 65535);
2269 }
2270 }
2271
2272 void trojanscan_generatenick(char *buf, int maxsize) {
2273 int bits = trojanscan_minmaxrand(2, 3), loops = 0, wanttocopy, len = 0, i, d = 0, newmaxsize = maxsize - trojanscan_minmaxrand(0, 7);
2274 nick *np;
2275
2276 if(newmaxsize > 2)
2277 maxsize = newmaxsize;
2278
2279 do {
2280 np = trojanscan_selectuser();
2281 if(np) {
2282 wanttocopy = trojanscan_minmaxrand(1, (strlen(np->nick) / 2) + 3);
2283 for(i=0;((i<wanttocopy) && (len<maxsize));i++)
2284 buf[len++] = np->nick[i];
2285 if(++d > bits) {
2286 buf[len] = '\0';
2287 return;
2288 }
2289 }
2290 } while (++loops < 10);
2291 buf[0] = '\0';
2292 }
2293
2294 void trojanscan_generateident(char *buf, int maxsize) {
2295 nick *np = trojanscan_selectuser();
2296 buf[0] = '\0';
2297 if(np)
2298 strlcpy(buf, np->ident, maxsize + 1);
2299 }
2300
2301 void trojanscan_generaterealname(char *buf, int maxsize) {
2302 nick *np = trojanscan_selectuser();
2303 buf[0] = '\0';
2304 if(np)
2305 strlcpy(buf, np->realname->name->content, maxsize + 1);
2306 }
2307
2308 void trojanscan_database_close(void) {
2309 mysql_close(&trojanscan_sql);
2310 }
2311
2312 int trojanscan_database_connect(char *dbhost, char *dbuser, char *dbpass, char *db, unsigned int port) {
2313 mysql_init(&trojanscan_sql);
2314 if (!mysql_real_connect(&trojanscan_sql, dbhost, dbuser, dbpass, db, port, NULL, 0))
2315 return -1;
2316 return 0;
2317 }
2318
2319 void trojanscan_database_escape_string(char *dest, char *source, size_t length) {
2320 mysql_escape_string(dest, source, length);
2321 }
2322
2323 int trojanscan_database_query(char *format, ...) {
2324 char trojanscan_sqlquery[TROJANSCAN_QUERY_BUF_SIZE];
2325 va_list va;
2326
2327 va_start(va, format);
2328 vsnprintf(trojanscan_sqlquery, sizeof(trojanscan_sqlquery) - 1, format, va);
2329 va_end(va);
2330 return mysql_query(&trojanscan_sql, trojanscan_sqlquery);
2331 }
2332
2333 int trojanscan_database_num_rows(trojanscan_database_res *res) {
2334 return mysql_num_rows(res);
2335 }
2336
2337 trojanscan_database_res *trojanscan_database_store_result() {
2338 return mysql_store_result(&trojanscan_sql);
2339 }
2340
2341 trojanscan_database_row trojanscan_database_fetch_row(trojanscan_database_res *res) {
2342 return mysql_fetch_row(res);
2343 }
2344
2345 void trojanscan_database_free_result(trojanscan_database_res *res) {
2346 mysql_free_result(res);
2347 }
2348
2349 int trojanscan_isip(char *host) {
2350 char *p = host, components = 0, length = 0;
2351
2352 for(;*p;p++) {
2353 if(*p == '.') {
2354 if(((!length) || (length = 0)) || (++components > 3))
2355 return 0;
2356 } else {
2357 if ((++length > 3) || !isdigit(*p))
2358 return 0;
2359 }
2360 }
2361 return components == 3;
2362 }
2363