]> jfr.im git - irc/quakenet/newserv.git/blob - trojanscan/trojanscan.c
69679a3fc01e56ecf29723e1b3214e36b0f5bc95
[irc/quakenet/newserv.git] / trojanscan / trojanscan.c
1 /*
2 * Trojanscan version 2
3 *
4 * Trojanscan copyright (C) Chris Porter 2002-2005
5 * Newserv bits copyright (C) David Mansell 2002-2003
6 *
7 * TODO: CHECK::
8 * - Poke splidge about +r'ing bots, potential problems:
9 * - users might whine about T clone stealing account
10 * - would have to steal one already in use, so if trojans start using /msg q whois they'll see
11 * (though they have to be authed for this, they could use a clone of their own however)
12 */
13
14 #include "trojanscan.h"
15 #include "../lib/strlfunc.h"
16 #include "../lib/version.h"
17
18 MODULE_VERSION(TROJANSCAN_VERSION " / $Id: trojanscan.c 694 2006-06-06 19:55:40Z newserv $")
19
20 void _init() {
21 trojanscan_cmds = newcommandtree();
22
23 addcommandtotree(trojanscan_cmds, "showcommands", TROJANSCAN_ACL_UNAUTHED, 0, &trojanscan_showcommands);
24 addcommandtotree(trojanscan_cmds, "help", TROJANSCAN_ACL_UNAUTHED, 1, &trojanscan_help);
25 addcommandtotree(trojanscan_cmds, "hello", TROJANSCAN_ACL_UNAUTHED | TROJANSCAN_ACL_OPER, 1, &trojanscan_hello);
26
27 addcommandtotree(trojanscan_cmds, "join", TROJANSCAN_ACL_STAFF, 1, &trojanscan_userjoin);
28 addcommandtotree(trojanscan_cmds, "chanlist", TROJANSCAN_ACL_STAFF, 0, &trojanscan_chanlist);
29 addcommandtotree(trojanscan_cmds, "whois", TROJANSCAN_ACL_STAFF, 1, &trojanscan_whois);
30
31 addcommandtotree(trojanscan_cmds, "changelev", TROJANSCAN_ACL_STAFF | TROJANSCAN_ACL_OPER, 2, &trojanscan_changelev);
32 addcommandtotree(trojanscan_cmds, "deluser", TROJANSCAN_ACL_TEAMLEADER | TROJANSCAN_ACL_OPER, 2, &trojanscan_deluser);
33 addcommandtotree(trojanscan_cmds, "mew", TROJANSCAN_ACL_STAFF, 2, &trojanscan_mew);
34 addcommandtotree(trojanscan_cmds, "status", TROJANSCAN_ACL_STAFF | TROJANSCAN_ACL_OPER, 0, &trojanscan_status);
35 addcommandtotree(trojanscan_cmds, "listusers", TROJANSCAN_ACL_TEAMLEADER, 0, &trojanscan_listusers);
36
37 addcommandtotree(trojanscan_cmds, "rehash", TROJANSCAN_ACL_WEBSITE, 0, &trojanscan_rehash);
38
39 addcommandtotree(trojanscan_cmds, "cat", TROJANSCAN_ACL_OPER, 1, &trojanscan_cat);
40
41 addcommandtotree(trojanscan_cmds, "reschedule", TROJANSCAN_ACL_DEVELOPER | TROJANSCAN_ACL_OPER, 0, &trojanscan_reschedule);
42
43 srand((int)time(NULL));
44
45 trojanscan_connect_schedule = scheduleoneshot(time(NULL) + 1, &trojanscan_connect, NULL);
46 }
47
48 void _fini(void) {
49 int i;
50 struct trojanscan_realchannels *rp = trojanscan_realchanlist, *oldrp;
51 struct trojanscan_rejoinlist *rj = trojanscan_schedulerejoins, *oldrj;
52
53 if (trojanscan_nick)
54 deregisterlocaluser(trojanscan_nick, NULL);
55
56 if (trojanscan_connect_schedule)
57 deleteschedule(trojanscan_connect_schedule, &trojanscan_connect, NULL);
58
59 if(trojanscan_schedule)
60 deleteschedule(trojanscan_schedule, &trojanscan_dojoin, NULL);
61
62 if(trojanscan_poolschedule)
63 deleteschedule(trojanscan_poolschedule, &trojanscan_repool, NULL);
64
65 if(trojanscan_cloneschedule)
66 deleteschedule(trojanscan_poolschedule, &trojanscan_registerclones, NULL);
67
68 while(rp) {
69 deleteschedule(rp->schedule, &trojanscan_dopart, (void *)rp);
70 oldrp = rp;
71 rp = rp->next;
72 free(oldrp);
73 }
74
75 while(rj) {
76 deleteschedule(rj->schedule, &trojanscan_rejoin_channel, (void *)rj);
77 freesstring(rj->channel);
78 oldrj = rj;
79 rj = rj->next;
80 free(oldrj);
81 }
82
83 if(trojanscan_initialschedule)
84 deleteschedule(trojanscan_initialschedule, &trojanscan_fill_channels, NULL);
85
86 deleteschedule(trojanscan_rehashschedule, &trojanscan_rehash_schedule, NULL);
87
88 for (i=0;i<TROJANSCAN_CLONE_TOTAL;i++)
89 if(trojanscan_swarm[i].clone) {
90 deregisterlocaluser(trojanscan_swarm[i].clone, NULL);
91 trojanscan_swarm[i].clone = NULL;
92 }
93 trojanscan_free_database();
94 trojanscan_free_channels();
95
96 for (i=0;i<trojanscan_hostpoolsize;i++)
97 freesstring(trojanscan_hostpool[i]);
98
99 for (i=0;i<trojanscan_tailpoolsize;i++)
100 freesstring(trojanscan_tailpool[i]);
101 trojanscan_database_close();
102 }
103
104 void trojanscan_connect(void *arg) {
105 sstring *mnick, *myident, *myhost, *myrealname, *myauthname;
106 sstring *dbhost, *dbuser, *dbpass, *db, *dbport, *temp;
107 channel *cp;
108 int length, i;
109 char buf[10];
110
111 trojanscan_connect_schedule = NULL;
112
113 for(i=0;i<TROJANSCAN_CLONE_TOTAL;i++)
114 trojanscan_swarm[i].index = i; /* sure this could be done with pointer arithmetic... */
115
116 trojanscan_hostpoolsize = 0;
117 trojanscan_tailpoolsize = 0;
118 trojanscan_hostmode = 0;
119 trojanscan_poolschedule = NULL;
120 trojanscan_cloneschedule = NULL;
121 trojanscan_realchanlist = NULL;
122 trojanscan_database.glines = 0;
123 trojanscan_database.detections = 0;
124
125 mnick = getcopyconfigitem("trojanscan", "nick", "T", NICKLEN);
126 myident = getcopyconfigitem("trojanscan", "ident", "trojanscan", NICKLEN);
127 myhost = getcopyconfigitem("trojanscan", "hostname", "trojanscan.slug.netsplit.net", HOSTLEN);
128 myrealname = getcopyconfigitem("trojanscan", "realname", "Trojanscan v" TROJANSCAN_VERSION, REALLEN);
129 myauthname = getcopyconfigitem("trojanscan", "authname", "T", ACCOUNTLEN);
130
131 dbhost = getcopyconfigitem("trojanscan", "dbhost", "localhost", HOSTLEN);
132 dbuser = getcopyconfigitem("trojanscan", "dbuser", "", NICKLEN);
133 dbpass = getcopyconfigitem("trojanscan", "dbpass", "", REALLEN);
134 db = getcopyconfigitem("trojanscan", "db", "", NICKLEN);
135
136 dbport = getcopyconfigitem("trojanscan", "dbport", "3306", ACCOUNTLEN);
137
138 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_MAXCHANS);
139 temp = getcopyconfigitem("trojanscan", "maxchans", buf, length);
140
141 trojanscan_maxchans = atoi(temp->content);
142 freesstring(temp);
143
144 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_CYCLETIME);
145 temp = getcopyconfigitem("trojanscan", "cycletime", buf, length);
146
147 trojanscan_cycletime = atoi(temp->content);
148 freesstring(temp);
149
150 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_PARTTIME);
151 temp = getcopyconfigitem("trojanscan", "parttime", buf, length);
152 trojanscan_part_time = atoi(temp->content);
153 freesstring(temp);
154
155 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_MAXUSERS);
156 temp = getcopyconfigitem("trojanscan", "maxusers", buf, length);
157 trojanscan_maxusers = atoi(temp->content);
158 freesstring(temp);
159
160 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_MINIMUM_HOSTS_BEFORE_POOL);
161 temp = getcopyconfigitem("trojanscan", "minpoolhosts", buf, length);
162 trojanscan_min_hosts = atoi(temp->content);
163 freesstring(temp);
164
165 if ((trojanscan_cycletime / trojanscan_maxchans) < 1) {
166 Error("trojanscan", ERR_FATAL, "Cycletime / maxchans < 1, increase cycletime or decrease maxchans else cycling breaks.");
167 return; /* PPA: module failed to load */
168 }
169
170 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_MINIMUM_CHANNEL_SIZE);
171 temp = getcopyconfigitem("trojanscan", "minchansize", buf, length);
172 trojanscan_minchansize = atoi(temp->content);
173 freesstring(temp);
174
175 trojanscan_nick = registerlocaluser(mnick->content, myident->content, myhost->content, myrealname->content, myauthname->content, UMODE_SERVICE | UMODE_DEAF |
176 UMODE_OPER | UMODE_INV |
177 UMODE_ACCOUNT,
178 &trojanscan_handlemessages);
179
180 if (trojanscan_database_connect(dbhost->content, dbuser->content, dbpass->content, db->content, atoi(dbport->content)) < 0) {
181 Error("trojanscan", ERR_FATAL, "Cannot connect to database host!");
182 return; /* PPA: module failed to load */
183 }
184
185 trojanscan_database_query("CREATE TABLE phrases (id INT(10) PRIMARY KEY AUTO_INCREMENT, wormid INT(10) NOT NULL, phrase TEXT NOT NULL, priority INT(10) DEFAULT 0 NOT NULL, dateadded int(10), disabled BOOL DEFAULT 0 NOT NULL)");
186 trojanscan_database_query("CREATE TABLE worms (id INT(10) PRIMARY KEY AUTO_INCREMENT, wormname TEXT NOT NULL, glinetype INT DEFAULT 0, data text, hitmsgs BOOL DEFAULT 1, hitchans BOOL DEFAULT 0, epidemic BOOL DEFAULT 0, privinfo text)");
187 trojanscan_database_query("CREATE TABLE logs (id INT(10) PRIMARY KEY AUTO_INCREMENT, userid INT(10) NOT NULL, act TEXT NOT NULL, description TEXT NOT NULL, ts TIMESTAMP)");
188 trojanscan_database_query("CREATE TABLE channels (id INT(10) PRIMARY KEY AUTO_INCREMENT, channel VARCHAR(%d) NOT NULL, exempt BOOL DEFAULT 0)", CHANNELLEN);
189 trojanscan_database_query("CREATE TABLE users (id INT(10) PRIMARY KEY AUTO_INCREMENT, authname VARCHAR(%d) NOT NULL, authlevel TINYINT(4) NOT NULL)", ACCOUNTLEN);
190 trojanscan_database_query("CREATE TABLE hits (id INT(10) PRIMARY KEY AUTO_INCREMENT, nickname VARCHAR(%d) NOT NULL, ident VARCHAR(%d) NOT NULL, host VARCHAR(%d) NOT NULL, phrase INT(10) NOT NULL, ts TIMESTAMP, messagetype VARCHAR(1) NOT NULL DEFAULT 'm', glined BOOL DEFAULT 1)", NICKLEN, USERLEN, HOSTLEN);
191 trojanscan_database_query("CREATE TABLE settings (id INT(10) PRIMARY KEY AUTO_INCREMENT, setting VARCHAR(15) NOT NULL, value VARCHAR(15) NOT NULL)");
192 trojanscan_database_query("CREATE TABLE wwwlogs (id INT(10) PRIMARY KEY AUTO_INCREMENT, authid INT(10) NOT NULL, ip VARCHAR(15), action TEXT, ts TIMESTAMP)");
193 trojanscan_database_query("CREATE TABLE unknownlog (id INT(10) PRIMARY KEY AUTO_INCREMENT, data TEXT, user VARCHAR(%d) NOT NULL, ts TIMESTAMP)", NICKLEN+USERLEN+HOSTLEN+3);
194
195 trojanscan_database_query("DELETE FROM settings");
196 trojanscan_database_query("INSERT INTO settings (setting, value) VALUES ('rehash','0')");
197 trojanscan_database_query("INSERT INTO settings (setting, value) VALUES ('changed','0')");
198
199 trojanscan_read_database(1);
200
201 cp = findchannel(TROJANSCAN_OPERCHANNEL);
202 if (!cp) {
203 localcreatechannel(trojanscan_nick, TROJANSCAN_OPERCHANNEL);
204 } else {
205 if(!localjoinchannel(trojanscan_nick, cp))
206 localgetops(trojanscan_nick, cp);
207 }
208
209 cp = findchannel(TROJANSCAN_CHANNEL);
210 if (!cp) {
211 localcreatechannel(trojanscan_nick, TROJANSCAN_CHANNEL);
212 } else {
213 if(!localjoinchannel(trojanscan_nick, cp))
214 localgetops(trojanscan_nick, cp);
215 }
216
217 cp = findchannel(TROJANSCAN_PEONCHANNEL);
218 if (!cp) {
219 localcreatechannel(trojanscan_nick, TROJANSCAN_PEONCHANNEL);
220 } else {
221 if(!localjoinchannel(trojanscan_nick, cp))
222 localgetops(trojanscan_nick, cp);
223 }
224
225 freesstring(mnick);
226 freesstring(myident);
227 freesstring(myhost);
228 freesstring(myrealname);
229 freesstring(myauthname);
230 freesstring(dbhost);
231 freesstring(dbuser);
232 freesstring(dbpass);
233 freesstring(db);
234 freesstring(dbport);
235 trojanscan_registerclones(NULL);
236
237 trojanscan_rehashschedule = scheduleoneshot(time(NULL) + 60, &trojanscan_rehash_schedule, NULL);
238
239 }
240
241 void trojanscan_rehash_schedule(void *arg) {
242 trojanscan_rehashschedule = scheduleoneshot(time(NULL) + 60, &trojanscan_rehash_schedule, NULL);
243 if (!(trojanscan_database_query("SELECT value FROM settings WHERE setting = 'rehash'"))) {
244 trojanscan_database_res *res;
245 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
246 if (trojanscan_database_num_rows(res) > 0) {
247 trojanscan_database_row sqlrow = trojanscan_database_fetch_row(res);
248 if (sqlrow && (sqlrow[0][0] == '1')) {
249 trojanscan_mainchanmsg("n: rehash initiated by website. . .");
250 trojanscan_read_database(0);
251 }
252 }
253 trojanscan_database_free_result(res);
254 }
255 }
256
257 }
258
259 void trojanscan_free_database(void) {
260 int i;
261 for(i=0;i<trojanscan_database.total_channels;i++)
262 freesstring(trojanscan_database.channels[i].name);
263 free(trojanscan_database.channels);
264 for(i=0;i<trojanscan_database.total_phrases;i++) {
265 if (trojanscan_database.phrases[i].phrase)
266 pcre_free(trojanscan_database.phrases[i].phrase);
267 if (trojanscan_database.phrases[i].hint)
268 pcre_free(trojanscan_database.phrases[i].hint);
269 }
270 free(trojanscan_database.phrases);
271 for(i=0;i<trojanscan_database.total_worms;i++)
272 freesstring(trojanscan_database.worms[i].name);
273 free(trojanscan_database.worms);
274 trojanscan_database.total_channels = 0;
275 trojanscan_database.total_phrases = 0;
276 trojanscan_database.total_worms = 0;
277
278 }
279
280 sstring *trojanscan_getsstring(char *string, int length) {
281 int i;
282
283 for(i=0;i<length;i++) {
284 if ((string[i] == '\r') || (string[i] == '\n')) {
285 Error("trojanscan", ERR_WARNING, "Error reading %s at position %d, set to ERROR!", string, i+1);
286 return getsstring("ERROR", sizeof("ERROR"));
287 }
288 }
289
290 return getsstring(string, length);
291 }
292
293 int trojanscan_strip_codes(char *buf, size_t max, char *original) {
294 int i, j, length = TROJANSCAN_MMIN(strlen(original), max-1);
295 char *p2 = original, *p3, flag = 0;
296 p3 = buf;
297 for(i=0;i<length+1;i++) {
298 switch (*p2) {
299 case '\002':
300 case '\017':
301 case '\026':
302 case '\037':
303 break;
304 case '\003':
305 for(j=0;j<6;j++) {
306 if ((i + 1) > length)
307 break;
308 if ((j == 4) && flag)
309 break;
310 p2++;
311 i++;
312 if ((j == 0) && (!((*p2 >= '0') && (*p2 <= '9'))))
313 break;
314 if (j == 1) {
315
316 if (*p2 == ',') {
317 if ((i + 1) > length)
318 break;
319 if (!((*(p2 + 1) >= '0') && (*(p2 + 1) <= '9')))
320 break;
321 flag = 1;
322 } else if ((*p2 >= '0') && (*p2 <= '9')) {
323 flag = 0;
324 } else {
325 break;
326 }
327 }
328 if (j == 2) {
329 if (flag) {
330 if (!((*p2 >= '0') && (*p2 <= '9')))
331 break;
332 } else {
333 if (*p2 != ',') {
334 break;
335 } else {
336 if ((i + 1) > length)
337 break;
338 if (!((*(p2 + 1) >= '0') && (*(p2 + 1) <= '9')))
339 break;
340 }
341 }
342 }
343 if ((j == 3) && (!((*p2 >= '0') && (*p2 <= '9'))))
344 break;
345 if ((j == 4) && (!((*p2 >= '0') && (*p2 <= '9'))))
346 break;
347 }
348 p2--;
349 i--;
350 break;
351
352 default:
353 *p3 = *p2;
354 p3++;
355 break;
356 }
357 p2++;
358 }
359 return p3 - buf;
360 }
361
362 struct trojanscan_worms *trojanscan_find_worm_by_id(int id) {
363 int i;
364 for(i=0;i<trojanscan_database.total_worms;i++)
365 if ((trojanscan_database.worms[i].id == id))
366 return &trojanscan_database.worms[i];
367 return NULL;
368 }
369
370 void trojanscan_read_database(int first_time) {
371 const char *error;
372 int erroroffset, i, tempresult;
373
374 trojanscan_database_res *res;
375 trojanscan_database_row sqlrow;
376
377 if (!first_time) {
378 trojanscan_free_database();
379 } else {
380 trojanscan_database.total_channels = 0;
381 trojanscan_database.total_phrases = 0;
382 trojanscan_database.total_worms = 0;
383 }
384
385 if (!(trojanscan_database_query("SELECT channel, exempt FROM channels"))) {
386 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
387 trojanscan_database.total_channels = trojanscan_database_num_rows(res);
388 if (trojanscan_database.total_channels > 0) {
389 if ((trojanscan_database.channels = (trojanscan_channels *)malloc(sizeof(trojanscan_channels) * trojanscan_database.total_channels))) {
390 if ((trojanscan_database.total_channels>0) && trojanscan_database.channels) {
391 i = 0;
392 while((sqlrow = trojanscan_database_fetch_row(res))) {
393 trojanscan_database.channels[i].name = trojanscan_getsstring(sqlrow[0], strlen(sqlrow[0]));
394 trojanscan_database.channels[i].exempt = (sqlrow[1][0] == '1');
395 i++;
396 }
397 }
398 }
399 }
400 trojanscan_database_free_result(res);
401 }
402 }
403
404 if (!(trojanscan_database_query("SELECT id, wormname, glinetype, length(data), hitmsgs, hitchans, epidemic FROM worms"))) {
405 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
406 trojanscan_database.total_worms = trojanscan_database_num_rows(res);
407 if (trojanscan_database.total_worms > 0) {
408 if ((trojanscan_database.worms = (trojanscan_worms *)malloc(sizeof(trojanscan_worms) * trojanscan_database.total_worms))) {
409 i = 0;
410 while((sqlrow = trojanscan_database_fetch_row(res))) {
411 trojanscan_database.worms[i].id = atoi(sqlrow[0]);
412 trojanscan_database.worms[i].name = trojanscan_getsstring(sqlrow[1], strlen(sqlrow[1]));
413 tempresult = atoi(sqlrow[2]);
414 trojanscan_database.worms[i].glineuser = (tempresult == 0);
415 trojanscan_database.worms[i].glinehost = (tempresult == 1);
416 trojanscan_database.worms[i].monitor = (tempresult == 2);
417 if(sqlrow[3]) {
418 trojanscan_database.worms[i].datalen = ((atoi(sqlrow[3]) == 0) ? 0 : 1);
419 } else {
420 trojanscan_database.worms[i].datalen = 0;
421 }
422
423 trojanscan_database.worms[i].hitpriv = (atoi(sqlrow[4]) == 1);
424 trojanscan_database.worms[i].hitchans = (atoi(sqlrow[5]) == 1);
425 trojanscan_database.worms[i].epidemic = (atoi(sqlrow[6]) == 1);
426
427 i++;
428 }
429 }
430 }
431 trojanscan_database_free_result(res);
432 }
433 }
434
435 if (!(trojanscan_database_query("SELECT id, phrase, wormid FROM phrases WHERE disabled = 0 ORDER BY priority DESC"))) {
436 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
437 trojanscan_database.total_phrases = trojanscan_database_num_rows(res);
438 if (trojanscan_database.total_phrases > 0) {
439 if ((trojanscan_database.phrases = (trojanscan_phrases *)malloc(sizeof(trojanscan_phrases) * trojanscan_database.total_phrases))) {
440 i = 0;
441 while((sqlrow = trojanscan_database_fetch_row(res))) {
442 trojanscan_database.phrases[i].id = atoi(sqlrow[0]);
443 trojanscan_database.phrases[i].worm = trojanscan_find_worm_by_id(atoi(sqlrow[2]));
444 if (!(trojanscan_database.phrases[i].phrase = pcre_compile(sqlrow[1], PCRE_CASELESS, &error, &erroroffset, NULL))) {
445 Error("trojanscan", ERR_WARNING, "Error compiling expression %s at offset %d: %s", sqlrow[1], erroroffset, error);
446 } else {
447 trojanscan_database.phrases[i].hint = pcre_study(trojanscan_database.phrases[i].phrase, 0, &error);
448 if (error) {
449 Error("trojanscan", ERR_WARNING, "Error studying expression %s: %s", sqlrow[1], error);
450 pcre_free(trojanscan_database.phrases[i].phrase);
451 trojanscan_database.phrases[i].phrase = NULL;
452 }
453 }
454 i++;
455 }
456 }
457 }
458 trojanscan_database_free_result(res);
459 }
460 }
461
462 trojanscan_database_query("UPDATE settings SET value = '0' where setting = 'rehash'");
463
464 }
465
466 void trojanscan_log(nick *np, char *event, char *details, ...) {
467 int nickid = 0;
468 char eevent[TROJANSCAN_QUERY_TEMP_BUF_SIZE], edetails[TROJANSCAN_QUERY_TEMP_BUF_SIZE], buf[513];
469 va_list va;
470
471 va_start(va, details);
472 vsnprintf(buf, sizeof(buf) - 1, details, va);
473 va_end(va);
474
475 if (np)
476 if (IsAccount(np))
477 nickid = trojanscan_user_id_by_authname(np->authname);
478
479 trojanscan_database_escape_string(eevent, event, strlen(event));
480 trojanscan_database_escape_string(edetails, buf, strlen(buf));
481 trojanscan_database_query("INSERT INTO logs (userid, act, description) VALUES ('%d', '%s', '%s')", nickid, eevent, edetails);
482 }
483
484 void trojanscan_generateclone(void *arg) {
485 int i, loops = 0, modes = UMODE_XOPER | UMODE_INV;
486 char c_nick[NICKLEN+1], c_ident[USERLEN+1], c_host[HOSTLEN+1], c_real[REALLEN+1];
487 long fakeip;
488
489 i = (int)arg;
490
491 /* PPA: unlikely to be infinite */
492 do {
493 c_nick[0] = '\0';
494 if (!loops && trojanscan_hostmode) /* only have one go at this */
495 trojanscan_generatenick(c_nick, NICKLEN);
496 if(!c_nick[0])
497 trojanscan_gennick(c_nick, trojanscan_minmaxrand(7, TROJANSCAN_MMIN(13, NICKLEN)));
498 loops++;
499 } while ((getnickbynick(c_nick) != NULL));
500
501 trojanscan_generateident(c_ident, USERLEN);
502 if(!c_ident[0])
503 trojanscan_genident(c_ident, trojanscan_minmaxrand(4, TROJANSCAN_MMIN(8, USERLEN)));
504
505 if(trojanscan_hostmode) {
506 trojanscan_generatehost(c_host, HOSTLEN, &fakeip);
507 if(!c_host[0])
508 trojanscan_genhost(c_host, HOSTLEN, &fakeip);
509 } else {
510 trojanscan_genhost(c_host, HOSTLEN, &fakeip);
511 }
512
513 trojanscan_generaterealname(c_real, REALLEN);
514 if(!c_real[0])
515 trojanscan_genreal(c_real, trojanscan_minmaxrand(15, TROJANSCAN_MMIN(50, REALLEN)));
516
517 trojanscan_swarm[i].clone = registerlocaluser(c_nick, c_ident, c_host, c_real, NULL, modes, &trojanscan_clonehandlemessages);
518 trojanscan_swarm[i].fakeip = fakeip;
519
520 if(trojanscan_swarm[i].clone && !trojanscan_swarm_created) {
521 nick *np = trojanscan_selectuser();
522 if(np) /* select a 'random' sign on time for whois generation */
523 trojanscan_swarm[i].clone->timestamp = np->timestamp;
524 }
525 trojanscan_swarm[i].remaining = trojanscan_minmaxrand(5, 100);
526
527 trojanscan_swarm[i].sitting = 0;
528
529 }
530
531 void trojanscan_free_channels(void) {
532 int i;
533 if(trojanscan_chans) {
534 for(i=0;i<trojanscan_activechans;i++)
535 freesstring(trojanscan_chans[i].channel);
536 free(trojanscan_chans);
537 trojanscan_chans = NULL;
538 trojanscan_activechans = 0;
539 }
540 }
541
542 void trojanscan_repool(void *arg) {
543 if (trojanscan_generatepool() < TROJANSCAN_MINPOOLSIZE) {
544 trojanscan_hostmode = 0;
545 return;
546 } else {
547 trojanscan_hostmode = 1;
548 trojanscan_poolschedule = scheduleoneshot(time(NULL) + TROJANSCAN_POOL_REGENERATION, &trojanscan_repool, NULL);
549 }
550 }
551
552 void trojanscan_registerclones(void *arg) {
553 unsigned int i;
554
555 if (trojanscan_generatepool() < TROJANSCAN_MINPOOLSIZE) {
556 trojanscan_hostmode = 0;
557 trojanscan_cloneschedule = scheduleoneshot(time(NULL) + 10, &trojanscan_registerclones, NULL);
558 return;
559 } else {
560 trojanscan_hostmode = 1;
561 trojanscan_poolschedule = scheduleoneshot(time(NULL) + TROJANSCAN_POOL_REGENERATION, &trojanscan_repool, NULL);
562 trojanscan_cloneschedule = NULL;
563 }
564
565 for (i=0;i<TROJANSCAN_CLONE_TOTAL;i++)
566 trojanscan_generateclone((void *)i);
567 trojanscan_mainchanmsg("n: swarm (%d clones) created.", TROJANSCAN_CLONE_TOTAL);
568 trojanscan_swarm_created = 1;
569
570 trojanscan_initialschedule = scheduleoneshot(time(NULL) + 5, &trojanscan_fill_channels, NULL);
571 }
572
573 int trojanscan_status(void *sender, int cargc, char **cargv) {
574 nick *np = (nick *)sender;
575 trojanscan_log(np, "status", "");
576 trojanscan_reply(np, "Channels in schedule: %d", trojanscan_activechans);
577 trojanscan_reply(np, "Channels in database: %d", trojanscan_database.total_channels);
578 trojanscan_reply(np, "Phrases: %d", trojanscan_database.total_phrases);
579 trojanscan_reply(np, "Worms: %d", trojanscan_database.total_worms);
580 trojanscan_reply(np, "Detections: %d", trojanscan_database.detections);
581 trojanscan_reply(np, "Glines: %d", trojanscan_database.glines);
582 trojanscan_reply(np, "Host/tail pool size: %d", TROJANSCAN_POOLSIZE);
583 trojanscan_reply(np, "Cycletime: %d", trojanscan_cycletime);
584 trojanscan_reply(np, "Clones: %d", TROJANSCAN_CLONE_TOTAL);
585 return CMD_OK;
586 }
587
588 int trojanscan_chanlist(void *sender, int cargc, char **cargv) {
589 int i;
590 nick *np = (nick *)sender;
591 char buf[CHANNELLEN * 2 + 20];
592 trojanscan_reply(np, "Channel list (%d total):", trojanscan_activechans);
593 buf[0] = '\0';
594
595 for(i=0;i<trojanscan_activechans;i++) {
596 if(trojanscan_chans[i].channel->length + 3 > sizeof(buf) - strlen(buf)) {
597 trojanscan_reply(np, "%s", buf);
598 buf[0] = '\0';
599 }
600
601 /* if splidge sees this I'm going to die */
602 strlcat(buf, trojanscan_chans[i].channel->content, sizeof(buf));
603 strlcat(buf, " ", sizeof(buf));
604 }
605 if(buf[0])
606 trojanscan_reply(np, "%s", buf);
607
608 trojanscan_reply(np, "Done.");
609 return CMD_OK;
610 }
611
612 int trojanscan_whois(void *sender, int cargc, char **cargv) {
613 char *tochange;
614 nick *np = (nick *)sender, *np2;
615 int templevel;
616
617 if (cargc < 1) {
618 trojanscan_reply(np, "Not enough parameters.");
619 return CMD_ERROR;
620 }
621
622 if (cargv[0][0] == '#') {
623 tochange = cargv[0] + 1;
624 } else {
625 int i;
626 np2 = getnickbynick(cargv[0]);
627 if (!np2) {
628 trojanscan_reply(np, "That nickname is not on the network.");
629 return CMD_ERROR;
630 }
631 for(i=0;i<TROJANSCAN_CLONE_TOTAL;i++) {
632 if(trojanscan_swarm[i].clone->nick && !ircd_strcmp(trojanscan_swarm[i].clone->nick, np2->nick)) {
633 trojanscan_reply(np, "Nickname : %s", np2->nick);
634 trojanscan_reply(np, "Swarm : yes", trojanscan_swarm[i].clone->nick);
635 return CMD_OK;
636 }
637 }
638 if (!IsAccount(np2)) {
639 trojanscan_reply(np, "User is not authed.");
640 return CMD_OK;
641 }
642 tochange = np2->authname;
643 }
644
645 templevel = trojanscan_user_level_by_authname(tochange);
646 if (templevel == -1) {
647 trojanscan_reply(np, "User does not exist.");
648 } else {
649 union trojanscan_userlevel flags;
650 flags.number = templevel;
651 trojanscan_reply(np, "Authname : %s", tochange);
652 trojanscan_reply(np, "Flags : +" TROJANSCAN_FLAG_MASK, TrojanscanFlagsInfo(flags));
653 }
654
655 return CMD_OK;
656 }
657
658 void trojanscan_privmsg_chan_or_nick(channel *cp, nick *np, char *message, ...) {
659 char buf[513];
660 va_list va;
661
662 if (!trojanscan_nick)
663 return;
664
665 va_start(va, message);
666 vsnprintf(buf, sizeof(buf) - 1, message, va);
667 va_end(va);
668
669 if (cp) {
670 sendmessagetochannel(trojanscan_nick, cp, buf);
671 } else {
672 sendmessagetouser(trojanscan_nick, np, buf);
673 }
674
675 }
676
677 int trojanscan_mew(void *sender, int cargc, char **cargv) {
678 nick *np = (nick *)sender, *np2 = NULL;
679 channel *cp = NULL;
680
681 if (cargc < 2) {
682 trojanscan_reply(np, "Not enough paramaters.");
683 return CMD_ERROR;
684 }
685
686 if(cargv[0][0] == '#') {
687 if (!(cp = findchannel(cargv[0]))) {
688 trojanscan_reply(np, "Channel not found.");
689 return CMD_ERROR;
690 }
691 trojanscan_log(np, "mew", "%s %s", cp->index->name->content, cargv[1]);
692 } else {
693 if (!(np2 = getnickbynick(cargv[0]))) {
694 trojanscan_reply(np, "Nickname is not present on the network.");
695 return CMD_ERROR;
696 }
697 trojanscan_log(np, "mew", "%s %s", np2->nick, cargv[1]);
698 }
699
700 trojanscan_privmsg_chan_or_nick(cp, np2, "\001ACTION mews hopefully at %s\001", cargv[1]);
701
702 if (cp) {
703 trojanscan_reply(np, "Mewed at %s in %s.", cargv[1], cp->index->name->content);
704 } else {
705 trojanscan_reply(np, "Mewed at %s at %s.", cargv[1], np2->nick);
706 }
707
708 if(!IsOper(np))
709 trojanscan_mainchanmsg("n: mew: %s %s (%s/%s)", cargv[1], cp?cp->index->name->content:np2->nick, np->nick, np->authname);
710
711 return CMD_OK;
712 }
713
714 int trojanscan_cat(void *sender, int cargc, char **cargv) {
715 nick *np = (nick *)sender, *np2 = NULL;
716 channel *cp = NULL;
717 FILE *cat;
718 char buf[513], *p;
719
720 if (cargc < 1) {
721 trojanscan_reply(np, "Not enough paramaters.");
722 return CMD_ERROR;
723 }
724
725 if(cargv[0][0] == '#') {
726 if (!(cp = findchannel(cargv[0]))) {
727 trojanscan_reply(np, "Channel not found.");
728 return CMD_ERROR;
729 }
730 trojanscan_log(np, "cat", cp->index->name->content);
731 } else {
732 if (!(np2 = getnickbynick(cargv[0]))) {
733 trojanscan_reply(np, "Nickname is not present on the network.");
734 return CMD_ERROR;
735 }
736 trojanscan_log(np, "cat", np2->nick);
737 }
738
739 if ((!(cat = fopen(TROJANSCAN_CAT, "r")))) {
740 trojanscan_reply(np, "Unable to open cat!");
741 return CMD_ERROR;
742 }
743
744 while (fgets(buf, sizeof(buf) - 1, cat)) {
745 if ((p = strchr(buf, '\n'))) {
746 *p = '\0';
747 trojanscan_privmsg_chan_or_nick(cp, np2, "%s", buf);
748 } else if (feof(cat)) {
749 trojanscan_privmsg_chan_or_nick(cp, np2, "%s", buf);
750 }
751 }
752
753 fclose(cat);
754
755 if (cp) {
756 trojanscan_reply(np, "Spammed cat in %s.", cp->index->name->content);
757 } else {
758 trojanscan_reply(np, "Spammed cat at %s.", np2->nick);
759 }
760
761 return CMD_OK;
762 }
763
764 int trojanscan_reschedule(void *sender, int cargc, char **cargv) {
765 nick *np = (nick *)sender;
766 trojanscan_log(np, "reschedule", "");
767 trojanscan_fill_channels(NULL);
768
769 trojanscan_reply(np, "Rescheduled.");
770 return CMD_OK;
771 }
772
773 int trojanscan_listusers(void *sender, int cargc, char **cargv) {
774 nick *np = (nick *)sender;
775
776 trojanscan_log(np, "listusers", "");
777
778 trojanscan_reply(np, "User list:");
779
780 if (!(trojanscan_database_query("SELECT authname, authlevel FROM users ORDER BY authlevel DESC, authname"))) {
781 trojanscan_database_res *res;
782 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
783 if (trojanscan_database_num_rows(res)) {
784 trojanscan_database_row sqlrow;
785 union trojanscan_userlevel flags;
786 while((sqlrow = trojanscan_database_fetch_row(res))) {
787 flags.number = atoi(sqlrow[1]);
788 trojanscan_reply(np, "%s +" TROJANSCAN_FLAG_MASK, sqlrow[0], TrojanscanIsDeveloper(flags) ? "d" : "", TrojanscanIsTeamLeader(flags) ? "t" : "", TrojanscanIsStaff(flags) ? "s" : "", TrojanscanIsWebsite(flags) ? "w" : "", TrojanscanIsCat(flags) ? "c" : "");
789 }
790 }
791 trojanscan_database_free_result(res);
792 }
793 }
794
795 trojanscan_reply(np, "Done.");
796 return CMD_OK;
797 }
798
799 int trojanscan_help(void *sender, int cargc, char **cargv) {
800 nick *np = (nick *)sender;
801
802 if (cargc == 0) {
803 trojanscan_reply(np, "Not enough parameters.");
804 return CMD_ERROR;
805 }
806
807 if (!strcasecmp("help", cargv[0])) {
808 trojanscan_reply(np, "Syntax: help <command name>");
809 trojanscan_reply(np, "Gives help on commands.");
810 } else if (!strcasecmp("status", cargv[0])) {
811 trojanscan_reply(np, "Syntax: status");
812 trojanscan_reply(np, "Gives statistical information about the bot.");
813 } else if (!strcasecmp("join", cargv[0])) {
814 trojanscan_reply(np, "Syntax: join <#channel>");
815 trojanscan_reply(np, "Orders a clone to join supplied channel.");
816 } else if (!strcasecmp("showcommands", cargv[0])) {
817 trojanscan_reply(np, "Syntax: showcommands");
818 trojanscan_reply(np, "Pretty obvious.");
819 } else if (!strcasecmp("hello", cargv[0])) {
820 trojanscan_reply(np, "Syntax: hello ?nickname?");
821 trojanscan_reply(np, "Creates a new user.");
822 } else if (!strcasecmp("rehash", cargv[0])) {
823 trojanscan_reply(np, "Syntax: rehash");
824 trojanscan_reply(np, "Reloads bot database.");
825 } else if (!strcasecmp("changelev", cargv[0])) {
826 trojanscan_reply(np, "Syntax: changelev <nickname or #authname> <flags>");
827 trojanscan_reply(np, "Changes access flags of selected user to supplied input.");
828 trojanscan_reply(np, "+d -> developer");
829 trojanscan_reply(np, "+t -> team leader");
830 trojanscan_reply(np, "+s -> staff");
831 trojanscan_reply(np, "+w -> web management");
832 trojanscan_reply(np, "+c -> cat access");
833 } else if (!strcasecmp("deluser", cargv[0])) {
834 trojanscan_reply(np, "Syntax: deluser <nickname or #authname>");
835 trojanscan_reply(np, "Deletes selected user from my database.");
836 } else if (!strcasecmp("mew", cargv[0])) {
837 trojanscan_reply(np, "Syntax: mew <#channel or nickname> <nickname>");
838 trojanscan_reply(np, "Gracefully mews at target in selected channel or query.");
839 } else if (!strcasecmp("cat", cargv[0])) {
840 trojanscan_reply(np, "Syntax: cat <#channel or nickname>");
841 trojanscan_reply(np, "Shows the almightly cat.");
842 } else if (!strcasecmp("reschedule", cargv[0])) {
843 trojanscan_reply(np, "Syntax: reschedule");
844 trojanscan_reply(np, "Recalculates bots schedule.");
845 } else if (!strcasecmp("chanlist", cargv[0])) {
846 trojanscan_reply(np, "Syntax: chanlist");
847 trojanscan_reply(np, "Displays bots current channel list.");
848 } else if (!strcasecmp("whois", cargv[0])) {
849 trojanscan_reply(np, "Syntax: whois <nickname or #authname>");
850 trojanscan_reply(np, "Displays information on given user.");
851 } else if (!strcasecmp("whois", cargv[0])) {
852 trojanscan_reply(np, "Syntax: listusers <flags>");
853 trojanscan_reply(np, "Displays users with listusersing flags.");
854 } else {
855 trojanscan_reply(np, "Command not found.");
856 return CMD_ERROR;
857 }
858
859 return CMD_OK;
860 }
861
862 int trojanscan_hello(void *sender, int cargc, char **cargv) {
863 nick *np = (nick *)sender, *toadd;
864 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE];
865 int level = 0;
866
867 if (cargc > 0) {
868 toadd = getnickbynick(cargv[0]);
869 if (!toadd) {
870 trojanscan_reply(np, "That nickname is not on the network.");
871 return CMD_ERROR;
872 }
873 if (!IsAccount(toadd)) {
874 trojanscan_reply(np, "That user is not authed with the network.");
875 return CMD_ERROR;
876 }
877 } else {
878 if (!IsAccount(np)) {
879 trojanscan_reply(np, "You are not authed with the network, auth before creating your user.");
880 return CMD_ERROR;
881 }
882 toadd = np;
883 }
884
885 if (trojanscan_user_level_by_authname(toadd->authname)!=-1) {
886 trojanscan_reply(np, "Authname (%s) is already on file.", toadd->authname);
887 return CMD_ERROR;
888 }
889
890 trojanscan_log(np, "hello", toadd->authname);
891
892 if (!(trojanscan_database_query("SELECT id FROM users LIMIT 1"))) {
893 trojanscan_database_res *res;
894 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
895 if (trojanscan_database_num_rows(res) == 0)
896 level = TROJANSCAN_ACL_DEVELOPER | TROJANSCAN_ACL_STAFF | TROJANSCAN_ACL_WEBSITE | TROJANSCAN_ACL_CAT;
897 trojanscan_database_free_result(res);
898 }
899 }
900
901 trojanscan_database_escape_string(eaccount, toadd->authname, strlen(toadd->authname));
902 trojanscan_database_query("INSERT INTO users (authname, authlevel) VALUES ('%s', %d)", eaccount, level);
903 trojanscan_reply(np, "Account added to database, account %s%s.", toadd->authname, level>0?" (first user so developer access)":"");
904
905 return CMD_OK;
906 }
907
908 int trojanscan_user_level_by_authname(char *authname) {
909 int result = -1, sl = strlen(authname);
910 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE];
911
912 trojanscan_database_escape_string(eaccount, authname, sl);
913 if (!(trojanscan_database_query("SELECT authlevel, authname FROM users WHERE authname = '%s'", eaccount))) {
914 trojanscan_database_res *res;
915 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
916 if (trojanscan_database_num_rows(res) > 0) {
917 trojanscan_database_row sqlrow = trojanscan_database_fetch_row(res);
918 result = atoi(sqlrow[0]);
919 strlcpy(authname, sqlrow[1], sl + 1);
920 }
921 trojanscan_database_free_result(res);
922 }
923 }
924 return result;
925 }
926
927 int trojanscan_user_id_by_authname(char *authname) {
928 int result = 0;
929 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE];
930
931 trojanscan_database_escape_string(eaccount, authname, strlen(authname));
932 if (!(trojanscan_database_query("SELECT id FROM users WHERE authname = '%s'", eaccount))) {
933 trojanscan_database_res *res;
934 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
935 if (trojanscan_database_num_rows(res) > 0) {
936 trojanscan_database_row sqlrow = trojanscan_database_fetch_row(res);
937 result = atoi(sqlrow[0]);
938 }
939 trojanscan_database_free_result(res);
940 }
941 }
942 return result;
943 }
944
945 struct trojanscan_clones *trojanscan_selectclone(char type) {
946 struct trojanscan_clones *rc;
947 int randomclone, hits = 0, minlimit, maxlimit;
948
949 if(type == TROJANSCAN_WATCH_CLONES) {
950 minlimit = TROJANSCAN_CLONE_MAX;
951 maxlimit = minlimit + TROJANSCAN_WATCHCLONE_MAX - 1;
952 } else {
953 minlimit = 0;
954 maxlimit = TROJANSCAN_CLONE_MAX - 1;
955 }
956
957 do {
958 randomclone = trojanscan_minmaxrand(minlimit, maxlimit);
959 if (hits++ > 200)
960 return NULL;
961 rc = &trojanscan_swarm[randomclone];
962 if ((type == TROJANSCAN_NORMAL_CLONES) && (rc->sitting == 0) && (rc->remaining == 0))
963 break;
964
965 } while (rc->remaining == 0);
966
967 if(type == TROJANSCAN_NORMAL_CLONES) {
968 if ((rc->sitting == 0) && (rc->remaining == 0)) {
969 if ((!rc->remaining) && (!rc->sitting)) {
970 if (rc->clone) {
971 deregisterlocaluser(rc->clone, NULL);
972 rc->clone = NULL;
973 }
974 trojanscan_generateclone((void *)rc->index);
975 }
976 }
977 }
978
979 return rc;
980
981 }
982
983 /* hack hack hack */
984 int trojanscan_nickbanned(trojanscan_clones *np, channel *cp) {
985 int ret;
986 long realip = np->clone->ipaddress;
987
988 np->clone->ipaddress = np->fakeip;
989
990 ret = nickbanned(np->clone, cp);
991
992 np->clone->ipaddress = realip;
993
994 return ret;
995 }
996
997 struct trojanscan_realchannels *trojanscan_allocaterc(char *chan) {
998 struct trojanscan_realchannels *rc;
999 struct trojanscan_clones *clonep;
1000 channel *cp;
1001 int attempts_left = 10;
1002
1003 if (!chan) {
1004 trojanscan_errorcode = 1; /* sorry splidge ;( */
1005 return NULL;
1006 }
1007
1008 if(chan[0] != '#') {
1009 trojanscan_errorcode = 2;
1010 return NULL;
1011 }
1012
1013 if (strlen(chan) > 1) {
1014 if(strrchr(chan, ',')) {
1015 trojanscan_errorcode = 3;
1016 return NULL;
1017 }
1018
1019 if(strrchr(chan, ' ')) {
1020 trojanscan_errorcode = 4;
1021 return NULL;
1022 }
1023 }
1024
1025 cp = findchannel(chan);
1026 if (!cp) {
1027 trojanscan_errorcode = 5;
1028 return NULL;
1029 }
1030
1031 do {
1032 clonep = trojanscan_selectclone(TROJANSCAN_NORMAL_CLONES);
1033 if (!clonep) {
1034 trojanscan_errorcode = 6;
1035 return NULL;
1036 }
1037 if(!trojanscan_nickbanned(clonep, cp))
1038 break;
1039 } while (--attempts_left > 0);
1040
1041 if (!attempts_left) {
1042 trojanscan_errorcode = 7;
1043 return NULL;
1044 }
1045
1046 rc = (struct trojanscan_realchannels *)malloc(sizeof(struct trojanscan_realchannels));
1047
1048 rc->next = NULL;
1049 rc->clone = clonep;
1050 rc->chan = cp;
1051 rc->donotpart = 0;
1052 rc->kickedout = 0;
1053 return rc;
1054 }
1055
1056 void trojanscan_join(struct trojanscan_realchannels *rc) {
1057 struct trojanscan_realchannels *rp = trojanscan_realchanlist;
1058
1059 if (rc->clone && rc->clone->clone) {
1060 if (!localjoinchannel(rc->clone->clone, rc->chan)) {
1061 rc->clone->remaining--;
1062 rc->clone->sitting++;
1063 if (trojanscan_minmaxrand(1, TROJANSCAN_NICKCHANGE_ODDS)%TROJANSCAN_NICKCHANGE_ODDS == 0)
1064 trojanscan_donickchange((void *)rc->clone);
1065
1066 rc->schedule = scheduleoneshot(time(NULL)+trojanscan_part_time, &trojanscan_dopart, (void *)rc);
1067
1068 if (rp) {
1069 for(;rp->next;rp=rp->next);
1070 rp->next = rc;
1071 } else {
1072 trojanscan_realchanlist = rc;
1073 }
1074 }
1075 }
1076
1077 }
1078
1079 int trojanscan_userjoin(void *sender, int cargc, char **cargv) {
1080 nick *np = (nick *)sender;
1081 struct trojanscan_realchannels *rc;
1082
1083 if (cargc < 1) {
1084 trojanscan_reply(np, "Not enough paramaters");
1085 return CMD_ERROR;
1086 }
1087
1088 if (!trojanscan_swarm_created) {
1089 trojanscan_reply(np, "My swarm is currently empty.");
1090 return CMD_OK;
1091 }
1092
1093 if((rc = trojanscan_allocaterc(cargv[0]))) {
1094 trojanscan_log(np, "join", cargv[0]);
1095 trojanscan_join(rc);
1096 trojanscan_reply(np, "Clone has joined channel.");
1097 if(!IsOper(np))
1098 trojanscan_mainchanmsg("n: join: %s (%s/%s)", cargv[0], np->nick, np->authname);
1099 } else {
1100 if (trojanscan_errorcode == 5) {
1101 trojanscan_reply(np, "Not joining empty channel, check you entered the correct channel name.");
1102 } else {
1103 trojanscan_reply(np, "Clone could not join channel (error code %d)!", trojanscan_errorcode);
1104 }
1105 }
1106 return CMD_OK;
1107 }
1108
1109 int trojanscan_rehash(void *sender, int cargc, char **cargv) {
1110 nick *np = (void *)sender;
1111 trojanscan_read_database(0);
1112 trojanscan_log(np, "rehash", "");
1113 trojanscan_reply(np, "Done.");
1114 return CMD_OK;
1115 }
1116
1117 int trojanscan_changelev(void *sender, int cargc, char **cargv) {
1118 nick *np = (nick *)sender, *np2;
1119 int templevel;
1120 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE], *tochange, *p, mode = 1, error = 0, clast = 0, specialcase;
1121 union trojanscan_userlevel flags1, flags2;
1122
1123 if (cargc < 2) {
1124 trojanscan_reply(np, "Not enough parameters.");
1125 return CMD_ERROR;
1126 }
1127
1128 templevel = trojanscan_user_level_by_authname(np->authname);
1129
1130 if (templevel == -1) {
1131 trojanscan_reply(np, "You do not have an account.");
1132 return CMD_ERROR;
1133 }
1134
1135 flags1.number = templevel;
1136
1137 if (cargv[0][0] == '#') {
1138 tochange = cargv[0] + 1;
1139 } else {
1140 np2 = getnickbynick(cargv[0]);
1141 if (!np2) {
1142 trojanscan_reply(np, "That nickname is not on the network.");
1143 return CMD_ERROR;
1144 }
1145 if (!IsAccount(np2)) {
1146 trojanscan_reply(np, "That user is not authed with the network.");
1147 return CMD_ERROR;
1148 }
1149 tochange = np2->authname;
1150 }
1151
1152 templevel = trojanscan_user_level_by_authname(tochange);
1153
1154 if (templevel == -1) {
1155 trojanscan_reply(np, "User does not exist.");
1156 return CMD_ERROR;
1157 }
1158
1159 flags2.number = templevel;
1160
1161 if (!ircd_strcmp(np->authname, tochange)) {
1162 specialcase = 1;
1163 } else {
1164 specialcase = 0;
1165 }
1166
1167 for (p=cargv[1];*p;p++) {
1168 switch (*p) {
1169 case '+':
1170 case '-':
1171 mode = (*p == '+');
1172 break;
1173 case 'd':
1174 if (!TrojanscanIsDeveloper(flags1))
1175 clast = 1;
1176 flags2.values.developer = mode;
1177 break;
1178 case 't':
1179 if (!TrojanscanIsDeveloper(flags1))
1180 clast = 1;
1181 flags2.values.teamleader = mode;
1182 break;
1183 case 's':
1184 if (!TrojanscanIsLeastTeamLeader(flags1))
1185 clast = 1;
1186 flags2.values.staff = mode;
1187 break;
1188 case 'w':
1189 if (!TrojanscanIsDeveloper(flags1))
1190 clast = 1;
1191 flags2.values.website = mode;
1192 break;
1193 case 'c':
1194 if (!TrojanscanIsDeveloper(flags1))
1195 clast = 1;
1196 flags2.values.cat = mode;
1197 break;
1198 default:
1199 error = 1;
1200 goto last;
1201 break;
1202 }
1203 if (clast == 1) {
1204 if (specialcase && !mode) { /* allow user to remove their own flags */
1205 clast = 0;
1206 } else {
1207 goto last;
1208 }
1209 }
1210 }
1211
1212 last:
1213 if (*p) {
1214 if (error) {
1215 trojanscan_reply(np, "Unknown mode: %c%c.", mode?'+':'-', *p);
1216 } else {
1217 trojanscan_reply(np, "You have insufficient privilidges to add/remove one or more flags specified.");
1218 }
1219 return CMD_ERROR;
1220 }
1221
1222 trojanscan_log(np, "changelev", "%s %s", tochange, cargv[1]);
1223 trojanscan_database_escape_string(eaccount, tochange, strlen(tochange));
1224 trojanscan_database_query("UPDATE users SET authlevel = %d WHERE authname = '%s'", flags2.number, eaccount);
1225
1226 trojanscan_reply(np, "Flags changed.");
1227
1228 return CMD_OK;
1229 }
1230
1231 int trojanscan_deluser(void *sender, int cargc, char **cargv) {
1232 nick *np = (nick *)sender, *to;
1233 int templevel;
1234 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE], *account;
1235 union trojanscan_userlevel flags1, flags2;
1236
1237 if (cargc < 1) {
1238 trojanscan_reply(np, "Not enough parameters.");
1239 return CMD_ERROR;
1240 }
1241
1242 if (cargv[0][0] == '#') {
1243 account = cargv[0] + 1;
1244 } else {
1245 to = getnickbynick(cargv[0]);
1246 if (!to) {
1247 trojanscan_reply(np, "That nickname is not on the network.");
1248 return CMD_ERROR;
1249 }
1250 if (!IsAccount(to)) {
1251 trojanscan_reply(np, "That user is not authed with the network.");
1252 return CMD_ERROR;
1253 }
1254 account = to->authname;
1255 }
1256
1257 flags1.number = trojanscan_user_level_by_authname(np->authname);
1258 templevel = trojanscan_user_level_by_authname(account);
1259
1260 if (templevel == -1) {
1261 trojanscan_reply(np, "Auth %s does not exist.", account);
1262 return CMD_ERROR;
1263 }
1264
1265 flags2.number = templevel;
1266
1267 if (!TrojanscanIsDeveloper(flags1) && TrojanscanIsLeastTeamLeader(flags2)) {
1268 trojanscan_reply(np, "Your cannot delete %s as his/her flags equal or surpass your own.", account);
1269 return CMD_ERROR;
1270 }
1271
1272 trojanscan_log(np, "deluser", account);
1273 trojanscan_database_escape_string(eaccount, account, strlen(account));
1274 trojanscan_database_query("DELETE FROM users WHERE authname = '%s'", eaccount);
1275 trojanscan_reply(np, "User deleted.");
1276
1277 return CMD_OK;
1278 }
1279
1280 int trojanscan_add_ll(struct trojanscan_prechannels **head, struct trojanscan_prechannels *newitem) {
1281 struct trojanscan_prechannels *position, *lastitem = NULL, *location = NULL;
1282 if (!*head) {
1283 *head = newitem;
1284 newitem->next = NULL;
1285 if (newitem->exempt) {
1286 return 0;
1287 } else {
1288 return 1;
1289 }
1290 }
1291 /* if its exempt, we don't give a monkeys where it is... */
1292 if (newitem->exempt) {
1293 newitem->next = *head;
1294 *head = newitem;
1295 return 0;
1296 }
1297
1298 for(position=*head;position;lastitem=position,position=position->next) {
1299 if (!ircd_strcmp(position->name->content, newitem->name->content)) {
1300 free(newitem);
1301 return 0;
1302 }
1303 if (!location && (position->size < newitem->size)) {
1304 if (!lastitem) {
1305 location = *head;
1306 } else {
1307 location = lastitem;
1308 }
1309 }
1310 }
1311 if (!location) {
1312 newitem->next = NULL;
1313 lastitem->next = newitem;
1314 } else {
1315 newitem->next = location->next;
1316 location->next = newitem;
1317 }
1318 if(newitem->exempt) {
1319 return 0;
1320 } else {
1321 return 1;
1322 }
1323 }
1324
1325 void trojanscan_watch_clone_update(struct trojanscan_prechannels *hp, int count) {
1326 int i, j, marked;
1327 struct trojanscan_prechannels *lp;
1328 struct trojanscan_templist *markedlist = NULL;
1329
1330 if(count > 0) {
1331 markedlist = (struct trojanscan_templist *)calloc(count, sizeof(struct trojanscan_templist));
1332 if (!markedlist)
1333 return;
1334 }
1335
1336 for(i=0;i<trojanscan_activechans;i++) {
1337 marked = 0;
1338 if(markedlist) {
1339 for(lp=hp,j=0;j<count&&lp;j++,lp=lp->next) {
1340 if(!markedlist[j].active && !lp->exempt && !ircd_strcmp(lp->name->content, trojanscan_chans[i].channel->content)) { /* we're already on the channel */
1341 if(trojanscan_chans[i].watch_clone) {
1342 markedlist[j].active = 1;
1343 markedlist[j].watch_clone = trojanscan_chans[i].watch_clone;
1344 lp->watch_clone = trojanscan_chans[i].watch_clone;
1345 }
1346 marked = 1;
1347 break;
1348 }
1349 }
1350 }
1351 if(!marked && trojanscan_chans[i].watch_clone) {
1352 channel *cp = findchannel(trojanscan_chans[i].channel->content);
1353 if(cp)
1354 localpartchannel(trojanscan_chans[i].watch_clone->clone, cp);
1355 }
1356 }
1357
1358 if(!markedlist)
1359 return;
1360
1361 for(j=0,lp=hp;j<count&&lp;j++,lp=lp->next) {
1362 if((!markedlist[j].active || !markedlist[j].watch_clone) && !lp->exempt) {
1363 channel *cp = findchannel(lp->name->content);
1364 if(cp) {
1365 int attempts = 10;
1366 do {
1367 lp->watch_clone = trojanscan_selectclone(TROJANSCAN_WATCH_CLONES);
1368 if(!lp->watch_clone)
1369 break;
1370 if(!trojanscan_nickbanned(lp->watch_clone, cp)) {
1371 if(localjoinchannel(lp->watch_clone->clone, cp))
1372 lp->watch_clone = NULL;
1373 break;
1374 }
1375 } while(--attempts > 0);
1376 if(!attempts)
1377 lp->watch_clone = NULL;
1378
1379 }
1380 }
1381 }
1382
1383 free(markedlist);
1384 }
1385
1386 void trojanscan_fill_channels(void *arg) {
1387 struct trojanscan_prechannels *head = NULL, *lp, *last = NULL;
1388 int i, count, tempctime = 0;
1389
1390 chanindex *chn;
1391
1392 for (count=i=0;i<trojanscan_database.total_channels;i++) {
1393 lp = (trojanscan_prechannels *)malloc(sizeof(trojanscan_prechannels));
1394 lp->name = trojanscan_database.channels[i].name;
1395 lp->size = 65535;
1396 lp->exempt = trojanscan_database.channels[i].exempt;
1397 lp->watch_clone = NULL;
1398 if (trojanscan_add_ll(&head, lp))
1399 count++;
1400 }
1401
1402 for (i=0;i<CHANNELHASHSIZE;i++) {
1403 for(chn=chantable[i];chn;chn=chn->next) {
1404 if (chn->channel && !IsKey(chn->channel) && !IsInviteOnly(chn->channel) && !IsRegOnly(chn->channel) && (chn->channel->users->totalusers >= trojanscan_minchansize)) {
1405 lp = (trojanscan_prechannels *)malloc(sizeof(trojanscan_prechannels));
1406 lp->name = chn->name;
1407 lp->size = chn->channel->users->totalusers;
1408 lp->exempt = 0;
1409 lp->watch_clone = NULL;
1410 if (trojanscan_add_ll(&head, lp))
1411 count++;
1412 }
1413 }
1414 }
1415
1416 count = TROJANSCAN_MMIN(count, trojanscan_maxchans);
1417
1418 trojanscan_watch_clone_update(head, count);
1419
1420 trojanscan_free_channels();
1421 trojanscan_chans = (struct trojanscan_inchannel *)calloc(count, sizeof(struct trojanscan_inchannel));
1422 trojanscan_activechans = count;
1423 i = 0;
1424
1425 for(lp=head;lp;last=lp,lp=lp->next) {
1426 if (!(lp->exempt) && (i < count)) {
1427 trojanscan_chans[i].channel = getsstring(lp->name->content, lp->name->length);
1428 trojanscan_chans[i++].watch_clone = lp->watch_clone;
1429 }
1430 if (last)
1431 free(last);
1432 }
1433
1434 if (last)
1435 free(last);
1436
1437 if (trojanscan_activechans > 0) {
1438 tempctime = trojanscan_cycletime / trojanscan_activechans;
1439 } else {
1440 tempctime = 60;
1441 trojanscan_mainchanmsg("d: just escaped a divide by zero error (no activechans!), rescheduling in 60 seconds");
1442 }
1443
1444 if(trojanscan_schedule)
1445 deleteschedule(trojanscan_schedule, &trojanscan_dojoin, NULL);
1446
1447 trojanscan_channumber = 0;
1448
1449 trojanscan_schedule = schedulerecurring(time(NULL) + tempctime, trojanscan_activechans + 1, tempctime, trojanscan_dojoin, NULL);
1450
1451 }
1452
1453 void trojanscan_dojoin(void *arg) {
1454 struct trojanscan_realchannels *rc;
1455 if (trojanscan_channumber >= trojanscan_activechans) {
1456 trojanscan_schedule = NULL;
1457 trojanscan_fill_channels(NULL);
1458 } else {
1459 if ((rc = trojanscan_allocaterc(trojanscan_chans[trojanscan_channumber++].channel->content)))
1460 trojanscan_join(rc);
1461 }
1462 }
1463
1464
1465 void trojanscan_dopart(void *arg) {
1466 struct trojanscan_realchannels *rc = (struct trojanscan_realchannels *)arg, *rp, *past = NULL;
1467
1468 if (rc->kickedout) { /* there's a join scheduled, wait for it (reschedule) */
1469 rc->schedule = scheduleoneshot(time(NULL)+5, &trojanscan_dopart, (void *)rc);
1470 return;
1471 }
1472
1473 if (rc->clone->clone && (!(rc->donotpart)))
1474 localpartchannel(rc->clone->clone, rc->chan);
1475
1476 rc->clone->sitting--;
1477
1478 for(rp=trojanscan_realchanlist;rp;rp=rp->next) {
1479 if (rp == rc) {
1480 if (!past) {
1481 trojanscan_realchanlist = rp->next;
1482 } else {
1483 past->next = rp->next;
1484 }
1485 free(rp);
1486 break;
1487 }
1488 past = rp;
1489 }
1490
1491 }
1492
1493 void trojanscan_donickchange(void *arg) { /* just incase I choose to make this schedule at some point */
1494 struct trojanscan_clones *clone = (trojanscan_clones *)arg;
1495 if (clone && clone->clone) {
1496 char c_nick[NICKLEN+1];
1497 int loops = 0;
1498 /* PPA: unlikely to be infinite */
1499 do {
1500 if ((loops++ < 10) && trojanscan_hostmode) {
1501 trojanscan_generatenick(c_nick, NICKLEN);
1502 } else {
1503 trojanscan_gennick(c_nick, trojanscan_minmaxrand(7, TROJANSCAN_MMIN(13, NICKLEN)));
1504 }
1505 } while (c_nick && (getnickbynick(c_nick) != NULL));
1506
1507 renamelocaluser(clone->clone, c_nick);
1508 }
1509
1510 }
1511
1512 int trojanscan_keysort(const void *v1, const void *v2) {
1513 return ((*(trojanscan_prechannels **)v2)->size - (*(trojanscan_prechannels **)v1)->size);
1514 }
1515
1516 int trojanscan_showcommands(void *sender, int cargc, char **cargv) {
1517 nick *np = (nick *)sender;
1518 Command *cmdlist[100];
1519 int i, n;
1520 char level = 0;
1521
1522 n = getcommandlist(trojanscan_cmds, cmdlist, 100);
1523
1524 trojanscan_reply(np, "The following commands are registered at present:");
1525
1526 for(i=0;i<n;i++) {
1527 if (cmdlist[i]->level & TROJANSCAN_ACL_STAFF) {
1528 level = 's';
1529 } else if (cmdlist[i]->level & TROJANSCAN_ACL_DEVELOPER) {
1530 level = 'd';
1531 } else if (cmdlist[i]->level & TROJANSCAN_ACL_TEAMLEADER) {
1532 level = 't';
1533 } else if (cmdlist[i]->level & TROJANSCAN_ACL_CAT) {
1534 level = 'c';
1535 } else if (cmdlist[i]->level & TROJANSCAN_ACL_WEBSITE) {
1536 level = 'w';
1537 } else if (cmdlist[i]->level & TROJANSCAN_ACL_UNAUTHED) {
1538 level = 0;
1539 }
1540 if (level) {
1541 trojanscan_reply(np, "%s (+%c)", cmdlist[i]->command->content, level);
1542 } else {
1543 trojanscan_reply(np, "%s", cmdlist[i]->command->content);
1544 }
1545 }
1546 trojanscan_reply(np, "End of list.");
1547 return CMD_OK;
1548 }
1549
1550 void trojanscan_handlemessages(nick *target, int messagetype, void **args) {
1551 Command *cmd;
1552 char *cargv[50];
1553 int cargc, templevel;
1554 nick *sender;
1555 union trojanscan_userlevel level;
1556
1557 switch(messagetype) {
1558 case LU_PRIVMSG:
1559 case LU_SECUREMSG:
1560 /* If it's a message, first arg is nick and second is message */
1561 sender = (nick *)args[0];
1562
1563 if(strncmp(TROJANSCAN_VERSION_DETECT, args[1], sizeof(TROJANSCAN_VERSION_DETECT)-1)==0) {
1564 char p = ((char *)args[1])[sizeof(TROJANSCAN_VERSION_DETECT)-1];
1565 if((p == ' ') || (p == '\0') || (p == 1)) {
1566 trojanscan_reply(sender, "\001VERSION Trojanscan (or Tigger) Newserv module version %s by Chris Porter (slug), Newserv by David Mansell (splidge). Compiled " __DATE__ " " __TIME__ ".\001", TROJANSCAN_VERSION);
1567 return;
1568 }
1569 }
1570
1571 /* Split the line into params */
1572 cargc = splitline((char *)args[1], cargv, 50, 0);
1573
1574 cmd=findcommandintree(trojanscan_cmds, cargv[0], 1);
1575 if (!cmd) {
1576 trojanscan_reply(sender, "Unknown command.");
1577 return;
1578 }
1579
1580 if ((cmd->level & TROJANSCAN_ACL_OPER) && !IsOper(sender)) {
1581 trojanscan_reply(sender, "You need to be opered to use this command.");
1582 return;
1583 }
1584
1585 /* bit grim code... */
1586
1587 if (!(cmd->level & TROJANSCAN_ACL_UNAUTHED)) {
1588 if (!IsAccount(sender)) {
1589 trojanscan_reply(sender, "You must be authed with the network to access this command!");
1590 return;
1591 }
1592 templevel = trojanscan_user_level_by_authname(sender->authname);
1593
1594 if (templevel == -1) {
1595 trojanscan_reply(sender, "You do not have an account.");
1596 return;
1597 }
1598
1599 level.number = templevel;
1600
1601 if ((cmd->level & TROJANSCAN_ACL_DEVELOPER) && !TrojanscanIsDeveloper(level)) {
1602 trojanscan_reply(sender, "Access denied.");
1603 return;
1604 }
1605 if ((cmd->level & TROJANSCAN_ACL_TEAMLEADER) && !TrojanscanIsLeastTeamLeader(level)) {
1606 trojanscan_reply(sender, "Access denied.");
1607 return;
1608 }
1609 if ((cmd->level & TROJANSCAN_ACL_STAFF) && !TrojanscanIsLeastStaff(level)) {
1610 trojanscan_reply(sender, "Access denied.");
1611 return;
1612 }
1613 if ((cmd->level & TROJANSCAN_ACL_CAT) && !TrojanscanIsCat(level)) {
1614 trojanscan_reply(sender, "Access denied.");
1615 return;
1616 }
1617 if ((cmd->level & TROJANSCAN_ACL_WEBSITE) && !TrojanscanIsLeastWebsite(level)) {
1618 trojanscan_reply(sender, "Access denied.");
1619 return;
1620 }
1621 }
1622
1623 /* Check the maxargs */
1624 if (cmd->maxparams<(cargc-1)) {
1625 /* We need to do some rejoining */
1626 rejoinline(cargv[cmd->maxparams], cargc-(cmd->maxparams));
1627 cargc = (cmd->maxparams) + 1;
1628 }
1629
1630 (cmd->handler)((void *)sender, cargc - 1, &(cargv[1]));
1631 break;
1632
1633 case LU_KILLED:
1634 /* someone killed me? Bastards */
1635 trojanscan_connect_schedule = scheduleoneshot(time(NULL) + 1, &trojanscan_connect, NULL);
1636 trojanscan_nick = NULL;
1637 break;
1638
1639 default:
1640 break;
1641 }
1642 }
1643
1644 char trojanscan_getmtfrommessagetype(int input) {
1645 switch(input) {
1646 case LU_PRIVMSG: return 'm';
1647 case LU_PRIVNOTICE: return 'n';
1648 case LU_SECUREMSG: return 's';
1649 case LU_CHANMSG: return 'M';
1650 case LU_CHANNOTICE: return 'N';
1651 default: return '?';
1652 }
1653 }
1654
1655 void trojanscan_clonehandlemessages(nick *target, int messagetype, void **args) {
1656 char *pretext = NULL, etext[TROJANSCAN_QUERY_TEMP_BUF_SIZE], enick[TROJANSCAN_QUERY_TEMP_BUF_SIZE], eident[TROJANSCAN_QUERY_TEMP_BUF_SIZE], ehost[TROJANSCAN_QUERY_TEMP_BUF_SIZE], text[513], detected = 0;
1657 nick *sender;
1658 struct trojanscan_realchannels *rp;
1659 struct trojanscan_rejoinlist *rj;
1660 unsigned int i, len;
1661 struct trojanscan_worms *worm;
1662 int vector[30];
1663 char mt = trojanscan_getmtfrommessagetype(messagetype);
1664 char *channel_name;
1665
1666 switch(messagetype) {
1667 case LU_PRIVMSG:
1668 case LU_SECUREMSG:
1669 case LU_PRIVNOTICE:
1670
1671 pretext = (char *)args[1];
1672
1673 case LU_CHANMSG:
1674 case LU_CHANNOTICE:
1675
1676 sender = (nick *)args[0];
1677 if (strlen(sender->nick) < 2)
1678 break;
1679
1680 if (!pretext)
1681 pretext = (char *)args[2];
1682
1683 if(strncmp(TROJANSCAN_VERSION_DETECT, pretext, sizeof(TROJANSCAN_VERSION_DETECT)-1)==0) {
1684 char p = pretext[sizeof(TROJANSCAN_VERSION_DETECT)-1];
1685 if((p == ' ') || (p == '\0') || (p == 1)) {
1686 int staff = 0;
1687 if (IsOper(sender)) {
1688 staff = 1;
1689 } else {
1690 if (IsAccount(sender)) {
1691 int templevel = trojanscan_user_level_by_authname(sender->authname);
1692 if (templevel != -1) {
1693 union trojanscan_userlevel level;
1694 level.number = templevel;
1695 if (TrojanscanIsLeastStaff(level))
1696 staff = 1;
1697 }
1698 }
1699 }
1700 if (staff) {
1701 if(trojanscan_nick) {
1702 sendnoticetouser(target, sender, "\001VERSION T clone, check T for confirmation.\001");
1703 sendnoticetouser(trojanscan_nick, sender, "\001VERSION %s is part of my swarm.\001", target->nick);
1704 } else {
1705 sendnoticetouser(target, sender, "\001VERSION T clone, though since T is currently gone you'll have to version me again in a minute for confirmation.\001");
1706 }
1707 } else {
1708 sendnoticetouser(target, sender, "\001VERSION " TROJANSCAN_CLONE_VERSION_REPLY "\001");
1709 }
1710
1711 return;
1712 }
1713 }
1714
1715 trojanscan_strip_codes(text, sizeof(text) - 1, pretext);
1716
1717 len = strlen(text);
1718
1719 for(i=0;i<trojanscan_database.total_phrases;i++) {
1720 if (
1721 (
1722 (worm = trojanscan_database.phrases[i].worm)
1723 ) &&
1724 (
1725 (
1726 (
1727 (messagetype == LU_PRIVMSG) || (messagetype == LU_SECUREMSG) || (messagetype == LU_PRIVNOTICE)
1728 ) &&
1729 (
1730 (trojanscan_database.phrases[i].worm->hitpriv)
1731 )
1732 ) ||
1733 (
1734 (
1735 (messagetype == LU_CHANMSG) || (messagetype == LU_CHANNOTICE)
1736 ) &&
1737 (
1738 (trojanscan_database.phrases[i].worm->hitchans)
1739 )
1740 )
1741 ) &&
1742 (trojanscan_database.phrases[i].phrase)
1743 ) {
1744 int pre = pcre_exec(trojanscan_database.phrases[i].phrase, trojanscan_database.phrases[i].hint, text, len, 0, 0, vector, 30);
1745 if(pre >= 0) {
1746 char glinemask[HOSTLEN + USERLEN + NICKLEN + 4];
1747 char *userbit;
1748 host *hp;
1749 unsigned int j, usercount, frequency;
1750 char ip[TROJANSCAN_IPLEN];
1751 int glining = 1;
1752 channel *chp = (channel *)args[1];
1753
1754 nick *np = NULL; /* sigh at warnings */
1755
1756 detected = 1;
1757
1758 trojanscan_database.detections++;
1759
1760 if (!(hp=findhost(sender->host->name->content))) {
1761 trojanscan_mainchanmsg("w: user %s!%s@%s triggered infection monitor, yet no hosts found at stage 1 -- worm: %s", sender->nick, sender->ident, sender->host->name->content, worm->name->content);
1762 break;
1763 }
1764
1765 usercount = 0; /* stupid warnings */
1766 if (worm->monitor) {
1767 glining = 0;
1768 usercount = -1;
1769 } else if (worm->glinehost && (hp->clonecount <= TROJANSCAN_MAX_HOST_GLINE)) {
1770 snprintf(glinemask, sizeof(glinemask) - 1, "*@%s", trojanscan_iptostr(ip, sizeof(ip) - 1, sender->ipaddress));
1771 usercount = hp->clonecount;
1772 }
1773 else if (worm->glineuser || (worm->glinehost && hp->clonecount > TROJANSCAN_MAX_HOST_GLINE)) {
1774 userbit = sender->ident;
1775 if(userbit[0] == '~')
1776 userbit++;
1777 snprintf(glinemask, sizeof(glinemask) - 1, "*%s@%s", userbit, trojanscan_iptostr(ip, sizeof(ip) - 1, sender->ipaddress));
1778 for (j=0;j<NICKHASHSIZE;j++) {
1779 for (np=nicktable[j];np;np=np->next) {
1780 if ((np->host==hp) && (!ircd_strcmp(np->ident,sender->ident)))
1781 usercount++;
1782 }
1783 }
1784 }
1785
1786 if (!usercount) {
1787 trojanscan_mainchanmsg("w: user %s!%s@%s triggered infection monitor, yet no hosts found at stage 2 -- worm: %s", sender->nick, sender->ident, sender->host->name->content, worm->name->content);
1788 break;
1789 }
1790
1791 if (glining && (usercount > trojanscan_maxusers)) {
1792 trojanscan_mainchanmsg("w: not glining %s!%s@%s due to too many users (%d) with mask: *!%s -- worm: %s)", sender->nick, sender->ident, sender->host->name->content, usercount, glinemask, worm->name->content);
1793 break;
1794 }
1795
1796 if (glining && !worm->datalen) {
1797 trojanscan_mainchanmsg("w: not glining %s!%s@%s due to too lack of removal data with mask: *!%s (%d users) -- worm: %s)", sender->nick, sender->ident, sender->host->name->content, glinemask, usercount, worm->name->content);
1798 break;
1799 }
1800
1801 trojanscan_database_escape_string(enick, sender->nick, strlen(sender->nick));
1802 trojanscan_database_escape_string(eident, sender->ident, strlen(sender->ident));
1803 trojanscan_database_escape_string(ehost, sender->host->name->content, sender->host->name->length);
1804
1805 frequency = 1;
1806
1807 if (!(trojanscan_database_query("SELECT COUNT(*) FROM hits WHERE glined = %d AND host = '%s'", glining, ehost))) {
1808 trojanscan_database_res *res;
1809 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
1810 trojanscan_database_row sqlrow;
1811 if ((trojanscan_database_num_rows(res) > 0) && (sqlrow = trojanscan_database_fetch_row(res)))
1812 frequency = atoi(sqlrow[0]) + 1;
1813 trojanscan_database_free_result(res);
1814 }
1815 }
1816
1817 if (!glining) {
1818 char matchbuf[513];
1819 matchbuf[0] = 0;
1820 matchbuf[512] = 0; /* hmm */
1821
1822 if(pre > 1)
1823 if (pcre_copy_substring(text, vector, pre, 1, matchbuf, sizeof(matchbuf) - 1) <= 0)
1824 matchbuf[0] = 0;
1825
1826 trojanscan_mainchanmsg("m: t: %c u: %s!%s@%s%s%s w: %s p: %d %s%s", mt, sender->nick, sender->ident, sender->host->name->content, mt=='N'||mt=='M'?" #: ":"", mt=='N'||mt=='M'?chp->index->name->content:"", worm->name->content, trojanscan_database.phrases[i].id, matchbuf[0]?" --: ":"", matchbuf[0]?matchbuf:"");
1827 /* trojanscan_peonchanmsg("m: t: %c u: %s!%s@%s%s%s%s w: %s %s%s", mt, sender->nick, sender->ident, (IsHideHost(sender)&&IsAccount(sender))?sender->authname:sender->host->name->content, (IsHideHost(sender)&&IsAccount(sender))?"."HIS_HIDDENHOST:"", mt=='N'||mt=='M'?" #: ":"", mt=='N'||mt=='M'?chp->index->name->content:"", worm->name->content, matchbuf[0]?" --: ":"", matchbuf[0]?matchbuf:""); */
1828 } else {
1829 int glinetime = TROJANSCAN_FIRST_OFFENSE * frequency * (worm->epidemic?TROJANSCAN_EPIDEMIC_MULTIPLIER:1);
1830 if(glinetime > 7 * 24)
1831 glinetime = 7 * 24; /* can't set glines over 7 days with normal non U:lined glines */
1832
1833 trojanscan_database_query("INSERT INTO hits (nickname, ident, host, phrase, messagetype, glined) VALUES ('%s', '%s', '%s', %d, '%c', %d)", enick, eident, ehost, trojanscan_database.phrases[i].id, mt, glining);
1834 trojanscan_database.glines++;
1835
1836 irc_send("%s GL * +%s %d :You (%s!%s@%s) are infected with a trojan (%s/%d), see %s%d for details - banned for %d hours\r\n", mynumeric->content, glinemask, glinetime * 3600, sender->nick, sender->ident, sender->host->name->content, worm->name->content, trojanscan_database.phrases[i].id, TROJANSCAN_URL_PREFIX, worm->id, glinetime);
1837
1838 trojanscan_mainchanmsg("g: *!%s t: %c u: %s!%s@%s%s%s c: %d w: %s%s p: %d f: %d", glinemask, mt, sender->nick, sender->ident, sender->host->name->content, mt=='N'||mt=='M'?" #: ":"", mt=='N'||mt=='M'?chp->index->name->content:"", usercount, worm->name->content, worm->epidemic?"(E)":"", trojanscan_database.phrases[i].id, frequency);
1839 }
1840
1841 break;
1842 }
1843 }
1844 }
1845 if (!detected && (mt != 'N') && (mt != 'M')) {
1846 trojanscan_database_escape_string(etext, text, len);
1847 trojanscan_database_escape_string(enick, sender->nick, strlen(sender->nick));
1848 trojanscan_database_escape_string(eident, sender->ident, strlen(sender->ident));
1849 trojanscan_database_escape_string(ehost, sender->host->name->content, sender->host->name->length);
1850 trojanscan_database_query("INSERT INTO unknownlog (data, user) VALUES ('%s','%s!%s@%s')", etext, enick, eident, ehost);
1851 }
1852 break;
1853 case LU_KILLED:
1854 /* someone killed me? Bastards */
1855
1856 /* PPA: we do NOT rejoin channels at this moment in time, it is possible to do this though */
1857 for (i=0;i<TROJANSCAN_CLONE_TOTAL;i++) {
1858 if (trojanscan_swarm[i].clone == target) {
1859
1860 scheduleoneshot(time(NULL)+1, &trojanscan_generateclone, (void *)i);
1861 if(i >= TROJANSCAN_CLONE_MAX) {
1862 int j;
1863 for(j=0;j<trojanscan_activechans;j++)
1864 if(trojanscan_chans[j].watch_clone == &trojanscan_swarm[i])
1865 trojanscan_chans[j].watch_clone = NULL;
1866 } else {
1867 for(rp=trojanscan_realchanlist;rp;rp=rp->next)
1868 if ((rp->clone == &(trojanscan_swarm[i])))
1869 rp->donotpart = 1;
1870 }
1871 trojanscan_swarm[i].clone = NULL;
1872 trojanscan_swarm[i].remaining = 0; /* bah */
1873 break;
1874 }
1875 }
1876 break;
1877
1878 case LU_KICKED:
1879 channel_name = ((channel *)args[1])->index->name->content;
1880 for (i=0;i<trojanscan_activechans;i++) {
1881 if (!trojanscan_chans[i].watch_clone)
1882 continue;
1883 if ((trojanscan_chans[i].watch_clone->clone == target) && (!strcmp(trojanscan_chans[i].channel->content, channel_name)))
1884 break;
1885 }
1886 if(i != trojanscan_activechans) {
1887 int j;
1888 for(j=0;j<TROJANSCAN_CLONE_TOTAL;j++) {
1889 if(&trojanscan_swarm[j] == trojanscan_chans[i].watch_clone) {
1890 trojanscan_chans[i].watch_clone = NULL;
1891 break;
1892 }
1893 }
1894 } else {
1895 /*
1896 trojanscan_mainchanmsg("k: %s on %s by %s", target->nick, ((channel *)args[1])->index->name->content, (((nick *)args[0])->nick)?(((nick *)args[0])->nick):"(server)");
1897 */
1898 rj = (struct trojanscan_rejoinlist *)malloc(sizeof(struct trojanscan_rejoinlist));
1899 if (rj) {
1900 rj->rp = NULL;
1901 for(rp=trojanscan_realchanlist;rp;rp=rp->next)
1902 if ((rp->clone->clone == target) && (rp->chan == args[1])) {
1903 rp->kickedout++;
1904 rj->rp = rp;
1905 break;
1906 }
1907 if(!rj->rp) {
1908 free(rj);
1909 return;
1910 }
1911
1912 rj->channel = getsstring(((channel *)args[1])->index->name->content, ((channel *)args[1])->index->name->length);
1913 if(!rj->channel) {
1914 trojanscan_mainchanmsg("d: unable to allocate memory for channel: %s upon rejoin", ((channel *)args[1])->index->name->content);
1915 free(rj);
1916 return;
1917 }
1918
1919 rj->clone = rp->clone;
1920 rj->next = trojanscan_schedulerejoins;
1921 trojanscan_schedulerejoins = rj;
1922
1923 rj->schedule = scheduleoneshot(time(NULL)+1, &trojanscan_rejoin_channel, (void *)rj);
1924 }
1925 }
1926 break;
1927 default:
1928 break;
1929 }
1930 }
1931
1932 void trojanscan_rejoin_channel(void *arg) {
1933 struct trojanscan_rejoinlist *rj2, *lrj, *rj = (struct trojanscan_rejoinlist *)arg;
1934
1935 channel *cp = findchannel(rj->channel->content);
1936 freesstring(rj->channel);
1937
1938 if (rj->rp) {
1939 rj->rp->kickedout--;
1940 if (!cp) {
1941 rj->rp->donotpart = 1; /* we were the last user on the channel, so we need to be VERY careful freeing it */
1942 } else {
1943 if(!rj->rp->donotpart && !rj->rp->kickedout) { /* check we're allowed to join channels (not killed), and we're the last one to join */
1944 if (trojanscan_nickbanned(rj->clone, cp)) {
1945 rj->rp->donotpart = 1;
1946 } else {
1947 localjoinchannel(rj->clone->clone, cp);
1948 }
1949 }
1950 }
1951 }
1952
1953 rj2 = trojanscan_schedulerejoins;
1954 lrj = NULL;
1955
1956 if (rj2 == rj) {
1957 trojanscan_schedulerejoins = rj->next;
1958 free(rj);
1959 } else {
1960 for(rj2=trojanscan_schedulerejoins;rj2;lrj=rj2,rj2=rj2->next) {
1961 if (rj2 == rj) {
1962 lrj->next = rj2->next;
1963 free(rj);
1964 break;
1965 }
1966 }
1967 }
1968
1969 }
1970
1971 void trojanscan_reply(nick *target, char *message, ... ) {
1972 char buf[513];
1973 va_list va;
1974
1975 if (!trojanscan_nick)
1976 return;
1977
1978 va_start(va, message);
1979 vsnprintf(buf, sizeof(buf) - 1, message, va);
1980 va_end(va);
1981
1982 sendnoticetouser(trojanscan_nick, target, "%s", buf);
1983 }
1984
1985
1986 void trojanscan_mainchanmsg(char *message, ...) {
1987 char buf[513];
1988 va_list va;
1989 channel *cp;
1990
1991 if (!trojanscan_nick)
1992 return;
1993 if (!(cp = findchannel(TROJANSCAN_CHANNEL)))
1994 return;
1995
1996 va_start(va, message);
1997 vsnprintf(buf, sizeof(buf) - 1, message, va);
1998 va_end(va);
1999
2000 sendmessagetochannel(trojanscan_nick, cp, "%s", buf);
2001 }
2002
2003 void trojanscan_peonchanmsg(char *message, ...) {
2004 char buf[513];
2005 va_list va;
2006 channel *cp;
2007
2008 if (!trojanscan_nick)
2009 return;
2010 if (!(cp = findchannel(TROJANSCAN_PEONCHANNEL)))
2011 return;
2012
2013 va_start(va, message);
2014 vsnprintf(buf, sizeof(buf) - 1, message, va);
2015 va_end(va);
2016
2017 sendmessagetochannel(trojanscan_nick, cp, "%s", buf);
2018 }
2019
2020 int trojanscan_minmaxrand(float min, float max) {
2021 return (int)((max-min+1)*rand()/(RAND_MAX+min))+min;
2022 }
2023
2024 char *trojanscan_iptostr(char *buf, int buflen, unsigned int ip) {
2025 snprintf(buf, buflen, "%d.%d.%d.%d", ip >> 24, (ip >> 16) & 255, (ip >> 8) & 255, ip & 255);
2026 return buf;
2027 }
2028
2029 char trojanscan_genchar(int ty) {
2030 /* hostname and realname characters*/
2031 if (!ty) {
2032 if (!(trojanscan_minmaxrand(0, 40) % 10)) {
2033 return trojanscan_minmaxrand(48, 57);
2034 } else {
2035 return trojanscan_minmaxrand(97, 122);
2036 }
2037 /* ident characters - without numbers*/
2038 } else if (ty == 1) {
2039 return trojanscan_minmaxrand(97, 122);
2040 /* ident characters - with numbers*/
2041 } else if (ty == 2) {
2042 ty = trojanscan_minmaxrand(97, 125);
2043 if (ty > 122) return trojanscan_minmaxrand(48, 57);
2044 return ty;
2045 /* nick characters - with and without numbers*/
2046 } else if (ty == 3 || ty == 4) {
2047 if (!(trojanscan_minmaxrand(0, 59) % 16)) {
2048 char weirdos[6] = { '\\', '|', '[', '{', ']', '}' };
2049 return weirdos[trojanscan_minmaxrand(0, 5)];
2050 }
2051 if (ty == 4) {
2052 ty = trojanscan_minmaxrand(65, 93);
2053 if (ty > 90) return trojanscan_minmaxrand(48, 57);
2054 } else {
2055 ty = trojanscan_minmaxrand(65, 90);
2056 }
2057 if (!(trojanscan_minmaxrand(0, 40) % 8)) return ty;
2058 return ty + 32;
2059 /* moron check */
2060 } else {
2061 return ' ';
2062 }
2063 }
2064
2065 void trojanscan_gennick(char *ptc, char size) {
2066 int i;
2067 for (i=0;i<size;i++) {
2068 if (i == 0) {
2069 ptc[i] = trojanscan_genchar(3);
2070 } else {
2071 ptc[i] = trojanscan_genchar(4);
2072 }
2073 }
2074 ptc[i] = '\0';
2075 }
2076
2077 void trojanscan_genident(char *ptc, char size) {
2078 int i;
2079 for (i=0;i<size;i++) {
2080 if (i == 0) {
2081 ptc[i] = trojanscan_genchar(1);
2082 } else {
2083 ptc[i] = trojanscan_genchar(2);
2084 }
2085 }
2086 ptc[i] = '\0';
2087 }
2088
2089 void trojanscan_genhost(char *ptc, char size, long *fakeip) {
2090 int dots = trojanscan_minmaxrand(2, 5), i, dotexist = 0, cur;
2091
2092 while (!dotexist) {
2093 for (i=0;i<size;i++) {
2094 ptc[i] = trojanscan_genchar(0);
2095 if ((i > 5) && (i < (size-4))) {
2096 if ((ptc[i-1] != '.') && (ptc[i-1] != '-')) {
2097 cur = trojanscan_minmaxrand(1,size / dots);
2098 if (cur < 3) {
2099 if (cur == 1) {
2100 ptc[i] = '.';
2101 dotexist = 1;
2102 } else {
2103 ptc[i] = '-';
2104 }
2105 }
2106 }
2107 }
2108 }
2109 }
2110 ptc[i] = '\0';
2111
2112 *fakeip = (trojanscan_minmaxrand(0, 65535) << 16) | trojanscan_minmaxrand(0, 65535);
2113 }
2114
2115 void trojanscan_genreal(char *ptc, char size) {
2116 int spaces = trojanscan_minmaxrand(2, 4), i;
2117 for (i=0;i<size;i++) {
2118 ptc[i] = trojanscan_genchar(0);
2119 if ((i > 5) && (i < (size-4))) {
2120 if (ptc[i-1] != ' ') {
2121 if (trojanscan_minmaxrand(1,size / spaces) == 1) ptc[i] = ' ';
2122 }
2123 }
2124 }
2125 ptc[i] = '\0';
2126 }
2127
2128 int trojanscan_is_not_octet(char *begin, int length) {
2129 int i;
2130 if(length > 3)
2131 return 0;
2132 for(i=0;i<length;i++) {
2133 if (!((*begin >= '0') && (*begin <= '9')))
2134 return 0;
2135 begin++;
2136 }
2137 return 1;
2138 }
2139
2140 int trojanscan_generatepool(void) {
2141 int i, k = 0, j = 0, loops = 0;
2142 char *p, *pp;
2143 nick *np;
2144
2145 for (i=0;i<NICKHASHSIZE;i++)
2146 for (np=nicktable[i];np;np=np->next)
2147 j++;
2148
2149 if(j < trojanscan_min_hosts)
2150 return 0;
2151
2152 if(TROJANSCAN_HOST_MODE == TROJANSCAN_STEAL_HOST)
2153 return TROJANSCAN_MINPOOLSIZE;
2154
2155 i = 0;
2156 do {
2157 for (j=trojanscan_minmaxrand(0, NICKHASHSIZE-1);j<NICKHASHSIZE;j++) {
2158 if (nicktable[j]) {
2159 for(p=nicktable[j]->host->name->content, pp=p;*p;) {
2160 if (*++p == '.') {
2161 if (!trojanscan_is_not_octet(pp, p-pp)) {
2162 if (i < TROJANSCAN_POOLSIZE) {
2163 if (i < trojanscan_hostpoolsize)
2164 freesstring(trojanscan_hostpool[i]);
2165 trojanscan_hostpool[i] = getsstring(pp, p-pp);
2166 i++;
2167 } else {
2168 if (k >= TROJANSCAN_POOLSIZE)
2169 break;
2170 }
2171 }
2172 pp=++p;
2173 }
2174 }
2175 if (!trojanscan_is_not_octet(pp, p-pp)) {
2176 if (k < TROJANSCAN_POOLSIZE) {
2177 if (k < trojanscan_tailpoolsize)
2178 freesstring(trojanscan_tailpool[k]);
2179 trojanscan_tailpool[k] = getsstring(pp, p-pp);
2180 k++;
2181 } else {
2182 if (i >= TROJANSCAN_POOLSIZE)
2183 break;
2184 }
2185 }
2186 }
2187 }
2188 loops++;
2189 } while ((loops < 5) && ((i < TROJANSCAN_POOLSIZE) || (k < TROJANSCAN_POOLSIZE)));
2190
2191 trojanscan_hostpoolsize = i;
2192 trojanscan_tailpoolsize = k;
2193 return i;
2194 }
2195
2196 nick *trojanscan_selectuser(void) {
2197 int target = trojanscan_minmaxrand(0, 500), loops = 150, j;
2198 nick *np;
2199 do {
2200 for (j=trojanscan_minmaxrand(0, NICKHASHSIZE-1);j<NICKHASHSIZE;j++)
2201 for(np=nicktable[j];np;np=np->next)
2202 if (!--target)
2203 return np;
2204 } while(--loops > 0);
2205 return NULL;
2206 }
2207
2208 host *trojanscan_selecthost(void) {
2209 int target = trojanscan_minmaxrand(0, 500), loops = 150, j;
2210 host *hp;
2211 do {
2212 for (j=trojanscan_minmaxrand(0, HOSTHASHSIZE-1);j<HOSTHASHSIZE;j++)
2213 for(hp=hosttable[j];hp;hp=hp->next)
2214 if (!--target)
2215 return hp;
2216 } while(--loops > 0);
2217
2218 return NULL;
2219 }
2220
2221 void trojanscan_generatehost(char *buf, int maxsize, long *fakeip) {
2222 if(TROJANSCAN_HOST_MODE == TROJANSCAN_STEAL_HOST) {
2223 host *hp;
2224 int loops = 20;
2225
2226 buf[0] = '\0';
2227
2228 do {
2229 hp = trojanscan_selecthost();
2230 if(hp && (hp->clonecount <= TROJANSCAN_MAX_CLONE_COUNT) && !trojanscan_isip(hp->name->content)) {
2231 strlcpy(buf, hp->name->content, maxsize + 1);
2232 if(hp->nicks) {
2233 *fakeip = hp->nicks->ipaddress;
2234 } else {
2235 *fakeip = (trojanscan_minmaxrand(0, 65535) << 16) | trojanscan_minmaxrand(0, 65535);
2236 }
2237 break;
2238 }
2239 } while(--loops > 0);
2240 } else {
2241 char *cpos;
2242 int pieces = trojanscan_minmaxrand(2, 4), totallen = 0, a = 0, i;
2243 int *choices = malloc(sizeof(int) * (pieces + 1));
2244 int *lengths = malloc(sizeof(int) * (pieces + 1));
2245
2246 choices[pieces] = trojanscan_minmaxrand(0, trojanscan_tailpoolsize-1);
2247 lengths[pieces] = strlen(trojanscan_tailpool[choices[pieces]]->content) + 1;
2248 totallen += lengths[pieces];
2249
2250 for (i=0;i<pieces;i++) {
2251 choices[i] = trojanscan_minmaxrand(0, trojanscan_hostpoolsize-1);
2252 lengths[i] = strlen(trojanscan_hostpool[choices[i]]->content) + 1;
2253 if (totallen+lengths[i] > maxsize) {
2254 choices[i] = choices[pieces];
2255 lengths[i] = lengths[pieces];
2256 pieces-=(pieces-i);
2257 break;
2258 }
2259 totallen += lengths[i];
2260 }
2261
2262 for (i=0;i<pieces;i++) {
2263 for (cpos=trojanscan_hostpool[choices[i]]->content; *cpos;)
2264 buf[a++] = *cpos++;
2265 buf[a++] = '.';
2266 }
2267
2268 for (cpos=trojanscan_tailpool[choices[i]]->content; *cpos;) {
2269 buf[a++] = *cpos++;
2270 }
2271
2272 buf[a] = '\0';
2273 free(choices);
2274 free(lengths);
2275
2276 *fakeip = (trojanscan_minmaxrand(0, 65535) << 16) | trojanscan_minmaxrand(0, 65535);
2277 }
2278 }
2279
2280 void trojanscan_generatenick(char *buf, int maxsize) {
2281 int bits = trojanscan_minmaxrand(2, 3), loops = 0, wanttocopy, len = 0, i, d = 0, newmaxsize = maxsize - trojanscan_minmaxrand(0, 7);
2282 nick *np;
2283
2284 if(newmaxsize > 2)
2285 maxsize = newmaxsize;
2286
2287 do {
2288 np = trojanscan_selectuser();
2289 if(np) {
2290 wanttocopy = trojanscan_minmaxrand(1, (strlen(np->nick) / 2) + 3);
2291 for(i=0;((i<wanttocopy) && (len<maxsize));i++)
2292 buf[len++] = np->nick[i];
2293 if(++d > bits) {
2294 buf[len] = '\0';
2295 return;
2296 }
2297 }
2298 } while (++loops < 10);
2299 buf[0] = '\0';
2300 }
2301
2302 void trojanscan_generateident(char *buf, int maxsize) {
2303 nick *np = trojanscan_selectuser();
2304 buf[0] = '\0';
2305 if(np)
2306 strlcpy(buf, np->ident, maxsize + 1);
2307 }
2308
2309 void trojanscan_generaterealname(char *buf, int maxsize) {
2310 nick *np = trojanscan_selectuser();
2311 buf[0] = '\0';
2312 if(np)
2313 strlcpy(buf, np->realname->name->content, maxsize + 1);
2314 }
2315
2316 void trojanscan_database_close(void) {
2317 mysql_close(&trojanscan_sql);
2318 }
2319
2320 int trojanscan_database_connect(char *dbhost, char *dbuser, char *dbpass, char *db, unsigned int port) {
2321 mysql_init(&trojanscan_sql);
2322 if (!mysql_real_connect(&trojanscan_sql, dbhost, dbuser, dbpass, db, port, NULL, 0))
2323 return -1;
2324 return 0;
2325 }
2326
2327 void trojanscan_database_escape_string(char *dest, char *source, size_t length) {
2328 mysql_escape_string(dest, source, length);
2329 }
2330
2331 int trojanscan_database_query(char *format, ...) {
2332 char trojanscan_sqlquery[TROJANSCAN_QUERY_BUF_SIZE];
2333 va_list va;
2334
2335 va_start(va, format);
2336 vsnprintf(trojanscan_sqlquery, sizeof(trojanscan_sqlquery) - 1, format, va);
2337 va_end(va);
2338 return mysql_query(&trojanscan_sql, trojanscan_sqlquery);
2339 }
2340
2341 int trojanscan_database_num_rows(trojanscan_database_res *res) {
2342 return mysql_num_rows(res);
2343 }
2344
2345 trojanscan_database_res *trojanscan_database_store_result() {
2346 return mysql_store_result(&trojanscan_sql);
2347 }
2348
2349 trojanscan_database_row trojanscan_database_fetch_row(trojanscan_database_res *res) {
2350 return mysql_fetch_row(res);
2351 }
2352
2353 void trojanscan_database_free_result(trojanscan_database_res *res) {
2354 mysql_free_result(res);
2355 }
2356
2357 int trojanscan_isip(char *host) {
2358 char *p = host, components = 0, length = 0;
2359
2360 for(;*p;p++) {
2361 if(*p == '.') {
2362 if(((!length) || (length = 0)) || (++components > 3))
2363 return 0;
2364 } else {
2365 if ((++length > 3) || !isdigit(*p))
2366 return 0;
2367 }
2368 }
2369 return components == 3;
2370 }
2371