]> jfr.im git - irc/quakenet/newserv.git/blob - trojanscan/trojanscan.c
add7940710b5868f94ddd2537a821d14a88b33d3
[irc/quakenet/newserv.git] / trojanscan / trojanscan.c
1 /*
2 * Trojanscan version 2
3 *
4 * Trojanscan copyright (C) Chris Porter 2002-2005
5 * Newserv bits copyright (C) David Mansell 2002-2003
6 *
7 * TODO: CHECK::
8 * - Poke splidge about +r'ing bots, potential problems:
9 * - users might whine about T clone stealing account
10 * - would have to steal one already in use, so if trojans start using /msg q whois they'll see
11 * (though they have to be authed for this, they could use a clone of their own however)
12 */
13
14 #include "trojanscan.h"
15 #include "../lib/strlfunc.h"
16
17 void _init() {
18 trojanscan_cmds = newcommandtree();
19
20 addcommandtotree(trojanscan_cmds, "showcommands", TROJANSCAN_ACL_UNAUTHED, 0, &trojanscan_showcommands);
21 addcommandtotree(trojanscan_cmds, "help", TROJANSCAN_ACL_UNAUTHED, 1, &trojanscan_help);
22 addcommandtotree(trojanscan_cmds, "hello", TROJANSCAN_ACL_UNAUTHED | TROJANSCAN_ACL_OPER, 1, &trojanscan_hello);
23
24 addcommandtotree(trojanscan_cmds, "join", TROJANSCAN_ACL_STAFF, 1, &trojanscan_userjoin);
25 addcommandtotree(trojanscan_cmds, "chanlist", TROJANSCAN_ACL_STAFF, 0, &trojanscan_chanlist);
26 addcommandtotree(trojanscan_cmds, "whois", TROJANSCAN_ACL_STAFF, 1, &trojanscan_whois);
27
28 addcommandtotree(trojanscan_cmds, "changelev", TROJANSCAN_ACL_STAFF | TROJANSCAN_ACL_OPER, 2, &trojanscan_changelev);
29 addcommandtotree(trojanscan_cmds, "deluser", TROJANSCAN_ACL_TEAMLEADER | TROJANSCAN_ACL_OPER, 2, &trojanscan_deluser);
30 addcommandtotree(trojanscan_cmds, "mew", TROJANSCAN_ACL_STAFF | TROJANSCAN_ACL_OPER, 2, &trojanscan_mew);
31 addcommandtotree(trojanscan_cmds, "status", TROJANSCAN_ACL_STAFF | TROJANSCAN_ACL_OPER, 0, &trojanscan_status);
32 addcommandtotree(trojanscan_cmds, "listusers", TROJANSCAN_ACL_TEAMLEADER, 0, &trojanscan_listusers);
33
34 addcommandtotree(trojanscan_cmds, "rehash", TROJANSCAN_ACL_WEBSITE, 0, &trojanscan_rehash);
35
36 addcommandtotree(trojanscan_cmds, "cat", TROJANSCAN_ACL_CAT | TROJANSCAN_ACL_OPER, 1, &trojanscan_cat);
37
38 addcommandtotree(trojanscan_cmds, "reschedule", TROJANSCAN_ACL_DEVELOPER | TROJANSCAN_ACL_OPER, 0, &trojanscan_reschedule);
39
40 srand((int)time(NULL));
41
42 trojanscan_connect_schedule = scheduleoneshot(time(NULL) + 1, &trojanscan_connect, NULL);
43 }
44
45 void _fini(void) {
46 int i;
47 struct trojanscan_realchannels *rp = trojanscan_realchanlist, *oldrp;
48 struct trojanscan_rejoinlist *rj = trojanscan_schedulerejoins, *oldrj;
49
50 if (trojanscan_nick)
51 deregisterlocaluser(trojanscan_nick, NULL);
52
53 if (trojanscan_connect_schedule)
54 deleteschedule(trojanscan_connect_schedule, &trojanscan_connect, NULL);
55
56 if(trojanscan_schedule)
57 deleteschedule(trojanscan_schedule, &trojanscan_dojoin, NULL);
58
59 if(trojanscan_poolschedule)
60 deleteschedule(trojanscan_poolschedule, &trojanscan_repool, NULL);
61
62 if(trojanscan_cloneschedule)
63 deleteschedule(trojanscan_poolschedule, &trojanscan_registerclones, NULL);
64
65 while(rp) {
66 deleteschedule(rp->schedule, &trojanscan_dopart, (void *)rp);
67 oldrp = rp;
68 rp = rp->next;
69 free(oldrp);
70 }
71
72 while(rj) {
73 deleteschedule(rj->schedule, &trojanscan_rejoin_channel, (void *)rj);
74 freesstring(rj->channel);
75 oldrj = rj;
76 rj = rj->next;
77 free(oldrj);
78 }
79
80 if(trojanscan_initialschedule)
81 deleteschedule(trojanscan_initialschedule, &trojanscan_fill_channels, NULL);
82
83 deleteschedule(trojanscan_rehashschedule, &trojanscan_rehash_schedule, NULL);
84
85 for (i=0;i<TROJANSCAN_CLONE_TOTAL;i++)
86 if(trojanscan_swarm[i].clone) {
87 deregisterlocaluser(trojanscan_swarm[i].clone, NULL);
88 trojanscan_swarm[i].clone = NULL;
89 }
90 trojanscan_free_database();
91 trojanscan_free_channels();
92
93 for (i=0;i<trojanscan_hostpoolsize;i++)
94 freesstring(trojanscan_hostpool[i]);
95
96 for (i=0;i<trojanscan_tailpoolsize;i++)
97 freesstring(trojanscan_tailpool[i]);
98 trojanscan_database_close();
99 }
100
101 void trojanscan_connect(void *arg) {
102 sstring *mnick, *myident, *myhost, *myrealname, *myauthname;
103 sstring *dbhost, *dbuser, *dbpass, *db, *dbport, *temp;
104 channel *cp;
105 int length, i;
106 char buf[10];
107
108 trojanscan_connect_schedule = NULL;
109
110 for(i=0;i<TROJANSCAN_CLONE_TOTAL;i++)
111 trojanscan_swarm[i].index = i; /* sure this could be done with pointer arithmetic... */
112
113 trojanscan_hostpoolsize = 0;
114 trojanscan_tailpoolsize = 0;
115 trojanscan_hostmode = 0;
116 trojanscan_poolschedule = NULL;
117 trojanscan_cloneschedule = NULL;
118 trojanscan_realchanlist = NULL;
119 trojanscan_database.glines = 0;
120 trojanscan_database.detections = 0;
121
122 mnick = getcopyconfigitem("trojanscan", "nick", "T", NICKLEN);
123 myident = getcopyconfigitem("trojanscan", "ident", "trojanscan", NICKLEN);
124 myhost = getcopyconfigitem("trojanscan", "hostname", "trojanscan.slug.netsplit.net", HOSTLEN);
125 myrealname = getcopyconfigitem("trojanscan", "realname", "Trojanscan v" TROJANSCAN_VERSION, REALLEN);
126 myauthname = getcopyconfigitem("trojanscan", "authname", "T", ACCOUNTLEN);
127
128 dbhost = getcopyconfigitem("trojanscan", "dbhost", "localhost", HOSTLEN);
129 dbuser = getcopyconfigitem("trojanscan", "dbuser", "", NICKLEN);
130 dbpass = getcopyconfigitem("trojanscan", "dbpass", "", REALLEN);
131 db = getcopyconfigitem("trojanscan", "db", "", NICKLEN);
132
133 dbport = getcopyconfigitem("trojanscan", "dbport", "3306", ACCOUNTLEN);
134
135 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_MAXCHANS);
136 temp = getcopyconfigitem("trojanscan", "maxchans", buf, length);
137
138 trojanscan_maxchans = atoi(temp->content);
139 freesstring(temp);
140
141 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_CYCLETIME);
142 temp = getcopyconfigitem("trojanscan", "cycletime", buf, length);
143
144 trojanscan_cycletime = atoi(temp->content);
145 freesstring(temp);
146
147 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_PARTTIME);
148 temp = getcopyconfigitem("trojanscan", "parttime", buf, length);
149 trojanscan_part_time = atoi(temp->content);
150 freesstring(temp);
151
152 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_MAXUSERS);
153 temp = getcopyconfigitem("trojanscan", "maxusers", buf, length);
154 trojanscan_maxusers = atoi(temp->content);
155 freesstring(temp);
156
157 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_MINIMUM_HOSTS_BEFORE_POOL);
158 temp = getcopyconfigitem("trojanscan", "minpoolhosts", buf, length);
159 trojanscan_min_hosts = atoi(temp->content);
160 freesstring(temp);
161
162 if ((trojanscan_cycletime / trojanscan_maxchans) < 1) {
163 Error("trojanscan", ERR_FATAL, "Cycletime / maxchans < 1, increase cycletime or decrease maxchans else cycling breaks.");
164 return; /* PPA: module failed to load */
165 }
166
167 length = snprintf(buf, sizeof(buf) - 1, "%d", TROJANSCAN_DEFAULT_MINIMUM_CHANNEL_SIZE);
168 temp = getcopyconfigitem("trojanscan", "minchansize", buf, length);
169 trojanscan_minchansize = atoi(temp->content);
170 freesstring(temp);
171
172 trojanscan_nick = registerlocaluser(mnick->content, myident->content, myhost->content, myrealname->content, myauthname->content, UMODE_SERVICE | UMODE_DEAF |
173 UMODE_OPER | UMODE_INV |
174 UMODE_ACCOUNT,
175 &trojanscan_handlemessages);
176
177 if (trojanscan_database_connect(dbhost->content, dbuser->content, dbpass->content, db->content, atoi(dbport->content)) < 0) {
178 Error("trojanscan", ERR_FATAL, "Cannot connect to database host!");
179 return; /* PPA: module failed to load */
180 }
181
182 trojanscan_database_query("CREATE TABLE phrases (id INT(10) PRIMARY KEY AUTO_INCREMENT, wormid INT(10) NOT NULL, phrase TEXT NOT NULL, priority INT(10) DEFAULT 0 NOT NULL, dateadded int(10))");
183 trojanscan_database_query("CREATE TABLE worms (id INT(10) PRIMARY KEY AUTO_INCREMENT, wormname TEXT NOT NULL, glinetype INT DEFAULT 0, data text, hitmsgs BOOL DEFAULT 1, hitchans BOOL DEFAULT 0, epidemic BOOL DEFAULT 0, privinfo text)");
184 trojanscan_database_query("CREATE TABLE logs (id INT(10) PRIMARY KEY AUTO_INCREMENT, userid INT(10) NOT NULL, act TEXT NOT NULL, description TEXT NOT NULL, ts TIMESTAMP)");
185 trojanscan_database_query("CREATE TABLE channels (id INT(10) PRIMARY KEY AUTO_INCREMENT, channel VARCHAR(%d) NOT NULL, exempt BOOL DEFAULT 0)", CHANNELLEN);
186 trojanscan_database_query("CREATE TABLE users (id INT(10) PRIMARY KEY AUTO_INCREMENT, authname VARCHAR(%d) NOT NULL, authlevel TINYINT(4) NOT NULL)", ACCOUNTLEN);
187 trojanscan_database_query("CREATE TABLE hits (id INT(10) PRIMARY KEY AUTO_INCREMENT, nickname VARCHAR(%d) NOT NULL, ident VARCHAR(%d) NOT NULL, host VARCHAR(%d) NOT NULL, phrase INT(10) NOT NULL, ts TIMESTAMP, messagetype VARCHAR(1) NOT NULL DEFAULT 'm', glined BOOL DEFAULT 1)", NICKLEN, USERLEN, HOSTLEN);
188 trojanscan_database_query("CREATE TABLE settings (id INT(10) PRIMARY KEY AUTO_INCREMENT, setting VARCHAR(15) NOT NULL, value VARCHAR(15) NOT NULL)");
189 trojanscan_database_query("CREATE TABLE wwwlogs (id INT(10) PRIMARY KEY AUTO_INCREMENT, authid INT(10) NOT NULL, ip VARCHAR(15), action TEXT, ts TIMESTAMP)");
190 trojanscan_database_query("CREATE TABLE unknownlog (id INT(10) PRIMARY KEY AUTO_INCREMENT, data TEXT, user VARCHAR(%d) NOT NULL, ts TIMESTAMP)", NICKLEN+USERLEN+HOSTLEN+3);
191
192 trojanscan_database_query("DELETE FROM settings");
193 trojanscan_database_query("INSERT INTO settings (setting, value) VALUES ('rehash','0')");
194 trojanscan_database_query("INSERT INTO settings (setting, value) VALUES ('changed','0')");
195
196 trojanscan_read_database(1);
197
198 cp = findchannel(TROJANSCAN_OPERCHANNEL);
199 if (!cp) {
200 localcreatechannel(trojanscan_nick, TROJANSCAN_OPERCHANNEL);
201 } else {
202 if(!localjoinchannel(trojanscan_nick, cp))
203 localgetops(trojanscan_nick, cp);
204 }
205
206 cp = findchannel(TROJANSCAN_CHANNEL);
207 if (!cp) {
208 localcreatechannel(trojanscan_nick, TROJANSCAN_CHANNEL);
209 } else {
210 if(!localjoinchannel(trojanscan_nick, cp))
211 localgetops(trojanscan_nick, cp);
212 }
213
214 cp = findchannel(TROJANSCAN_PEONCHANNEL);
215 if (!cp) {
216 localcreatechannel(trojanscan_nick, TROJANSCAN_PEONCHANNEL);
217 } else {
218 if(!localjoinchannel(trojanscan_nick, cp))
219 localgetops(trojanscan_nick, cp);
220 }
221
222 freesstring(mnick);
223 freesstring(myident);
224 freesstring(myhost);
225 freesstring(myrealname);
226 freesstring(myauthname);
227 freesstring(dbhost);
228 freesstring(dbuser);
229 freesstring(dbpass);
230 freesstring(db);
231 freesstring(dbport);
232 trojanscan_registerclones(NULL);
233
234 trojanscan_initialschedule = scheduleoneshot(time(NULL) + 300, &trojanscan_fill_channels, NULL);
235 trojanscan_rehashschedule = scheduleoneshot(time(NULL) + 60, &trojanscan_rehash_schedule, NULL);
236
237 }
238
239 void trojanscan_rehash_schedule(void *arg) {
240 trojanscan_rehashschedule = scheduleoneshot(time(NULL) + 60, &trojanscan_rehash_schedule, NULL);
241 if (!(trojanscan_database_query("SELECT value FROM settings WHERE setting = 'rehash'"))) {
242 trojanscan_database_res *res;
243 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
244 if (trojanscan_database_num_rows(res) > 0) {
245 trojanscan_database_row sqlrow = trojanscan_database_fetch_row(res);
246 if (sqlrow && (sqlrow[0][0] == '1')) {
247 trojanscan_mainchanmsg("n: rehash initiated by website. . .");
248 trojanscan_read_database(0);
249 }
250 }
251 trojanscan_database_free_result(res);
252 }
253 }
254
255 }
256
257 void trojanscan_free_database(void) {
258 int i;
259 for(i=0;i<trojanscan_database.total_channels;i++)
260 freesstring(trojanscan_database.channels[i].name);
261 free(trojanscan_database.channels);
262 for(i=0;i<trojanscan_database.total_phrases;i++)
263 if (trojanscan_database.phrases[i].phrase) {
264 free(trojanscan_database.phrases[i].phrase);
265 free(trojanscan_database.phrases[i].hint);
266 }
267 free(trojanscan_database.phrases);
268 for(i=0;i<trojanscan_database.total_worms;i++)
269 freesstring(trojanscan_database.worms[i].name);
270 free(trojanscan_database.worms);
271 trojanscan_database.total_channels = 0;
272 trojanscan_database.total_phrases = 0;
273 trojanscan_database.total_worms = 0;
274
275 }
276
277 sstring *trojanscan_getsstring(char *string, int length) {
278 int i;
279
280 for(i=0;i<length;i++) {
281 if ((string[i] == '\r') || (string[i] == '\n')) {
282 Error("trojanscan", ERR_WARNING, "Error reading %s at position %d, set to ERROR!", string, i+1);
283 return getsstring("ERROR", sizeof("ERROR"));
284 }
285 }
286
287 return getsstring(string, length);
288 }
289
290 int trojanscan_strip_codes(char *buf, size_t max, char *original) {
291 int i, j, length = TROJANSCAN_MMIN(strlen(original), max-1);
292 char *p2 = original, *p3, flag = 0;
293 p3 = buf;
294 for(i=0;i<length+1;i++) {
295 switch (*p2) {
296 case '\002':
297 case '\017':
298 case '\026':
299 case '\037':
300 break;
301 case '\003':
302 for(j=0;j<6;j++) {
303 if ((i + 1) > length)
304 break;
305 if ((j == 4) && flag)
306 break;
307 p2++;
308 i++;
309 if ((j == 0) && (!((*p2 >= '0') && (*p2 <= '9'))))
310 break;
311 if (j == 1) {
312
313 if (*p2 == ',') {
314 if ((i + 1) > length)
315 break;
316 if (!((*(p2 + 1) >= '0') && (*(p2 + 1) <= '9')))
317 break;
318 flag = 1;
319 } else if ((*p2 >= '0') && (*p2 <= '9')) {
320 flag = 0;
321 } else {
322 break;
323 }
324 }
325 if (j == 2) {
326 if (flag) {
327 if (!((*p2 >= '0') && (*p2 <= '9')))
328 break;
329 } else {
330 if (*p2 != ',') {
331 break;
332 } else {
333 if ((i + 1) > length)
334 break;
335 if (!((*(p2 + 1) >= '0') && (*(p2 + 1) <= '9')))
336 break;
337 }
338 }
339 }
340 if ((j == 3) && (!((*p2 >= '0') && (*p2 <= '9'))))
341 break;
342 if ((j == 4) && (!((*p2 >= '0') && (*p2 <= '9'))))
343 break;
344 }
345 p2--;
346 i--;
347 break;
348
349 default:
350 *p3 = *p2;
351 p3++;
352 break;
353 }
354 p2++;
355 }
356 return p3 - buf;
357 }
358
359 struct trojanscan_worms *trojanscan_find_worm_by_id(int id) {
360 int i;
361 for(i=0;i<trojanscan_database.total_worms;i++)
362 if ((trojanscan_database.worms[i].id == id))
363 return &trojanscan_database.worms[i];
364 return NULL;
365 }
366
367 void trojanscan_read_database(int first_time) {
368 const char *error;
369 int erroroffset, i, tempresult;
370
371 trojanscan_database_res *res;
372 trojanscan_database_row sqlrow;
373
374 if (!first_time) {
375 trojanscan_free_database();
376 } else {
377 trojanscan_database.total_channels = 0;
378 trojanscan_database.total_phrases = 0;
379 trojanscan_database.total_worms = 0;
380 }
381
382 if (!(trojanscan_database_query("SELECT channel, exempt FROM channels"))) {
383 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
384 trojanscan_database.total_channels = trojanscan_database_num_rows(res);
385 if (trojanscan_database.total_channels > 0) {
386 if ((trojanscan_database.channels = (trojanscan_channels *)malloc(sizeof(trojanscan_channels) * trojanscan_database.total_channels))) {
387 if ((trojanscan_database.total_channels>0) && trojanscan_database.channels) {
388 i = 0;
389 while((sqlrow = trojanscan_database_fetch_row(res))) {
390 trojanscan_database.channels[i].name = trojanscan_getsstring(sqlrow[0], strlen(sqlrow[0]));
391 trojanscan_database.channels[i].exempt = (sqlrow[1][0] == '1');
392 i++;
393 }
394 }
395 }
396 }
397 trojanscan_database_free_result(res);
398 }
399 }
400
401 if (!(trojanscan_database_query("SELECT id, wormname, glinetype, length(data), hitmsgs, hitchans, epidemic FROM worms"))) {
402 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
403 trojanscan_database.total_worms = trojanscan_database_num_rows(res);
404 if (trojanscan_database.total_worms > 0) {
405 if ((trojanscan_database.worms = (trojanscan_worms *)malloc(sizeof(trojanscan_worms) * trojanscan_database.total_worms))) {
406 i = 0;
407 while((sqlrow = trojanscan_database_fetch_row(res))) {
408 trojanscan_database.worms[i].id = atoi(sqlrow[0]);
409 trojanscan_database.worms[i].name = trojanscan_getsstring(sqlrow[1], strlen(sqlrow[1]));
410 tempresult = atoi(sqlrow[2]);
411 trojanscan_database.worms[i].glineuser = (tempresult == 0);
412 trojanscan_database.worms[i].glinehost = (tempresult == 1);
413 trojanscan_database.worms[i].monitor = (tempresult == 2);
414 if(sqlrow[3]) {
415 trojanscan_database.worms[i].datalen = ((atoi(sqlrow[3]) == 0) ? 0 : 1);
416 } else {
417 trojanscan_database.worms[i].datalen = 0;
418 }
419
420 trojanscan_database.worms[i].hitpriv = (atoi(sqlrow[4]) == 1);
421 trojanscan_database.worms[i].hitchans = (atoi(sqlrow[5]) == 1);
422 trojanscan_database.worms[i].epidemic = (atoi(sqlrow[6]) == 1);
423
424 i++;
425 }
426 }
427 }
428 trojanscan_database_free_result(res);
429 }
430 }
431
432 if (!(trojanscan_database_query("SELECT id, phrase, wormid FROM phrases ORDER BY priority DESC"))) {
433 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
434 trojanscan_database.total_phrases = trojanscan_database_num_rows(res);
435 if (trojanscan_database.total_phrases > 0) {
436 if ((trojanscan_database.phrases = (trojanscan_phrases *)malloc(sizeof(trojanscan_phrases) * trojanscan_database.total_phrases))) {
437 i = 0;
438 while((sqlrow = trojanscan_database_fetch_row(res))) {
439 trojanscan_database.phrases[i].id = atoi(sqlrow[0]);
440 trojanscan_database.phrases[i].worm = trojanscan_find_worm_by_id(atoi(sqlrow[2]));
441 if (!(trojanscan_database.phrases[i].phrase = pcre_compile(sqlrow[1], PCRE_CASELESS, &error, &erroroffset, NULL))) {
442 Error("trojanscan", ERR_WARNING, "Error compiling expression %s at offset %d: %s", sqlrow[1], erroroffset, error);
443 } else {
444 if ((trojanscan_database.phrases[i].hint = pcre_study(trojanscan_database.phrases[i].phrase, 0, &error))) {
445 Error("trojanscan", ERR_WARNING, "Error studying expression %s: %s", sqlrow[1], error);
446 free(trojanscan_database.phrases[i].phrase);
447 trojanscan_database.phrases[i].phrase = NULL;
448 }
449 }
450 i++;
451 }
452 }
453 }
454 trojanscan_database_free_result(res);
455 }
456 }
457
458 trojanscan_database_query("UPDATE settings SET value = '0' where setting = 'rehash'");
459
460 }
461
462 void trojanscan_log(nick *np, char *event, char *details, ...) {
463 int nickid = 0;
464 char eevent[TROJANSCAN_QUERY_TEMP_BUF_SIZE], edetails[TROJANSCAN_QUERY_TEMP_BUF_SIZE], buf[513];
465 va_list va;
466
467 va_start(va, details);
468 vsnprintf(buf, sizeof(buf) - 1, details, va);
469 va_end(va);
470
471 if (np)
472 if (IsAccount(np))
473 nickid = trojanscan_user_id_by_authname(np->authname);
474
475 trojanscan_database_escape_string(eevent, event, strlen(event));
476 trojanscan_database_escape_string(edetails, buf, strlen(buf));
477 trojanscan_database_query("INSERT INTO logs (userid, act, description) VALUES ('%d', '%s', '%s')", nickid, eevent, edetails);
478 }
479
480 void trojanscan_generateclone(void *arg) {
481 int i, loops = 0, modes = UMODE_XOPER | UMODE_INV;
482 char c_nick[NICKLEN+1], c_ident[USERLEN+1], c_host[HOSTLEN+1], c_real[REALLEN+1];
483 long fakeip;
484
485 i = (int)arg;
486
487 /* PPA: unlikely to be infinite */
488 do {
489 c_nick[0] = '\0';
490 if (!loops && trojanscan_hostmode) /* only have one go at this */
491 trojanscan_generatenick(c_nick, NICKLEN);
492 if(!c_nick[0])
493 trojanscan_gennick(c_nick, trojanscan_minmaxrand(7, TROJANSCAN_MMIN(13, NICKLEN)));
494 loops++;
495 } while ((getnickbynick(c_nick) != NULL));
496
497 trojanscan_generateident(c_ident, USERLEN);
498 if(!c_ident[0])
499 trojanscan_genident(c_ident, trojanscan_minmaxrand(4, TROJANSCAN_MMIN(8, USERLEN)));
500
501 if(trojanscan_hostmode) {
502 trojanscan_generatehost(c_host, HOSTLEN, &fakeip);
503 if(!c_host[0])
504 trojanscan_genhost(c_host, HOSTLEN, &fakeip);
505 } else {
506 trojanscan_genhost(c_host, HOSTLEN, &fakeip);
507 }
508
509 trojanscan_generaterealname(c_real, REALLEN);
510 if(!c_real[0])
511 trojanscan_genreal(c_real, trojanscan_minmaxrand(15, TROJANSCAN_MMIN(50, REALLEN)));
512
513 trojanscan_swarm[i].clone = registerlocaluser(c_nick, c_ident, c_host, c_real, NULL, modes, &trojanscan_clonehandlemessages);
514 trojanscan_swarm[i].fakeip = fakeip;
515
516 if(trojanscan_swarm[i].clone && !trojanscan_swarm_created) {
517 nick *np = trojanscan_selectuser();
518 if(np) /* select a 'random' sign on time for whois generation */
519 trojanscan_swarm[i].clone->timestamp = np->timestamp;
520 }
521 trojanscan_swarm[i].remaining = trojanscan_minmaxrand(5, 100);
522
523 trojanscan_swarm[i].sitting = 0;
524
525 }
526
527 void trojanscan_free_channels(void) {
528 int i;
529 if(trojanscan_chans) {
530 for(i=0;i<trojanscan_activechans;i++)
531 freesstring(trojanscan_chans[i].channel);
532 free(trojanscan_chans);
533 trojanscan_chans = NULL;
534 trojanscan_activechans = 0;
535 }
536 }
537
538 void trojanscan_repool(void *arg) {
539 if (trojanscan_generatepool() < TROJANSCAN_MINPOOLSIZE) {
540 trojanscan_hostmode = 0;
541 return;
542 } else {
543 trojanscan_hostmode = 1;
544 trojanscan_poolschedule = scheduleoneshot(time(NULL) + TROJANSCAN_POOL_REGENERATION, &trojanscan_repool, NULL);
545 }
546 }
547
548 void trojanscan_registerclones(void *arg) {
549 unsigned int i;
550
551 if (trojanscan_generatepool() < TROJANSCAN_MINPOOLSIZE) {
552 trojanscan_hostmode = 0;
553 trojanscan_cloneschedule = scheduleoneshot(time(NULL) + 10, &trojanscan_registerclones, NULL);
554 return;
555 } else {
556 trojanscan_hostmode = 1;
557 trojanscan_poolschedule = scheduleoneshot(time(NULL) + TROJANSCAN_POOL_REGENERATION, &trojanscan_repool, NULL);
558 trojanscan_cloneschedule = NULL;
559 }
560
561 for (i=0;i<TROJANSCAN_CLONE_TOTAL;i++)
562 trojanscan_generateclone((void *)i);
563 trojanscan_mainchanmsg("n: swarm (%d clones) created.", TROJANSCAN_CLONE_TOTAL);
564 trojanscan_swarm_created = 1;
565 }
566
567 int trojanscan_status(void *sender, int cargc, char **cargv) {
568 nick *np = (nick *)sender;
569 trojanscan_log(np, "status", "");
570 trojanscan_reply(np, "Channels in schedule: %d", trojanscan_activechans);
571 trojanscan_reply(np, "Channels in database: %d", trojanscan_database.total_channels);
572 trojanscan_reply(np, "Phrases: %d", trojanscan_database.total_phrases);
573 trojanscan_reply(np, "Worms: %d", trojanscan_database.total_worms);
574 trojanscan_reply(np, "Detections: %d", trojanscan_database.detections);
575 trojanscan_reply(np, "Glines: %d", trojanscan_database.glines);
576 trojanscan_reply(np, "Host/tail pool size: %d", TROJANSCAN_POOLSIZE);
577 trojanscan_reply(np, "Cycletime: %d", trojanscan_cycletime);
578 trojanscan_reply(np, "Clones: %d", TROJANSCAN_CLONE_TOTAL);
579 return CMD_OK;
580 }
581
582 int trojanscan_chanlist(void *sender, int cargc, char **cargv) {
583 int i;
584 nick *np = (nick *)sender;
585 char buf[CHANNELLEN * 2 + 20];
586 trojanscan_reply(np, "Channel list (%d total):", trojanscan_activechans);
587 buf[0] = '\0';
588
589 for(i=0;i<trojanscan_activechans;i++) {
590 if(trojanscan_chans[i].channel->length + 3 > sizeof(buf) - strlen(buf)) {
591 trojanscan_reply(np, "%s", buf);
592 buf[0] = '\0';
593 }
594
595 /* if splidge sees this I'm going to die */
596 strlcat(buf, trojanscan_chans[i].channel->content, sizeof(buf));
597 strlcat(buf, " ", sizeof(buf));
598 }
599 if(buf[0])
600 trojanscan_reply(np, "%s", buf);
601
602 trojanscan_reply(np, "Done.");
603 return CMD_OK;
604 }
605
606 int trojanscan_whois(void *sender, int cargc, char **cargv) {
607 char *tochange;
608 nick *np = (nick *)sender, *np2;
609 int templevel;
610
611 if (cargc < 1) {
612 trojanscan_reply(np, "Not enough parameters.");
613 return CMD_ERROR;
614 }
615
616 if (cargv[0][0] == '#') {
617 tochange = cargv[0] + 1;
618 } else {
619 int i;
620 np2 = getnickbynick(cargv[0]);
621 if (!np2) {
622 trojanscan_reply(np, "That nickname is not on the network.");
623 return CMD_ERROR;
624 }
625 for(i=0;i<TROJANSCAN_CLONE_TOTAL;i++) {
626 if(trojanscan_swarm[i].clone->nick && !ircd_strcmp(trojanscan_swarm[i].clone->nick, np2->nick)) {
627 trojanscan_reply(np, "Nickname : %s", np2->nick);
628 trojanscan_reply(np, "Swarm : yes", trojanscan_swarm[i].clone->nick);
629 return CMD_OK;
630 }
631 }
632 if (!IsAccount(np2)) {
633 trojanscan_reply(np, "User is not authed.");
634 return CMD_OK;
635 }
636 tochange = np2->authname;
637 }
638
639 templevel = trojanscan_user_level_by_authname(tochange);
640 if (templevel == -1) {
641 trojanscan_reply(np, "User does not exist.");
642 } else {
643 union trojanscan_userlevel flags;
644 flags.number = templevel;
645 trojanscan_reply(np, "Authname : %s", tochange);
646 trojanscan_reply(np, "Flags : +" TROJANSCAN_FLAG_MASK, TrojanscanFlagsInfo(flags));
647 }
648
649 return CMD_OK;
650 }
651
652 void trojanscan_privmsg_chan_or_nick(channel *cp, nick *np, char *message, ...) {
653 char buf[513];
654 va_list va;
655
656 if (!trojanscan_nick)
657 return;
658
659 va_start(va, message);
660 vsnprintf(buf, sizeof(buf) - 1, message, va);
661 va_end(va);
662
663 if (cp) {
664 sendmessagetochannel(trojanscan_nick, cp, buf);
665 } else {
666 sendmessagetouser(trojanscan_nick, np, buf);
667 }
668
669 }
670
671 int trojanscan_mew(void *sender, int cargc, char **cargv) {
672 nick *np = (nick *)sender, *np2 = NULL;
673 channel *cp = NULL;
674
675 if (cargc < 2) {
676 trojanscan_reply(np, "Not enough paramaters.");
677 return CMD_ERROR;
678 }
679
680 if(cargv[0][0] == '#') {
681 if (!(cp = findchannel(cargv[0]))) {
682 trojanscan_reply(np, "Channel not found.");
683 return CMD_ERROR;
684 }
685 trojanscan_log(np, "mew", "%s %s", cp->index->name->content, cargv[1]);
686 } else {
687 if (!(np2 = getnickbynick(cargv[0]))) {
688 trojanscan_reply(np, "Nickname is not present on the network.");
689 return CMD_ERROR;
690 }
691 trojanscan_log(np, "mew", "%s %s", np2->nick, cargv[1]);
692 }
693
694 trojanscan_privmsg_chan_or_nick(cp, np2, "\001ACTION mews hopefully at %s\001", cargv[1]);
695
696 if (cp) {
697 trojanscan_reply(np, "Mewed at %s in %s.", cargv[1], cp->index->name->content);
698 } else {
699 trojanscan_reply(np, "Mewed at %s at %s.", cargv[1], np2->nick);
700 }
701 return CMD_OK;
702 }
703
704 int trojanscan_cat(void *sender, int cargc, char **cargv) {
705 nick *np = (nick *)sender, *np2 = NULL;
706 channel *cp = NULL;
707 FILE *cat;
708 char buf[513], *p;
709
710 if (cargc < 1) {
711 trojanscan_reply(np, "Not enough paramaters.");
712 return CMD_ERROR;
713 }
714
715 if(cargv[0][0] == '#') {
716 if (!(cp = findchannel(cargv[0]))) {
717 trojanscan_reply(np, "Channel not found.");
718 return CMD_ERROR;
719 }
720 trojanscan_log(np, "cat", cp->index->name->content);
721 } else {
722 if (!(np2 = getnickbynick(cargv[0]))) {
723 trojanscan_reply(np, "Nickname is not present on the network.");
724 return CMD_ERROR;
725 }
726 trojanscan_log(np, "cat", np2->nick);
727 }
728
729 if ((!(cat = fopen(TROJANSCAN_CAT, "r")))) {
730 trojanscan_reply(np, "Unable to open cat!");
731 return CMD_ERROR;
732 }
733
734 while (fgets(buf, sizeof(buf) - 1, cat)) {
735 if ((p = strchr(buf, '\n'))) {
736 *p = '\0';
737 trojanscan_privmsg_chan_or_nick(cp, np2, "%s", buf);
738 } else if (feof(cat)) {
739 trojanscan_privmsg_chan_or_nick(cp, np2, "%s", buf);
740 }
741 }
742
743 fclose(cat);
744
745 if (cp) {
746 trojanscan_reply(np, "Spammed cat in %s.", cp->index->name->content);
747 } else {
748 trojanscan_reply(np, "Spammed cat at %s.", np2->nick);
749 }
750
751 return CMD_OK;
752 }
753
754 int trojanscan_reschedule(void *sender, int cargc, char **cargv) {
755 nick *np = (nick *)sender;
756 trojanscan_log(np, "reschedule", "");
757 trojanscan_fill_channels(NULL);
758
759 trojanscan_reply(np, "Rescheduled.");
760 return CMD_OK;
761 }
762
763 int trojanscan_listusers(void *sender, int cargc, char **cargv) {
764 nick *np = (nick *)sender;
765
766 trojanscan_log(np, "listusers", "");
767
768 trojanscan_reply(np, "User list:");
769
770 if (!(trojanscan_database_query("SELECT authname, authlevel FROM users ORDER BY authlevel DESC, authname"))) {
771 trojanscan_database_res *res;
772 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
773 if (trojanscan_database_num_rows(res)) {
774 trojanscan_database_row sqlrow;
775 union trojanscan_userlevel flags;
776 while((sqlrow = trojanscan_database_fetch_row(res))) {
777 flags.number = atoi(sqlrow[1]);
778 trojanscan_reply(np, "%s +" TROJANSCAN_FLAG_MASK, sqlrow[0], TrojanscanIsDeveloper(flags) ? "d" : "", TrojanscanIsTeamLeader(flags) ? "t" : "", TrojanscanIsStaff(flags) ? "s" : "", TrojanscanIsWebsite(flags) ? "w" : "", TrojanscanIsCat(flags) ? "c" : "");
779 }
780 }
781 trojanscan_database_free_result(res);
782 }
783 }
784
785 trojanscan_reply(np, "Done.");
786 return CMD_OK;
787 }
788
789 int trojanscan_help(void *sender, int cargc, char **cargv) {
790 nick *np = (nick *)sender;
791
792 if (cargc == 0) {
793 trojanscan_reply(np, "Not enough parameters.");
794 return CMD_ERROR;
795 }
796
797 if (!strcasecmp("help", cargv[0])) {
798 trojanscan_reply(np, "Syntax: help <command name>");
799 trojanscan_reply(np, "Gives help on commands.");
800 } else if (!strcasecmp("status", cargv[0])) {
801 trojanscan_reply(np, "Syntax: status");
802 trojanscan_reply(np, "Gives statistical information about the bot.");
803 } else if (!strcasecmp("join", cargv[0])) {
804 trojanscan_reply(np, "Syntax: join <#channel>");
805 trojanscan_reply(np, "Orders a clone to join supplied channel.");
806 } else if (!strcasecmp("showcommands", cargv[0])) {
807 trojanscan_reply(np, "Syntax: showcommands");
808 trojanscan_reply(np, "Pretty obvious.");
809 } else if (!strcasecmp("hello", cargv[0])) {
810 trojanscan_reply(np, "Syntax: hello ?nickname?");
811 trojanscan_reply(np, "Creates a new user.");
812 } else if (!strcasecmp("rehash", cargv[0])) {
813 trojanscan_reply(np, "Syntax: rehash");
814 trojanscan_reply(np, "Reloads bot database.");
815 } else if (!strcasecmp("changelev", cargv[0])) {
816 trojanscan_reply(np, "Syntax: changelev <nickname or #authname> <flags>");
817 trojanscan_reply(np, "Changes access flags of selected user to supplied input.");
818 trojanscan_reply(np, "+d -> developer");
819 trojanscan_reply(np, "+t -> team leader");
820 trojanscan_reply(np, "+s -> staff");
821 trojanscan_reply(np, "+w -> web management");
822 trojanscan_reply(np, "+c -> cat access");
823 } else if (!strcasecmp("deluser", cargv[0])) {
824 trojanscan_reply(np, "Syntax: deluser <nickname or #authname>");
825 trojanscan_reply(np, "Deletes selected user from my database.");
826 } else if (!strcasecmp("mew", cargv[0])) {
827 trojanscan_reply(np, "Syntax: mew <#channel or nickname> <nickname>");
828 trojanscan_reply(np, "Gracefully mews at target in selected channel or query.");
829 } else if (!strcasecmp("cat", cargv[0])) {
830 trojanscan_reply(np, "Syntax: cat <#channel or nickname>");
831 trojanscan_reply(np, "Shows the almightly cat.");
832 } else if (!strcasecmp("reschedule", cargv[0])) {
833 trojanscan_reply(np, "Syntax: reschedule");
834 trojanscan_reply(np, "Recalculates bots schedule.");
835 } else if (!strcasecmp("chanlist", cargv[0])) {
836 trojanscan_reply(np, "Syntax: chanlist");
837 trojanscan_reply(np, "Displays bots current channel list.");
838 } else if (!strcasecmp("whois", cargv[0])) {
839 trojanscan_reply(np, "Syntax: whois <nickname or #authname>");
840 trojanscan_reply(np, "Displays information on given user.");
841 } else if (!strcasecmp("whois", cargv[0])) {
842 trojanscan_reply(np, "Syntax: listusers <flags>");
843 trojanscan_reply(np, "Displays users with listusersing flags.");
844 } else {
845 trojanscan_reply(np, "Command not found.");
846 return CMD_ERROR;
847 }
848
849 return CMD_OK;
850 }
851
852 int trojanscan_hello(void *sender, int cargc, char **cargv) {
853 nick *np = (nick *)sender, *toadd;
854 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE];
855 int level = 0;
856
857 if (cargc > 0) {
858 toadd = getnickbynick(cargv[0]);
859 if (!toadd) {
860 trojanscan_reply(np, "That nickname is not on the network.");
861 return CMD_ERROR;
862 }
863 if (!IsAccount(toadd)) {
864 trojanscan_reply(np, "That user is not authed with the network.");
865 return CMD_ERROR;
866 }
867 } else {
868 if (!IsAccount(np)) {
869 trojanscan_reply(np, "You are not authed with the network, auth before creating your user.");
870 return CMD_ERROR;
871 }
872 toadd = np;
873 }
874
875 if (trojanscan_user_level_by_authname(toadd->authname)!=-1) {
876 trojanscan_reply(np, "Authname (%s) is already on file.", toadd->authname);
877 return CMD_ERROR;
878 }
879
880 trojanscan_log(np, "hello", toadd->authname);
881
882 if (!(trojanscan_database_query("SELECT id FROM users LIMIT 1"))) {
883 trojanscan_database_res *res;
884 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
885 if (trojanscan_database_num_rows(res) == 0)
886 level = TROJANSCAN_ACL_DEVELOPER | TROJANSCAN_ACL_STAFF | TROJANSCAN_ACL_WEBSITE | TROJANSCAN_ACL_CAT;
887 trojanscan_database_free_result(res);
888 }
889 }
890
891 trojanscan_database_escape_string(eaccount, toadd->authname, strlen(toadd->authname));
892 trojanscan_database_query("INSERT INTO users (authname, authlevel) VALUES ('%s', %d)", eaccount, level);
893 trojanscan_reply(np, "Account added to database, account %s%s.", toadd->authname, level>0?" (first user so developer access)":"");
894
895 return CMD_OK;
896 }
897
898 int trojanscan_user_level_by_authname(char *authname) {
899 int result = -1, sl = strlen(authname);
900 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE];
901
902 trojanscan_database_escape_string(eaccount, authname, sl);
903 if (!(trojanscan_database_query("SELECT authlevel, authname FROM users WHERE authname = '%s'", eaccount))) {
904 trojanscan_database_res *res;
905 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
906 if (trojanscan_database_num_rows(res) > 0) {
907 trojanscan_database_row sqlrow = trojanscan_database_fetch_row(res);
908 result = atoi(sqlrow[0]);
909 strlcpy(authname, sqlrow[1], sl + 1);
910 }
911 trojanscan_database_free_result(res);
912 }
913 }
914 return result;
915 }
916
917 int trojanscan_user_id_by_authname(char *authname) {
918 int result = 0;
919 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE];
920
921 trojanscan_database_escape_string(eaccount, authname, strlen(authname));
922 if (!(trojanscan_database_query("SELECT id FROM users WHERE authname = '%s'", eaccount))) {
923 trojanscan_database_res *res;
924 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
925 if (trojanscan_database_num_rows(res) > 0) {
926 trojanscan_database_row sqlrow = trojanscan_database_fetch_row(res);
927 result = atoi(sqlrow[0]);
928 }
929 trojanscan_database_free_result(res);
930 }
931 }
932 return result;
933 }
934
935 struct trojanscan_clones *trojanscan_selectclone(char type) {
936 struct trojanscan_clones *rc;
937 int randomclone, hits = 0, minlimit, maxlimit;
938
939 if(type == TROJANSCAN_WATCH_CLONES) {
940 minlimit = TROJANSCAN_CLONE_MAX;
941 maxlimit = minlimit + TROJANSCAN_WATCHCLONE_MAX - 1;
942 } else {
943 minlimit = 0;
944 maxlimit = TROJANSCAN_CLONE_MAX - 1;
945 }
946
947 do {
948 randomclone = trojanscan_minmaxrand(minlimit, maxlimit);
949 if (hits++ > 200)
950 return NULL;
951 rc = &trojanscan_swarm[randomclone];
952 if ((type == TROJANSCAN_NORMAL_CLONES) && (rc->sitting == 0) && (rc->remaining == 0))
953 break;
954
955 } while (rc->remaining == 0);
956
957 if(type == TROJANSCAN_NORMAL_CLONES) {
958 if ((rc->sitting == 0) && (rc->remaining == 0)) {
959 if ((!rc->remaining) && (!rc->sitting)) {
960 if (rc->clone) {
961 deregisterlocaluser(rc->clone, NULL);
962 rc->clone = NULL;
963 }
964 trojanscan_generateclone((void *)rc->index);
965 }
966 }
967 }
968
969 return rc;
970
971 }
972
973 /* hack hack hack */
974 int trojanscan_nickbanned(trojanscan_clones *np, channel *cp) {
975 int ret;
976 long realip = np->clone->ipaddress;
977
978 np->clone->ipaddress = np->fakeip;
979
980 ret = nickbanned(np->clone, cp);
981
982 np->clone->ipaddress = realip;
983
984 return ret;
985 }
986
987 struct trojanscan_realchannels *trojanscan_allocaterc(char *chan) {
988 struct trojanscan_realchannels *rc;
989 struct trojanscan_clones *clonep;
990 channel *cp;
991 int attempts_left = 10;
992
993 if (!chan) {
994 trojanscan_errorcode = 1; /* sorry splidge ;( */
995 return NULL;
996 }
997
998 if(chan[0] != '#') {
999 trojanscan_errorcode = 2;
1000 return NULL;
1001 }
1002
1003 if (strlen(chan) > 1) {
1004 if(strrchr(chan, ',')) {
1005 trojanscan_errorcode = 3;
1006 return NULL;
1007 }
1008
1009 if(strrchr(chan, ' ')) {
1010 trojanscan_errorcode = 4;
1011 return NULL;
1012 }
1013 }
1014
1015 cp = findchannel(chan);
1016 if (!cp) {
1017 trojanscan_errorcode = 5;
1018 return NULL;
1019 }
1020
1021 do {
1022 clonep = trojanscan_selectclone(TROJANSCAN_NORMAL_CLONES);
1023 if (!clonep) {
1024 trojanscan_errorcode = 6;
1025 return NULL;
1026 }
1027 if(!trojanscan_nickbanned(clonep, cp))
1028 break;
1029 } while (--attempts_left > 0);
1030
1031 if (!attempts_left) {
1032 trojanscan_errorcode = 7;
1033 return NULL;
1034 }
1035
1036 rc = (struct trojanscan_realchannels *)malloc(sizeof(struct trojanscan_realchannels));
1037
1038 rc->next = NULL;
1039 rc->clone = clonep;
1040 rc->chan = cp;
1041 rc->donotpart = 0;
1042 rc->kickedout = 0;
1043 return rc;
1044 }
1045
1046 void trojanscan_join(struct trojanscan_realchannels *rc) {
1047 struct trojanscan_realchannels *rp = trojanscan_realchanlist;
1048
1049 if (rc->clone && rc->clone->clone) {
1050 if (!localjoinchannel(rc->clone->clone, rc->chan)) {
1051 rc->clone->remaining--;
1052 rc->clone->sitting++;
1053 if (trojanscan_minmaxrand(1, TROJANSCAN_NICKCHANGE_ODDS)%TROJANSCAN_NICKCHANGE_ODDS == 0)
1054 trojanscan_donickchange((void *)rc->clone);
1055
1056 rc->schedule = scheduleoneshot(time(NULL)+trojanscan_part_time, &trojanscan_dopart, (void *)rc);
1057
1058 if (rp) {
1059 for(;rp->next;rp=rp->next);
1060 rp->next = rc;
1061 } else {
1062 trojanscan_realchanlist = rc;
1063 }
1064 }
1065 }
1066
1067 }
1068
1069 int trojanscan_userjoin(void *sender, int cargc, char **cargv) {
1070 nick *np = (nick *)sender;
1071 struct trojanscan_realchannels *rc;
1072
1073 if (cargc < 1) {
1074 trojanscan_reply(np, "Not enough paramaters");
1075 return CMD_ERROR;
1076 }
1077
1078 if (!trojanscan_swarm_created) {
1079 trojanscan_reply(np, "My swarm is currently empty.");
1080 return CMD_OK;
1081 }
1082
1083 if((rc = trojanscan_allocaterc(cargv[0]))) {
1084 trojanscan_log(np, "join", cargv[0]);
1085 trojanscan_join(rc);
1086 trojanscan_reply(np, "Clone has joined channel.");
1087 if(!IsOper(np))
1088 trojanscan_mainchanmsg("n: join: %s (%s/%s)", cargv[0], np->nick, np->authname);
1089 } else {
1090 if (trojanscan_errorcode == 5) {
1091 trojanscan_reply(np, "Not joining empty channel, check you entered the correct channel name.");
1092 } else {
1093 trojanscan_reply(np, "Clone could not join channel (error code %d)!", trojanscan_errorcode);
1094 }
1095 }
1096 return CMD_OK;
1097 }
1098
1099 int trojanscan_rehash(void *sender, int cargc, char **cargv) {
1100 nick *np = (void *)sender;
1101 trojanscan_read_database(0);
1102 trojanscan_log(np, "rehash", "");
1103 trojanscan_reply(np, "Done.");
1104 return CMD_OK;
1105 }
1106
1107 int trojanscan_changelev(void *sender, int cargc, char **cargv) {
1108 nick *np = (nick *)sender, *np2;
1109 int templevel;
1110 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE], *tochange, *p, mode = 1, error = 0, clast = 0, specialcase;
1111 union trojanscan_userlevel flags1, flags2;
1112
1113 if (cargc < 2) {
1114 trojanscan_reply(np, "Not enough parameters.");
1115 return CMD_ERROR;
1116 }
1117
1118 templevel = trojanscan_user_level_by_authname(np->authname);
1119
1120 if (templevel == -1) {
1121 trojanscan_reply(np, "You do not have an account.");
1122 return CMD_ERROR;
1123 }
1124
1125 flags1.number = templevel;
1126
1127 if (cargv[0][0] == '#') {
1128 tochange = cargv[0] + 1;
1129 } else {
1130 np2 = getnickbynick(cargv[0]);
1131 if (!np2) {
1132 trojanscan_reply(np, "That nickname is not on the network.");
1133 return CMD_ERROR;
1134 }
1135 if (!IsAccount(np2)) {
1136 trojanscan_reply(np, "That user is not authed with the network.");
1137 return CMD_ERROR;
1138 }
1139 tochange = np2->authname;
1140 }
1141
1142 templevel = trojanscan_user_level_by_authname(tochange);
1143
1144 if (templevel == -1) {
1145 trojanscan_reply(np, "User does not exist.");
1146 return CMD_ERROR;
1147 }
1148
1149 flags2.number = templevel;
1150
1151 if (!ircd_strcmp(np->authname, tochange)) {
1152 specialcase = 1;
1153 } else {
1154 specialcase = 0;
1155 }
1156
1157 for (p=cargv[1];*p;p++) {
1158 switch (*p) {
1159 case '+':
1160 case '-':
1161 mode = (*p == '+');
1162 break;
1163 case 'd':
1164 if (!TrojanscanIsDeveloper(flags1))
1165 clast = 1;
1166 flags2.values.developer = mode;
1167 break;
1168 case 't':
1169 if (!TrojanscanIsDeveloper(flags1))
1170 clast = 1;
1171 flags2.values.teamleader = mode;
1172 break;
1173 case 's':
1174 if (!TrojanscanIsLeastTeamLeader(flags1))
1175 clast = 1;
1176 flags2.values.staff = mode;
1177 break;
1178 case 'w':
1179 if (!TrojanscanIsDeveloper(flags1))
1180 clast = 1;
1181 flags2.values.website = mode;
1182 break;
1183 case 'c':
1184 if (!TrojanscanIsDeveloper(flags1))
1185 clast = 1;
1186 flags2.values.cat = mode;
1187 break;
1188 default:
1189 error = 1;
1190 goto last;
1191 break;
1192 }
1193 if (clast == 1) {
1194 if (specialcase && !mode) { /* allow user to remove their own flags */
1195 clast = 0;
1196 } else {
1197 goto last;
1198 }
1199 }
1200 }
1201
1202 last:
1203 if (*p) {
1204 if (error) {
1205 trojanscan_reply(np, "Unknown mode: %c%c.", mode?'+':'-', *p);
1206 } else {
1207 trojanscan_reply(np, "You have insufficient privilidges to add/remove one or more flags specified.");
1208 }
1209 return CMD_ERROR;
1210 }
1211
1212 trojanscan_log(np, "changelev", "%s %s", tochange, cargv[1]);
1213 trojanscan_database_escape_string(eaccount, tochange, strlen(tochange));
1214 trojanscan_database_query("UPDATE users SET authlevel = %d WHERE authname = '%s'", flags2.number, eaccount);
1215
1216 trojanscan_reply(np, "Flags changed.");
1217
1218 return CMD_OK;
1219 }
1220
1221 int trojanscan_deluser(void *sender, int cargc, char **cargv) {
1222 nick *np = (nick *)sender, *to;
1223 int templevel;
1224 char eaccount[TROJANSCAN_QUERY_TEMP_BUF_SIZE], *account;
1225 union trojanscan_userlevel flags1, flags2;
1226
1227 if (cargc < 1) {
1228 trojanscan_reply(np, "Not enough parameters.");
1229 return CMD_ERROR;
1230 }
1231
1232 if (cargv[0][0] == '#') {
1233 account = cargv[0] + 1;
1234 } else {
1235 to = getnickbynick(cargv[0]);
1236 if (!to) {
1237 trojanscan_reply(np, "That nickname is not on the network.");
1238 return CMD_ERROR;
1239 }
1240 if (!IsAccount(to)) {
1241 trojanscan_reply(np, "That user is not authed with the network.");
1242 return CMD_ERROR;
1243 }
1244 account = to->authname;
1245 }
1246
1247 flags1.number = trojanscan_user_level_by_authname(np->authname);
1248 templevel = trojanscan_user_level_by_authname(account);
1249
1250 if (templevel == -1) {
1251 trojanscan_reply(np, "Auth %s does not exist.", account);
1252 return CMD_ERROR;
1253 }
1254
1255 flags2.number = templevel;
1256
1257 if (!TrojanscanIsDeveloper(flags1) && TrojanscanIsLeastTeamLeader(flags2)) {
1258 trojanscan_reply(np, "Your cannot delete %s as his/her flags equal or surpass your own.", account);
1259 return CMD_ERROR;
1260 }
1261
1262 trojanscan_log(np, "deluser", account);
1263 trojanscan_database_escape_string(eaccount, account, strlen(account));
1264 trojanscan_database_query("DELETE FROM users WHERE authname = '%s'", eaccount);
1265 trojanscan_reply(np, "User deleted.");
1266
1267 return CMD_OK;
1268 }
1269
1270 int trojanscan_add_ll(struct trojanscan_prechannels **head, struct trojanscan_prechannels *newitem) {
1271 struct trojanscan_prechannels *position, *lastitem = NULL, *location = NULL;
1272 if (!*head) {
1273 *head = newitem;
1274 newitem->next = NULL;
1275 if (newitem->exempt) {
1276 return 0;
1277 } else {
1278 return 1;
1279 }
1280 }
1281 /* if its exempt, we don't give a monkeys where it is... */
1282 if (newitem->exempt) {
1283 newitem->next = *head;
1284 *head = newitem;
1285 return 0;
1286 }
1287
1288 for(position=*head;position;lastitem=position,position=position->next) {
1289 if (!ircd_strcmp(position->name->content, newitem->name->content)) {
1290 free(newitem);
1291 return 0;
1292 }
1293 if (!location && (position->size < newitem->size)) {
1294 if (!lastitem) {
1295 location = *head;
1296 } else {
1297 location = lastitem;
1298 }
1299 }
1300 }
1301 if (!location) {
1302 newitem->next = NULL;
1303 lastitem->next = newitem;
1304 } else {
1305 newitem->next = location->next;
1306 location->next = newitem;
1307 }
1308 if(newitem->exempt) {
1309 return 0;
1310 } else {
1311 return 1;
1312 }
1313 }
1314
1315 void trojanscan_watch_clone_update(struct trojanscan_prechannels *hp, int count) {
1316 int i, j, marked;
1317 struct trojanscan_prechannels *lp;
1318 struct trojanscan_templist *markedlist;
1319
1320 if(count > 0) {
1321 markedlist = (struct trojanscan_templist *)calloc(count, sizeof(struct trojanscan_templist));
1322 if (!markedlist)
1323 return;
1324 }
1325
1326 for(i=0;i<trojanscan_activechans;i++) {
1327 marked = 0;
1328 for(lp=hp,j=0;j<count&&lp;j++,lp=lp->next) {
1329 if(!markedlist[j].active && !lp->exempt && !ircd_strcmp(lp->name->content, trojanscan_chans[i].channel->content)) { /* we're already on the channel */
1330 if(trojanscan_chans[i].watch_clone) {
1331 markedlist[j].active = 1;
1332 markedlist[j].watch_clone = trojanscan_chans[i].watch_clone;
1333 lp->watch_clone = trojanscan_chans[i].watch_clone;
1334 }
1335 marked = 1;
1336 break;
1337 }
1338 }
1339 if(!marked && trojanscan_chans[i].watch_clone) {
1340 channel *cp = findchannel(trojanscan_chans[i].channel->content);
1341 if(cp)
1342 localpartchannel(trojanscan_chans[i].watch_clone->clone, cp);
1343 }
1344 }
1345
1346 for(j=0,lp=hp;j<count&&lp;j++,lp=lp->next) {
1347 if((!markedlist[j].active || !markedlist[j].watch_clone) && !lp->exempt) {
1348 channel *cp = findchannel(lp->name->content);
1349 if(cp) {
1350 int attempts = 10;
1351 do {
1352 lp->watch_clone = trojanscan_selectclone(TROJANSCAN_WATCH_CLONES);
1353 if(!lp->watch_clone)
1354 break;
1355 if(!trojanscan_nickbanned(lp->watch_clone, cp)) {
1356 if(localjoinchannel(lp->watch_clone->clone, cp))
1357 lp->watch_clone = NULL;
1358 break;
1359 }
1360 } while(--attempts > 0);
1361 if(!attempts)
1362 lp->watch_clone = NULL;
1363
1364 }
1365 }
1366 }
1367
1368 free(markedlist);
1369 }
1370
1371 void trojanscan_fill_channels(void *arg) {
1372 struct trojanscan_prechannels *head = NULL, *lp, *last = NULL;
1373 int i, count, tempctime = 0;
1374
1375 chanindex *chn;
1376
1377 for (count=i=0;i<trojanscan_database.total_channels;i++) {
1378 lp = (trojanscan_prechannels *)malloc(sizeof(trojanscan_prechannels));
1379 lp->name = trojanscan_database.channels[i].name;
1380 lp->size = 65535;
1381 lp->exempt = trojanscan_database.channels[i].exempt;
1382 lp->watch_clone = NULL;
1383 if (trojanscan_add_ll(&head, lp))
1384 count++;
1385 }
1386
1387 for (i=0;i<CHANNELHASHSIZE;i++) {
1388 for(chn=chantable[i];chn;chn=chn->next) {
1389 if (chn->channel && !IsKey(chn->channel) && !IsInviteOnly(chn->channel) && !IsRegOnly(chn->channel) && (chn->channel->users->totalusers >= trojanscan_minchansize)) {
1390 lp = (trojanscan_prechannels *)malloc(sizeof(trojanscan_prechannels));
1391 lp->name = chn->name;
1392 lp->size = chn->channel->users->totalusers;
1393 lp->exempt = 0;
1394 lp->watch_clone = NULL;
1395 if (trojanscan_add_ll(&head, lp))
1396 count++;
1397 }
1398 }
1399 }
1400
1401 count = TROJANSCAN_MMIN(count, trojanscan_maxchans);
1402
1403 trojanscan_watch_clone_update(head, count);
1404
1405 trojanscan_free_channels();
1406 trojanscan_chans = (struct trojanscan_inchannel *)calloc(count, sizeof(struct trojanscan_inchannel));
1407 trojanscan_activechans = count;
1408 i = 0;
1409
1410 for(lp=head;lp;last=lp,lp=lp->next) {
1411 if (!(lp->exempt) && (i < count)) {
1412 trojanscan_chans[i].channel = getsstring(lp->name->content, lp->name->length);
1413 trojanscan_chans[i++].watch_clone = lp->watch_clone;
1414 }
1415 if (last)
1416 free(last);
1417 }
1418
1419 if (last)
1420 free(last);
1421
1422 if (trojanscan_activechans > 0) {
1423 tempctime = trojanscan_cycletime / trojanscan_activechans;
1424 } else {
1425 tempctime = 60;
1426 trojanscan_mainchanmsg("d: just escaped a divide by zero error (no activechans!), rescheduling in 60 seconds");
1427 }
1428
1429 if(trojanscan_schedule)
1430 deleteschedule(trojanscan_schedule, &trojanscan_dojoin, NULL);
1431
1432 trojanscan_channumber = 0;
1433
1434 trojanscan_schedule = schedulerecurring(time(NULL) + tempctime, trojanscan_activechans + 1, tempctime, trojanscan_dojoin, NULL);
1435
1436 }
1437
1438 void trojanscan_dojoin(void *arg) {
1439 struct trojanscan_realchannels *rc;
1440 if (trojanscan_channumber >= trojanscan_activechans) {
1441 trojanscan_schedule = NULL;
1442 trojanscan_fill_channels(NULL);
1443 } else {
1444 if ((rc = trojanscan_allocaterc(trojanscan_chans[trojanscan_channumber++].channel->content)))
1445 trojanscan_join(rc);
1446 }
1447 }
1448
1449
1450 void trojanscan_dopart(void *arg) {
1451 struct trojanscan_realchannels *rc = (struct trojanscan_realchannels *)arg, *rp, *past = NULL;
1452
1453 if (rc->kickedout) { /* there's a join scheduled, wait for it (reschedule) */
1454 rc->schedule = scheduleoneshot(time(NULL)+5, &trojanscan_dopart, (void *)rc);
1455 return;
1456 }
1457
1458 if (rc->clone->clone && (!(rc->donotpart)))
1459 localpartchannel(rc->clone->clone, rc->chan);
1460
1461 rc->clone->sitting--;
1462
1463 for(rp=trojanscan_realchanlist;rp;rp=rp->next) {
1464 if (rp == rc) {
1465 if (!past) {
1466 trojanscan_realchanlist = rp->next;
1467 } else {
1468 past->next = rp->next;
1469 }
1470 free(rp);
1471 break;
1472 }
1473 past = rp;
1474 }
1475
1476 }
1477
1478 void trojanscan_donickchange(void *arg) { /* just incase I choose to make this schedule at some point */
1479 struct trojanscan_clones *clone = (trojanscan_clones *)arg;
1480 if (clone && clone->clone) {
1481 char c_nick[NICKLEN+1];
1482 int loops = 0;
1483 /* PPA: unlikely to be infinite */
1484 do {
1485 if ((loops++ < 10) && trojanscan_hostmode) {
1486 trojanscan_generatenick(c_nick, NICKLEN);
1487 } else {
1488 trojanscan_gennick(c_nick, trojanscan_minmaxrand(7, TROJANSCAN_MMIN(13, NICKLEN)));
1489 }
1490 } while (c_nick && (getnickbynick(c_nick) != NULL));
1491
1492 renamelocaluser(clone->clone, c_nick);
1493 }
1494
1495 }
1496
1497 int trojanscan_keysort(const void *v1, const void *v2) {
1498 return ((*(trojanscan_prechannels **)v2)->size - (*(trojanscan_prechannels **)v1)->size);
1499 }
1500
1501 int trojanscan_showcommands(void *sender, int cargc, char **cargv) {
1502 nick *np = (nick *)sender;
1503 Command *cmdlist[100];
1504 int i, n;
1505 char level = 0;
1506
1507 n = getcommandlist(trojanscan_cmds, cmdlist, 100);
1508
1509 trojanscan_reply(np, "The following commands are registered at present:");
1510
1511 for(i=0;i<n;i++) {
1512 if (cmdlist[i]->level & TROJANSCAN_ACL_STAFF) {
1513 level = 's';
1514 } else if (cmdlist[i]->level & TROJANSCAN_ACL_DEVELOPER) {
1515 level = 'd';
1516 } else if (cmdlist[i]->level & TROJANSCAN_ACL_TEAMLEADER) {
1517 level = 't';
1518 } else if (cmdlist[i]->level & TROJANSCAN_ACL_CAT) {
1519 level = 'c';
1520 } else if (cmdlist[i]->level & TROJANSCAN_ACL_WEBSITE) {
1521 level = 'w';
1522 } else if (cmdlist[i]->level & TROJANSCAN_ACL_UNAUTHED) {
1523 level = 0;
1524 }
1525 if (level) {
1526 trojanscan_reply(np, "%s (+%c)", cmdlist[i]->command->content, level);
1527 } else {
1528 trojanscan_reply(np, "%s", cmdlist[i]->command->content);
1529 }
1530 }
1531 trojanscan_reply(np, "End of list.");
1532 return CMD_OK;
1533 }
1534
1535 void trojanscan_handlemessages(nick *target, int messagetype, void **args) {
1536 Command *cmd;
1537 char *cargv[50];
1538 int cargc, templevel;
1539 nick *sender;
1540 union trojanscan_userlevel level;
1541
1542 switch(messagetype) {
1543 case LU_PRIVMSG:
1544 case LU_SECUREMSG:
1545 /* If it's a message, first arg is nick and second is message */
1546 sender = (nick *)args[0];
1547
1548 if(strncmp(TROJANSCAN_VERSION_DETECT, args[1], sizeof(TROJANSCAN_VERSION_DETECT)-1)==0) {
1549 char p = ((char *)args[1])[sizeof(TROJANSCAN_VERSION_DETECT)-1];
1550 if((p == ' ') || (p == '\0') || (p == 1)) {
1551 trojanscan_reply(sender, "\001VERSION Trojanscan (or Tigger) Newserv module version %s by Chris Porter (slug), Newserv by David Mansell (splidge). Compiled " __DATE__ " " __TIME__ ".\001", TROJANSCAN_VERSION);
1552 return;
1553 }
1554 }
1555
1556 /* Split the line into params */
1557 cargc = splitline((char *)args[1], cargv, 50, 0);
1558
1559 cmd=findcommandintree(trojanscan_cmds, cargv[0], 1);
1560 if (!cmd) {
1561 trojanscan_reply(sender, "Unknown command.");
1562 return;
1563 }
1564
1565 if ((cmd->level & TROJANSCAN_ACL_OPER) && !IsOper(sender)) {
1566 trojanscan_reply(sender, "You need to be opered to use this command.");
1567 return;
1568 }
1569
1570 /* bit grim code... */
1571
1572 if (!(cmd->level & TROJANSCAN_ACL_UNAUTHED)) {
1573 if (!IsAccount(sender)) {
1574 trojanscan_reply(sender, "You must be authed with the network to access this command!");
1575 return;
1576 }
1577 templevel = trojanscan_user_level_by_authname(sender->authname);
1578
1579 if (templevel == -1) {
1580 trojanscan_reply(sender, "You do not have an account.");
1581 return;
1582 }
1583
1584 level.number = templevel;
1585
1586 if ((cmd->level & TROJANSCAN_ACL_DEVELOPER) && !TrojanscanIsDeveloper(level)) {
1587 trojanscan_reply(sender, "Access denied.");
1588 return;
1589 }
1590 if ((cmd->level & TROJANSCAN_ACL_TEAMLEADER) && !TrojanscanIsLeastTeamLeader(level)) {
1591 trojanscan_reply(sender, "Access denied.");
1592 return;
1593 }
1594 if ((cmd->level & TROJANSCAN_ACL_STAFF) && !TrojanscanIsLeastStaff(level)) {
1595 trojanscan_reply(sender, "Access denied.");
1596 return;
1597 }
1598 if ((cmd->level & TROJANSCAN_ACL_CAT) && !TrojanscanIsCat(level)) {
1599 trojanscan_reply(sender, "Access denied.");
1600 return;
1601 }
1602 if ((cmd->level & TROJANSCAN_ACL_WEBSITE) && !TrojanscanIsLeastWebsite(level)) {
1603 trojanscan_reply(sender, "Access denied.");
1604 return;
1605 }
1606 }
1607
1608 /* Check the maxargs */
1609 if (cmd->maxparams<(cargc-1)) {
1610 /* We need to do some rejoining */
1611 rejoinline(cargv[cmd->maxparams], cargc-(cmd->maxparams));
1612 cargc = (cmd->maxparams) + 1;
1613 }
1614
1615 (cmd->handler)((void *)sender, cargc - 1, &(cargv[1]));
1616 break;
1617
1618 case LU_KILLED:
1619 /* someone killed me? Bastards */
1620 trojanscan_connect_schedule = scheduleoneshot(time(NULL) + 1, &trojanscan_connect, NULL);
1621 trojanscan_nick = NULL;
1622 break;
1623
1624 default:
1625 break;
1626 }
1627 }
1628
1629 char trojanscan_getmtfrommessagetype(int input) {
1630 switch(input) {
1631 case LU_PRIVMSG: return 'm';
1632 case LU_PRIVNOTICE: return 'n';
1633 case LU_SECUREMSG: return 's';
1634 case LU_CHANMSG: return 'M';
1635 case LU_CHANNOTICE: return 'N';
1636 default: return '?';
1637 }
1638 }
1639
1640 void trojanscan_clonehandlemessages(nick *target, int messagetype, void **args) {
1641 char *pretext = NULL, etext[TROJANSCAN_QUERY_TEMP_BUF_SIZE], enick[TROJANSCAN_QUERY_TEMP_BUF_SIZE], eident[TROJANSCAN_QUERY_TEMP_BUF_SIZE], ehost[TROJANSCAN_QUERY_TEMP_BUF_SIZE], text[513], detected = 0;
1642 nick *sender;
1643 struct trojanscan_realchannels *rp;
1644 struct trojanscan_rejoinlist *rj;
1645 unsigned int i, len;
1646 struct trojanscan_worms *worm;
1647 int vector[30];
1648 char mt = trojanscan_getmtfrommessagetype(messagetype);
1649 char *channel_name;
1650
1651 switch(messagetype) {
1652 case LU_PRIVMSG:
1653 case LU_SECUREMSG:
1654 case LU_PRIVNOTICE:
1655
1656 pretext = (char *)args[1];
1657
1658 case LU_CHANMSG:
1659 case LU_CHANNOTICE:
1660
1661 sender = (nick *)args[0];
1662 if (strlen(sender->nick) < 2)
1663 break;
1664
1665 if (!pretext)
1666 pretext = (char *)args[2];
1667
1668 if(strncmp(TROJANSCAN_VERSION_DETECT, pretext, sizeof(TROJANSCAN_VERSION_DETECT)-1)==0) {
1669 char p = pretext[sizeof(TROJANSCAN_VERSION_DETECT)-1];
1670 if((p == ' ') || (p == '\0') || (p == 1)) {
1671 int staff = 0;
1672 if (IsOper(sender)) {
1673 staff = 1;
1674 } else {
1675 if (IsAccount(sender)) {
1676 int templevel = trojanscan_user_level_by_authname(sender->authname);
1677 if (templevel != -1) {
1678 union trojanscan_userlevel level;
1679 level.number = templevel;
1680 if (TrojanscanIsLeastStaff(level))
1681 staff = 1;
1682 }
1683 }
1684 }
1685 if (staff) {
1686 if(trojanscan_nick) {
1687 sendnoticetouser(target, sender, "\001VERSION T clone, check T for confirmation.\001");
1688 sendnoticetouser(trojanscan_nick, sender, "\001VERSION %s is part of my swarm.\001", target->nick);
1689 } else {
1690 sendnoticetouser(target, sender, "\001VERSION T clone, though since T is currently gone you'll have to version me again in a minute for confirmation.\001");
1691 }
1692 } else {
1693 sendnoticetouser(target, sender, "\001VERSION " TROJANSCAN_CLONE_VERSION_REPLY "\001");
1694 }
1695
1696 return;
1697 }
1698 }
1699
1700 trojanscan_strip_codes(text, sizeof(text) - 1, pretext);
1701
1702 len = strlen(text);
1703
1704 for(i=0;i<trojanscan_database.total_phrases;i++) {
1705 if (
1706 (
1707 (worm = trojanscan_database.phrases[i].worm)
1708 ) &&
1709 (
1710 (
1711 (
1712 (messagetype == LU_PRIVMSG) || (messagetype == LU_SECUREMSG) || (messagetype == LU_PRIVNOTICE)
1713 ) &&
1714 (
1715 (trojanscan_database.phrases[i].worm->hitpriv)
1716 )
1717 ) ||
1718 (
1719 (
1720 (messagetype == LU_CHANMSG) || (messagetype == LU_CHANNOTICE)
1721 ) &&
1722 (
1723 (trojanscan_database.phrases[i].worm->hitchans)
1724 )
1725 )
1726 ) &&
1727 (trojanscan_database.phrases[i].phrase)
1728 ) {
1729 int pre = pcre_exec(trojanscan_database.phrases[i].phrase, trojanscan_database.phrases[i].hint, text, len, 0, 0, vector, 30);
1730 if(pre >= 0) {
1731 char glinemask[HOSTLEN + USERLEN + NICKLEN + 4];
1732 char *userbit;
1733 host *hp;
1734 unsigned int j, usercount, frequency;
1735 char ip[TROJANSCAN_IPLEN];
1736 int glining = 1;
1737 channel *chp = (channel *)args[1];
1738
1739 nick *np = NULL; /* sigh at warnings */
1740
1741 detected = 1;
1742
1743 trojanscan_database.detections++;
1744
1745 if (!(hp=findhost(sender->host->name->content))) {
1746 trojanscan_mainchanmsg("w: user %s!%s@%s triggered infection monitor, yet no hosts found at stage 1 -- worm: %s", sender->nick, sender->ident, sender->host->name->content, worm->name->content);
1747 break;
1748 }
1749
1750 usercount = 0; /* stupid warnings */
1751 if (worm->monitor) {
1752 glining = 0;
1753 usercount = -1;
1754 } else if (worm->glinehost) {
1755 snprintf(glinemask, sizeof(glinemask) - 1, "*@%s", trojanscan_iptostr(ip, sizeof(ip) - 1, sender->ipaddress));
1756 usercount = hp->clonecount;
1757 }
1758
1759 /* if the host is >maxusers then it's a trusted host and we can gline by ident */
1760 if (worm->glineuser || (worm->glinehost && (usercount > trojanscan_maxusers))) {
1761 userbit = sender->ident;
1762 if(userbit[0] == '~')
1763 userbit++;
1764 snprintf(glinemask, sizeof(glinemask) - 1, "*%s@%s", userbit, trojanscan_iptostr(ip, sizeof(ip) - 1, sender->ipaddress));
1765 for (j=0;j<NICKHASHSIZE;j++) {
1766 for (np=nicktable[j];np;np=np->next) {
1767 if ((np->host==hp) && (!ircd_strcmp(np->ident,sender->ident)))
1768 usercount++;
1769 }
1770 }
1771 }
1772
1773 if (!usercount) {
1774 trojanscan_mainchanmsg("w: user %s!%s@%s triggered infection monitor, yet no hosts found at stage 2 -- worm: %s", sender->nick, sender->ident, sender->host->name->content, worm->name->content);
1775 break;
1776 }
1777
1778 if (glining && (usercount > trojanscan_maxusers)) {
1779 trojanscan_mainchanmsg("w: not glining %s!%s@%s due to too many users (%d) with mask: *!%s -- worm: %s)", sender->nick, sender->ident, sender->host->name->content, usercount, glinemask, worm->name->content);
1780 break;
1781 }
1782
1783 if (glining && !worm->datalen) {
1784 trojanscan_mainchanmsg("w: not glining %s!%s@%s due to too lack of removal data with mask: *!%s (%d users) -- worm: %s)", sender->nick, sender->ident, sender->host->name->content, glinemask, usercount, worm->name->content);
1785 break;
1786 }
1787
1788 trojanscan_database_escape_string(enick, sender->nick, strlen(sender->nick));
1789 trojanscan_database_escape_string(eident, sender->ident, strlen(sender->ident));
1790 trojanscan_database_escape_string(ehost, sender->host->name->content, sender->host->name->length);
1791
1792 frequency = 1;
1793
1794 if (!(trojanscan_database_query("SELECT COUNT(*) FROM hits WHERE glined = %d AND host = '%s'", glining, ehost))) {
1795 trojanscan_database_res *res;
1796 if ((res = trojanscan_database_store_result(&trojanscan_sql))) {
1797 trojanscan_database_row sqlrow;
1798 if ((trojanscan_database_num_rows(res) > 0) && (sqlrow = trojanscan_database_fetch_row(res)))
1799 frequency = atoi(sqlrow[0]) + 1;
1800 trojanscan_database_free_result(res);
1801 }
1802 }
1803
1804 if (!glining) {
1805 char matchbuf[513];
1806 matchbuf[0] = 0;
1807 matchbuf[512] = 0; /* hmm */
1808
1809 if(pre > 1)
1810 if (pcre_copy_substring(text, vector, pre, 1, matchbuf, sizeof(matchbuf) - 1) <= 0)
1811 matchbuf[0] = 0;
1812
1813 trojanscan_mainchanmsg("m: t: %c u: %s!%s@%s%s%s w: %s %s%s", mt, sender->nick, sender->ident, sender->host->name->content, mt=='N'||mt=='M'?" #: ":"", mt=='N'||mt=='M'?chp->index->name->content:"", worm->name->content, matchbuf[0]?" --: ":"", matchbuf[0]?matchbuf:"");
1814 trojanscan_peonchanmsg("m: t: %c u: %s!%s@%s%s%s%s w: %s %s%s", mt, sender->nick, sender->ident, (IsHideHost(sender)&&IsAccount(sender))?sender->authname:sender->host->name->content, (IsHideHost(sender)&&IsAccount(sender))?"."HIS_HIDDENHOST:"", mt=='N'||mt=='M'?" #: ":"", mt=='N'||mt=='M'?chp->index->name->content:"", worm->name->content, matchbuf[0]?" --: ":"", matchbuf[0]?matchbuf:"");
1815 } else {
1816 int glinetime = TROJANSCAN_FIRST_OFFENSE * frequency * (worm->epidemic?TROJANSCAN_EPIDEMIC_MULTIPLIER:1);
1817 if(glinetime > 7 * 24)
1818 glinetime = 7 * 24; /* can't set glines over 7 days with normal non U:lined glines */
1819
1820 trojanscan_database_query("INSERT INTO hits (nickname, ident, host, phrase, messagetype, glined) VALUES ('%s', '%s', '%s', %d, '%c', %d)", enick, eident, ehost, trojanscan_database.phrases[i].id, mt, glining);
1821 trojanscan_database.glines++;
1822
1823 irc_send("%s GL * +%s %d :You (%s!%s@%s) are infected with a trojan (%s), see %s%d for details - banned for %d hours\r\n", mynumeric->content, glinemask, glinetime * 3600, sender->nick, sender->ident, sender->host->name->content, worm->name->content, TROJANSCAN_URL_PREFIX, worm->id, glinetime);
1824
1825 trojanscan_mainchanmsg("g: *!%s t: %c u: %s!%s@%s%s%s c: %d w: %s%s f: %d", glinemask, mt, sender->nick, sender->ident, sender->host->name->content, mt=='N'||mt=='M'?" #: ":"", mt=='N'||mt=='M'?chp->index->name->content:"", usercount, worm->name->content, worm->epidemic?"(E)":"", frequency);
1826 }
1827
1828 break;
1829 }
1830 }
1831 }
1832 if (!detected && (mt != 'N') && (mt != 'M')) {
1833 trojanscan_database_escape_string(etext, text, len);
1834 trojanscan_database_escape_string(enick, sender->nick, strlen(sender->nick));
1835 trojanscan_database_escape_string(eident, sender->ident, strlen(sender->ident));
1836 trojanscan_database_escape_string(ehost, sender->host->name->content, sender->host->name->length);
1837 trojanscan_database_query("INSERT INTO unknownlog (data, user) VALUES ('%s','%s!%s@%s')", etext, enick, eident, ehost);
1838 }
1839 break;
1840 case LU_KILLED:
1841 /* someone killed me? Bastards */
1842
1843 /* PPA: we do NOT rejoin channels at this moment in time, it is possible to do this though */
1844 for (i=0;i<TROJANSCAN_CLONE_TOTAL;i++) {
1845 if (trojanscan_swarm[i].clone == target) {
1846
1847 scheduleoneshot(time(NULL)+1, &trojanscan_generateclone, (void *)i);
1848 if(i >= TROJANSCAN_CLONE_MAX) {
1849 int j;
1850 for(j=0;j<trojanscan_activechans;j++)
1851 if(trojanscan_chans[j].watch_clone == &trojanscan_swarm[i])
1852 trojanscan_chans[j].watch_clone = NULL;
1853 } else {
1854 for(rp=trojanscan_realchanlist;rp;rp=rp->next)
1855 if ((rp->clone == &(trojanscan_swarm[i])))
1856 rp->donotpart = 1;
1857 }
1858 trojanscan_swarm[i].clone = NULL;
1859 trojanscan_swarm[i].remaining = 0; /* bah */
1860 break;
1861 }
1862 }
1863 break;
1864
1865 case LU_KICKED:
1866 channel_name = ((channel *)args[1])->index->name->content;
1867 for (i=0;i<trojanscan_activechans;i++) {
1868 if (!trojanscan_chans[i].watch_clone)
1869 continue;
1870 if ((trojanscan_chans[i].watch_clone->clone == target) && (!strcmp(trojanscan_chans[i].channel->content, channel_name)))
1871 break;
1872 }
1873 if(i != trojanscan_activechans) {
1874 int j;
1875 for(j=0;j<TROJANSCAN_CLONE_TOTAL;j++) {
1876 if(&trojanscan_swarm[j] == trojanscan_chans[i].watch_clone) {
1877 trojanscan_chans[i].watch_clone = NULL;
1878 break;
1879 }
1880 }
1881 } else {
1882 /*
1883 trojanscan_mainchanmsg("k: %s on %s by %s", target->nick, ((channel *)args[1])->index->name->content, (((nick *)args[0])->nick)?(((nick *)args[0])->nick):"(server)");
1884 */
1885 rj = (struct trojanscan_rejoinlist *)malloc(sizeof(struct trojanscan_rejoinlist));
1886 if (rj) {
1887 rj->rp = NULL;
1888 for(rp=trojanscan_realchanlist;rp;rp=rp->next)
1889 if ((rp->clone->clone == target) && (rp->chan == args[1])) {
1890 rp->kickedout++;
1891 rj->rp = rp;
1892 break;
1893 }
1894 if(!rj->rp) {
1895 free(rj);
1896 return;
1897 }
1898
1899 rj->channel = getsstring(((channel *)args[1])->index->name->content, ((channel *)args[1])->index->name->length);
1900 if(!rj->channel) {
1901 trojanscan_mainchanmsg("d: unable to allocate memory for channel: %s upon rejoin", ((channel *)args[1])->index->name->content);
1902 free(rj);
1903 return;
1904 }
1905
1906 rj->clone = rp->clone;
1907 rj->next = trojanscan_schedulerejoins;
1908 trojanscan_schedulerejoins = rj;
1909
1910 rj->schedule = scheduleoneshot(time(NULL)+1, &trojanscan_rejoin_channel, (void *)rj);
1911 }
1912 }
1913 break;
1914 default:
1915 break;
1916 }
1917 }
1918
1919 void trojanscan_rejoin_channel(void *arg) {
1920 struct trojanscan_rejoinlist *rj2, *lrj, *rj = (struct trojanscan_rejoinlist *)arg;
1921
1922 channel *cp = findchannel(rj->channel->content);
1923 freesstring(rj->channel);
1924
1925 if (rj->rp) {
1926 rj->rp->kickedout--;
1927 if (!cp) {
1928 rj->rp->donotpart = 1; /* we were the last user on the channel, so we need to be VERY careful freeing it */
1929 } else {
1930 if(!rj->rp->donotpart && !rj->rp->kickedout) { /* check we're allowed to join channels (not killed), and we're the last one to join */
1931 if (trojanscan_nickbanned(rj->clone, cp)) {
1932 rj->rp->donotpart = 1;
1933 } else {
1934 localjoinchannel(rj->clone->clone, cp);
1935 }
1936 }
1937 }
1938 }
1939
1940 rj2 = trojanscan_schedulerejoins;
1941 lrj = NULL;
1942
1943 if (rj2 == rj) {
1944 trojanscan_schedulerejoins = rj->next;
1945 free(rj);
1946 } else {
1947 for(rj2=trojanscan_schedulerejoins;rj2;lrj=rj2,rj2=rj2->next) {
1948 if (rj2 == rj) {
1949 lrj->next = rj2->next;
1950 free(rj);
1951 break;
1952 }
1953 }
1954 }
1955
1956 }
1957
1958 void trojanscan_reply(nick *target, char *message, ... ) {
1959 char buf[513];
1960 va_list va;
1961
1962 if (!trojanscan_nick)
1963 return;
1964
1965 va_start(va, message);
1966 vsnprintf(buf, sizeof(buf) - 1, message, va);
1967 va_end(va);
1968
1969 sendnoticetouser(trojanscan_nick, target, "%s", buf);
1970 }
1971
1972
1973 void trojanscan_mainchanmsg(char *message, ...) {
1974 char buf[513];
1975 va_list va;
1976 channel *cp;
1977
1978 if (!trojanscan_nick)
1979 return;
1980 if (!(cp = findchannel(TROJANSCAN_CHANNEL)))
1981 return;
1982
1983 va_start(va, message);
1984 vsnprintf(buf, sizeof(buf) - 1, message, va);
1985 va_end(va);
1986
1987 sendmessagetochannel(trojanscan_nick, cp, "%s", buf);
1988 }
1989
1990 void trojanscan_peonchanmsg(char *message, ...) {
1991 char buf[513];
1992 va_list va;
1993 channel *cp;
1994
1995 if (!trojanscan_nick)
1996 return;
1997 if (!(cp = findchannel(TROJANSCAN_PEONCHANNEL)))
1998 return;
1999
2000 va_start(va, message);
2001 vsnprintf(buf, sizeof(buf) - 1, message, va);
2002 va_end(va);
2003
2004 sendmessagetochannel(trojanscan_nick, cp, "%s", buf);
2005 }
2006
2007 int trojanscan_minmaxrand(float min, float max) {
2008 return (int)((max-min+1)*rand()/(RAND_MAX+min))+min;
2009 }
2010
2011 char *trojanscan_iptostr(char *buf, int buflen, unsigned int ip) {
2012 snprintf(buf, buflen, "%d.%d.%d.%d", ip >> 24, (ip >> 16) & 255, (ip >> 8) & 255, ip & 255);
2013 return buf;
2014 }
2015
2016 char trojanscan_genchar(int ty) {
2017 /* hostname and realname characters*/
2018 if (!ty) {
2019 if (!(trojanscan_minmaxrand(0, 40) % 10)) {
2020 return trojanscan_minmaxrand(48, 57);
2021 } else {
2022 return trojanscan_minmaxrand(97, 122);
2023 }
2024 /* ident characters - without numbers*/
2025 } else if (ty == 1) {
2026 return trojanscan_minmaxrand(97, 122);
2027 /* ident characters - with numbers*/
2028 } else if (ty == 2) {
2029 ty = trojanscan_minmaxrand(97, 125);
2030 if (ty > 122) return trojanscan_minmaxrand(48, 57);
2031 return ty;
2032 /* nick characters - with and without numbers*/
2033 } else if (ty == 3 || ty == 4) {
2034 if (!(trojanscan_minmaxrand(0, 59) % 16)) {
2035 char weirdos[6] = { '\\', '|', '[', '{', ']', '}' };
2036 return weirdos[trojanscan_minmaxrand(0, 5)];
2037 }
2038 if (ty == 4) {
2039 ty = trojanscan_minmaxrand(65, 93);
2040 if (ty > 90) return trojanscan_minmaxrand(48, 57);
2041 } else {
2042 ty = trojanscan_minmaxrand(65, 90);
2043 }
2044 if (!(trojanscan_minmaxrand(0, 40) % 8)) return ty;
2045 return ty + 32;
2046 /* moron check */
2047 } else {
2048 return ' ';
2049 }
2050 }
2051
2052 void trojanscan_gennick(char *ptc, char size) {
2053 int i;
2054 for (i=0;i<size;i++) {
2055 if (i == 0) {
2056 ptc[i] = trojanscan_genchar(3);
2057 } else {
2058 ptc[i] = trojanscan_genchar(4);
2059 }
2060 }
2061 ptc[i] = '\0';
2062 }
2063
2064 void trojanscan_genident(char *ptc, char size) {
2065 int i;
2066 for (i=0;i<size;i++) {
2067 if (i == 0) {
2068 ptc[i] = trojanscan_genchar(1);
2069 } else {
2070 ptc[i] = trojanscan_genchar(2);
2071 }
2072 }
2073 ptc[i] = '\0';
2074 }
2075
2076 void trojanscan_genhost(char *ptc, char size, long *fakeip) {
2077 int dots = trojanscan_minmaxrand(2, 5), i, dotexist = 0, cur;
2078
2079 while (!dotexist) {
2080 for (i=0;i<size;i++) {
2081 ptc[i] = trojanscan_genchar(0);
2082 if ((i > 5) && (i < (size-4))) {
2083 if ((ptc[i-1] != '.') && (ptc[i-1] != '-')) {
2084 cur = trojanscan_minmaxrand(1,size / dots);
2085 if (cur < 3) {
2086 if (cur == 1) {
2087 ptc[i] = '.';
2088 dotexist = 1;
2089 } else {
2090 ptc[i] = '-';
2091 }
2092 }
2093 }
2094 }
2095 }
2096 }
2097 ptc[i] = '\0';
2098
2099 *fakeip = (trojanscan_minmaxrand(0, 65535) << 16) | trojanscan_minmaxrand(0, 65535);
2100 }
2101
2102 void trojanscan_genreal(char *ptc, char size) {
2103 int spaces = trojanscan_minmaxrand(2, 4), i;
2104 for (i=0;i<size;i++) {
2105 ptc[i] = trojanscan_genchar(0);
2106 if ((i > 5) && (i < (size-4))) {
2107 if (ptc[i-1] != ' ') {
2108 if (trojanscan_minmaxrand(1,size / spaces) == 1) ptc[i] = ' ';
2109 }
2110 }
2111 }
2112 ptc[i] = '\0';
2113 }
2114
2115 int trojanscan_is_not_octet(char *begin, int length) {
2116 int i;
2117 if(length > 3)
2118 return 0;
2119 for(i=0;i<length;i++) {
2120 if (!((*begin >= '0') && (*begin <= '9')))
2121 return 0;
2122 begin++;
2123 }
2124 return 1;
2125 }
2126
2127 int trojanscan_generatepool(void) {
2128 int i, k = 0, j = 0, loops = 0;
2129 char *p, *pp;
2130 nick *np;
2131
2132 for (i=0;i<NICKHASHSIZE;i++)
2133 for (np=nicktable[i];np;np=np->next)
2134 j++;
2135
2136 if(j < trojanscan_min_hosts)
2137 return 0;
2138
2139 if(TROJANSCAN_HOST_MODE == TROJANSCAN_STEAL_HOST)
2140 return TROJANSCAN_MINPOOLSIZE;
2141
2142 i = 0;
2143 do {
2144 for (j=trojanscan_minmaxrand(0, NICKHASHSIZE-1);j<NICKHASHSIZE;j++) {
2145 if (nicktable[j]) {
2146 for(p=nicktable[j]->host->name->content, pp=p;*p;) {
2147 if (*++p == '.') {
2148 if (!trojanscan_is_not_octet(pp, p-pp)) {
2149 if (i < TROJANSCAN_POOLSIZE) {
2150 if (i < trojanscan_hostpoolsize)
2151 freesstring(trojanscan_hostpool[i]);
2152 trojanscan_hostpool[i] = getsstring(pp, p-pp);
2153 i++;
2154 } else {
2155 if (k >= TROJANSCAN_POOLSIZE)
2156 break;
2157 }
2158 }
2159 pp=++p;
2160 }
2161 }
2162 if (!trojanscan_is_not_octet(pp, p-pp)) {
2163 if (k < TROJANSCAN_POOLSIZE) {
2164 if (k < trojanscan_tailpoolsize)
2165 freesstring(trojanscan_tailpool[k]);
2166 trojanscan_tailpool[k] = getsstring(pp, p-pp);
2167 k++;
2168 } else {
2169 if (i >= TROJANSCAN_POOLSIZE)
2170 break;
2171 }
2172 }
2173 }
2174 }
2175 loops++;
2176 } while ((loops < 5) && ((i < TROJANSCAN_POOLSIZE) || (k < TROJANSCAN_POOLSIZE)));
2177
2178 trojanscan_hostpoolsize = i;
2179 trojanscan_tailpoolsize = k;
2180 return i;
2181 }
2182
2183 nick *trojanscan_selectuser(void) {
2184 int target = trojanscan_minmaxrand(0, 500), loops = 150, j;
2185 nick *np;
2186 do {
2187 for (j=trojanscan_minmaxrand(0, NICKHASHSIZE-1);j<NICKHASHSIZE;j++)
2188 for(np=nicktable[j];np;np=np->next)
2189 if (!--target)
2190 return np;
2191 } while(--loops > 0);
2192 return NULL;
2193 }
2194
2195 host *trojanscan_selecthost(void) {
2196 int target = trojanscan_minmaxrand(0, 500), loops = 150, j;
2197 host *hp;
2198 do {
2199 for (j=trojanscan_minmaxrand(0, HOSTHASHSIZE-1);j<HOSTHASHSIZE;j++)
2200 for(hp=hosttable[j];hp;hp=hp->next)
2201 if (!--target)
2202 return hp;
2203 } while(--loops > 0);
2204
2205 return NULL;
2206 }
2207
2208 void trojanscan_generatehost(char *buf, int maxsize, long *fakeip) {
2209 if(TROJANSCAN_HOST_MODE == TROJANSCAN_STEAL_HOST) {
2210 host *hp;
2211 int loops = 20;
2212
2213 buf[0] = '\0';
2214
2215 do {
2216 hp = trojanscan_selecthost();
2217 if(hp && (hp->clonecount <= TROJANSCAN_MAX_CLONE_COUNT) && !trojanscan_isip(hp->name->content)) {
2218 strlcpy(buf, hp->name->content, maxsize + 1);
2219 if(hp->nicks) {
2220 *fakeip = hp->nicks->ipaddress;
2221 } else {
2222 *fakeip = (trojanscan_minmaxrand(0, 65535) << 16) | trojanscan_minmaxrand(0, 65535);
2223 }
2224 break;
2225 }
2226 } while(--loops > 0);
2227 } else {
2228 char *cpos;
2229 int pieces = trojanscan_minmaxrand(2, 4), totallen = 0, a = 0, i;
2230 int *choices = malloc(sizeof(int) * (pieces + 1));
2231 int *lengths = malloc(sizeof(int) * (pieces + 1));
2232
2233 choices[pieces] = trojanscan_minmaxrand(0, trojanscan_tailpoolsize-1);
2234 lengths[pieces] = strlen(trojanscan_tailpool[choices[pieces]]->content) + 1;
2235 totallen += lengths[pieces];
2236
2237 for (i=0;i<pieces;i++) {
2238 choices[i] = trojanscan_minmaxrand(0, trojanscan_hostpoolsize-1);
2239 lengths[i] = strlen(trojanscan_hostpool[choices[i]]->content) + 1;
2240 if (totallen+lengths[i] > maxsize) {
2241 choices[i] = choices[pieces];
2242 lengths[i] = lengths[pieces];
2243 pieces-=(pieces-i);
2244 break;
2245 }
2246 totallen += lengths[i];
2247 }
2248
2249 for (i=0;i<pieces;i++) {
2250 for (cpos=trojanscan_hostpool[choices[i]]->content; *cpos;)
2251 buf[a++] = *cpos++;
2252 buf[a++] = '.';
2253 }
2254
2255 for (cpos=trojanscan_tailpool[choices[i]]->content; *cpos;) {
2256 buf[a++] = *cpos++;
2257 }
2258
2259 buf[a] = '\0';
2260 free(choices);
2261 free(lengths);
2262
2263 *fakeip = (trojanscan_minmaxrand(0, 65535) << 16) | trojanscan_minmaxrand(0, 65535);
2264 }
2265 }
2266
2267 void trojanscan_generatenick(char *buf, int maxsize) {
2268 int bits = trojanscan_minmaxrand(2, 3), loops = 0, wanttocopy, len = 0, i, d = 0, newmaxsize = maxsize - trojanscan_minmaxrand(0, 7);
2269 nick *np;
2270
2271 if(newmaxsize > 2)
2272 maxsize = newmaxsize;
2273
2274 do {
2275 np = trojanscan_selectuser();
2276 if(np) {
2277 wanttocopy = trojanscan_minmaxrand(1, (strlen(np->nick) / 2) + 3);
2278 for(i=0;((i<wanttocopy) && (len<maxsize));i++)
2279 buf[len++] = np->nick[i];
2280 if(++d > bits) {
2281 buf[len] = '\0';
2282 return;
2283 }
2284 }
2285 } while (++loops < 10);
2286 buf[0] = '\0';
2287 }
2288
2289 void trojanscan_generateident(char *buf, int maxsize) {
2290 nick *np = trojanscan_selectuser();
2291 buf[0] = '\0';
2292 if(np)
2293 strlcpy(buf, np->ident, maxsize + 1);
2294 }
2295
2296 void trojanscan_generaterealname(char *buf, int maxsize) {
2297 nick *np = trojanscan_selectuser();
2298 buf[0] = '\0';
2299 if(np)
2300 strlcpy(buf, np->realname->name->content, maxsize + 1);
2301 }
2302
2303 void trojanscan_database_close(void) {
2304 mysql_close(&trojanscan_sql);
2305 }
2306
2307 int trojanscan_database_connect(char *dbhost, char *dbuser, char *dbpass, char *db, unsigned int port) {
2308 mysql_init(&trojanscan_sql);
2309 if (!mysql_real_connect(&trojanscan_sql, dbhost, dbuser, dbpass, db, port, NULL, 0))
2310 return -1;
2311 return 0;
2312 }
2313
2314 void trojanscan_database_escape_string(char *dest, char *source, size_t length) {
2315 mysql_escape_string(dest, source, length);
2316 }
2317
2318 int trojanscan_database_query(char *format, ...) {
2319 char trojanscan_sqlquery[TROJANSCAN_QUERY_BUF_SIZE];
2320 va_list va;
2321
2322 va_start(va, format);
2323 vsnprintf(trojanscan_sqlquery, sizeof(trojanscan_sqlquery) - 1, format, va);
2324 va_end(va);
2325 return mysql_query(&trojanscan_sql, trojanscan_sqlquery);
2326 }
2327
2328 int trojanscan_database_num_rows(trojanscan_database_res *res) {
2329 return mysql_num_rows(res);
2330 }
2331
2332 trojanscan_database_res *trojanscan_database_store_result() {
2333 return mysql_store_result(&trojanscan_sql);
2334 }
2335
2336 trojanscan_database_row trojanscan_database_fetch_row(trojanscan_database_res *res) {
2337 return mysql_fetch_row(res);
2338 }
2339
2340 void trojanscan_database_free_result(trojanscan_database_res *res) {
2341 mysql_free_result(res);
2342 }
2343
2344 int trojanscan_isip(char *host) {
2345 char *p = host, components = 0, length = 0;
2346
2347 for(;*p;p++) {
2348 if(*p == '.') {
2349 if(((!length) || (length = 0)) || (++components > 3))
2350 return 0;
2351 } else {
2352 if ((++length > 3) || !isdigit(*p))
2353 return 0;
2354 }
2355 }
2356 return components == 3;
2357 }
2358