]>
Commit | Line | Data |
---|---|---|
189935b1 | 1 | /* |
2 | * IRC - Internet Relay Chat, ircd/s_conf.c | |
3 | * Copyright (C) 1990 Jarkko Oikarinen and | |
4 | * University of Oulu, Computing Center | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or modify | |
7 | * it under the terms of the GNU General Public License as published by | |
8 | * the Free Software Foundation; either version 1, or (at your option) | |
9 | * any later version. | |
10 | * | |
11 | * This program is distributed in the hope that it will be useful, | |
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 | * GNU General Public License for more details. | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License | |
17 | * along with this program; if not, write to the Free Software | |
18 | * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. | |
19 | */ | |
20 | /** @file | |
21 | * @brief ircd configuration file driver | |
22 | * @version $Id: s_conf.c,v 1.81.2.1 2005/10/06 00:37:31 entrope Exp $ | |
23 | */ | |
24 | #include "config.h" | |
25 | ||
26 | #include "s_conf.h" | |
27 | #include "IPcheck.h" | |
28 | #include "class.h" | |
29 | #include "client.h" | |
30 | #include "crule.h" | |
31 | #include "ircd_features.h" | |
32 | #include "fileio.h" | |
33 | #include "gline.h" | |
34 | #include "hash.h" | |
35 | #include "ircd.h" | |
36 | #include "ircd_alloc.h" | |
37 | #include "ircd_auth.h" | |
38 | #include "ircd_chattr.h" | |
39 | #include "ircd_log.h" | |
40 | #include "ircd_reply.h" | |
41 | #include "ircd_snprintf.h" | |
42 | #include "ircd_string.h" | |
43 | #include "list.h" | |
44 | #include "listener.h" | |
45 | #include "match.h" | |
46 | #include "motd.h" | |
47 | #include "numeric.h" | |
48 | #include "numnicks.h" | |
49 | #include "opercmds.h" | |
50 | #include "parse.h" | |
51 | #include "res.h" | |
52 | #include "s_bsd.h" | |
53 | #include "s_debug.h" | |
54 | #include "s_misc.h" | |
55 | #include "send.h" | |
56 | #include "struct.h" | |
57 | #include "sys.h" | |
58 | ||
59 | /* #include <assert.h> -- Now using assert in ircd_log.h */ | |
60 | #include <errno.h> | |
61 | #include <fcntl.h> | |
62 | #include <netdb.h> | |
63 | #include <stdio.h> | |
64 | #include <stdlib.h> | |
65 | #include <string.h> | |
66 | #include <sys/stat.h> | |
67 | #include <unistd.h> | |
68 | ||
69 | /** Global list of all ConfItem structures. */ | |
70 | struct ConfItem *GlobalConfList; | |
71 | /** Count of items in #GlobalConfList. */ | |
72 | int GlobalConfCount; | |
73 | /** Global list of service mappings. */ | |
74 | struct s_map *GlobalServiceMapList; | |
75 | /** Global list of channel quarantines. */ | |
76 | struct qline *GlobalQuarantineList; | |
77 | ||
78 | /** Current line number in scanner input. */ | |
79 | int lineno; | |
80 | ||
81 | /** Configuration information for #me. */ | |
82 | struct LocalConf localConf; | |
83 | /** Global list of connection rules. */ | |
84 | struct CRuleConf* cruleConfList; | |
85 | /** Global list of K-lines. */ | |
86 | struct DenyConf* denyConfList; | |
87 | ||
88 | /** Tell a user that they are banned, dumping the message from a file. | |
89 | * @param sptr Client being rejected | |
90 | * @param filename Send this file's contents to \a sptr | |
91 | */ | |
92 | static void killcomment(struct Client* sptr, const char* filename) | |
93 | { | |
94 | FBFILE* file = 0; | |
95 | char line[80]; | |
96 | struct stat sb; | |
97 | struct tm* tm; | |
98 | ||
99 | if (NULL == (file = fbopen(filename, "r"))) { | |
100 | send_reply(sptr, ERR_NOMOTD); | |
101 | send_reply(sptr, SND_EXPLICIT | ERR_YOUREBANNEDCREEP, | |
102 | ":Connection from your host is refused on this server."); | |
103 | return; | |
104 | } | |
105 | fbstat(&sb, file); | |
106 | tm = localtime((time_t*) &sb.st_mtime); /* NetBSD needs cast */ | |
107 | while (fbgets(line, sizeof(line) - 1, file)) { | |
108 | char* end = line + strlen(line); | |
109 | while (end > line) { | |
110 | --end; | |
111 | if ('\n' == *end || '\r' == *end) | |
112 | *end = '\0'; | |
113 | else | |
114 | break; | |
115 | } | |
116 | send_reply(sptr, RPL_MOTD, line); | |
117 | } | |
118 | send_reply(sptr, SND_EXPLICIT | ERR_YOUREBANNEDCREEP, | |
119 | ":Connection from your host is refused on this server."); | |
120 | fbclose(file); | |
121 | } | |
122 | ||
123 | /** Allocate a new struct ConfItem and link it to #GlobalConfList. | |
124 | * @return Newly allocated structure. | |
125 | */ | |
126 | struct ConfItem* make_conf(int type) | |
127 | { | |
128 | struct ConfItem* aconf; | |
129 | ||
130 | aconf = (struct ConfItem*) MyMalloc(sizeof(struct ConfItem)); | |
131 | assert(0 != aconf); | |
132 | ++GlobalConfCount; | |
133 | memset(aconf, 0, sizeof(struct ConfItem)); | |
134 | aconf->status = type; | |
135 | aconf->next = GlobalConfList; | |
136 | GlobalConfList = aconf; | |
137 | return aconf; | |
138 | } | |
139 | ||
140 | /** Free a struct ConfItem and any resources it owns. | |
141 | * @param aconf Item to free. | |
142 | */ | |
143 | void free_conf(struct ConfItem *aconf) | |
144 | { | |
145 | Debug((DEBUG_DEBUG, "free_conf: %s %s %d", | |
146 | aconf->host ? aconf->host : "*", | |
147 | aconf->name ? aconf->name : "*", | |
148 | aconf->address.port)); | |
149 | if (aconf->dns_pending) | |
150 | delete_resolver_queries(aconf); | |
151 | MyFree(aconf->username); | |
152 | MyFree(aconf->host); | |
153 | MyFree(aconf->origin_name); | |
154 | if (aconf->passwd) | |
155 | memset(aconf->passwd, 0, strlen(aconf->passwd)); | |
156 | MyFree(aconf->passwd); | |
157 | MyFree(aconf->name); | |
158 | MyFree(aconf->hub_limit); | |
159 | MyFree(aconf); | |
160 | --GlobalConfCount; | |
161 | } | |
162 | ||
163 | /** Disassociate configuration from the client. | |
164 | * @param cptr Client to operate on. | |
165 | * @param aconf ConfItem to detach. | |
166 | */ | |
167 | static void detach_conf(struct Client* cptr, struct ConfItem* aconf) | |
168 | { | |
169 | struct SLink** lp; | |
170 | struct SLink* tmp; | |
171 | ||
172 | assert(0 != aconf); | |
173 | assert(0 != cptr); | |
174 | assert(0 < aconf->clients); | |
175 | ||
176 | lp = &(cli_confs(cptr)); | |
177 | ||
178 | while (*lp) { | |
179 | if ((*lp)->value.aconf == aconf) { | |
180 | if (aconf->conn_class && (aconf->status & CONF_CLIENT_MASK) && ConfLinks(aconf) > 0) | |
181 | --ConfLinks(aconf); | |
182 | ||
183 | assert(0 < aconf->clients); | |
184 | if (0 == --aconf->clients && IsIllegal(aconf)) | |
185 | free_conf(aconf); | |
186 | tmp = *lp; | |
187 | *lp = tmp->next; | |
188 | free_link(tmp); | |
189 | return; | |
190 | } | |
191 | lp = &((*lp)->next); | |
192 | } | |
193 | } | |
194 | ||
195 | /** Parse a user\@host mask into username and host or IP parts. | |
196 | * If \a host contains no username part, set \a aconf->username to | |
197 | * NULL. If the host part of \a host looks like an IP mask, set \a | |
198 | * aconf->addrbits and \a aconf->address to match. Otherwise, set | |
199 | * \a aconf->host, and set \a aconf->addrbits to -1. | |
200 | * @param[in,out] aconf Configuration item to set. | |
201 | * @param[in] host user\@host mask to parse. | |
202 | */ | |
203 | void conf_parse_userhost(struct ConfItem *aconf, char *host) | |
204 | { | |
205 | char *host_part; | |
206 | unsigned char addrbits; | |
207 | ||
208 | MyFree(aconf->username); | |
209 | MyFree(aconf->host); | |
210 | host_part = strchr(host, '@'); | |
211 | if (host_part) { | |
212 | *host_part = '\0'; | |
213 | DupString(aconf->username, host); | |
214 | host_part++; | |
215 | } else { | |
216 | aconf->username = NULL; | |
217 | host_part = host; | |
218 | } | |
219 | DupString(aconf->host, host_part); | |
220 | if (ipmask_parse(aconf->host, &aconf->address.addr, &addrbits)) | |
221 | aconf->addrbits = addrbits; | |
222 | else | |
223 | aconf->addrbits = -1; | |
224 | MyFree(host); | |
225 | } | |
226 | ||
227 | /** Copies a completed DNS query into its ConfItem. | |
228 | * @param vptr Pointer to struct ConfItem for the block. | |
229 | * @param hp DNS reply, or NULL if the lookup failed. | |
230 | */ | |
231 | static void conf_dns_callback(void* vptr, const struct irc_in_addr *addr, const char *h_name) | |
232 | { | |
233 | struct ConfItem* aconf = (struct ConfItem*) vptr; | |
234 | assert(aconf); | |
235 | aconf->dns_pending = 0; | |
236 | if (addr) | |
237 | memcpy(&aconf->address.addr, addr, sizeof(aconf->address.addr)); | |
238 | } | |
239 | ||
240 | /** Start a nameserver lookup of the conf host. If the conf entry is | |
241 | * currently doing a lookup, do nothing. | |
242 | * @param aconf ConfItem for which to start a request. | |
243 | */ | |
244 | static void conf_dns_lookup(struct ConfItem* aconf) | |
245 | { | |
246 | if (!aconf->dns_pending) { | |
247 | char buf[HOSTLEN + 1]; | |
248 | ||
249 | host_from_uh(buf, aconf->host, HOSTLEN); | |
250 | gethost_byname(buf, conf_dns_callback, aconf); | |
251 | aconf->dns_pending = 1; | |
252 | } | |
253 | } | |
254 | ||
255 | ||
256 | /** Start lookups of all addresses in the conf line. The origin must | |
257 | * be a numeric IP address. If the remote host field is not an IP | |
258 | * address, start a DNS lookup for it. | |
259 | * @param aconf Connection to do lookups for. | |
260 | */ | |
261 | void | |
262 | lookup_confhost(struct ConfItem *aconf) | |
263 | { | |
264 | if (EmptyString(aconf->host) || EmptyString(aconf->name)) { | |
265 | Debug((DEBUG_ERROR, "Host/server name error: (%s) (%s)", | |
266 | aconf->host, aconf->name)); | |
267 | return; | |
268 | } | |
269 | if (aconf->origin_name | |
270 | && !ircd_aton(&aconf->origin.addr, aconf->origin_name)) { | |
271 | Debug((DEBUG_ERROR, "Origin name error: (%s) (%s)", | |
272 | aconf->origin_name, aconf->name)); | |
273 | } | |
274 | /* | |
275 | * Do name lookup now on hostnames given and store the | |
276 | * ip numbers in conf structure. | |
277 | */ | |
278 | if (IsIP6Char(*aconf->host)) { | |
279 | if (!ircd_aton(&aconf->address.addr, aconf->host)) { | |
280 | Debug((DEBUG_ERROR, "Host/server name error: (%s) (%s)", | |
281 | aconf->host, aconf->name)); | |
282 | } | |
283 | } | |
284 | else | |
285 | conf_dns_lookup(aconf); | |
286 | } | |
287 | ||
288 | /** Find a server by name or hostname. | |
289 | * @param name Server name to find. | |
290 | * @return Pointer to the corresponding ConfItem, or NULL if none exists. | |
291 | */ | |
292 | struct ConfItem* conf_find_server(const char* name) | |
293 | { | |
294 | struct ConfItem* conf; | |
295 | assert(0 != name); | |
296 | ||
297 | for (conf = GlobalConfList; conf; conf = conf->next) { | |
298 | if (CONF_SERVER == conf->status) { | |
299 | /* | |
300 | * Check first servernames, then try hostnames. | |
301 | * XXX - match returns 0 if there _is_ a match... guess they | |
302 | * haven't decided what true is yet | |
303 | */ | |
304 | if (0 == match(name, conf->name)) | |
305 | return conf; | |
306 | } | |
307 | } | |
308 | return 0; | |
309 | } | |
310 | ||
311 | /** Evaluate connection rules. | |
312 | * @param name Name of server to check | |
313 | * @param mask Filter for CRule types (only consider if type & \a mask != 0). | |
314 | * @return Name of rule that forbids the connection; NULL if no prohibitions. | |
315 | */ | |
316 | const char* conf_eval_crule(const char* name, int mask) | |
317 | { | |
318 | struct CRuleConf* p = cruleConfList; | |
319 | assert(0 != name); | |
320 | ||
321 | for ( ; p; p = p->next) { | |
322 | if (0 != (p->type & mask) && 0 == match(p->hostmask, name)) { | |
323 | if (crule_eval(p->node)) | |
324 | return p->rule; | |
325 | } | |
326 | } | |
327 | return 0; | |
328 | } | |
329 | ||
330 | /** Remove all conf entries from the client except those which match | |
331 | * the status field mask. | |
332 | * @param cptr Client to operate on. | |
333 | * @param mask ConfItem types to keep. | |
334 | */ | |
335 | void det_confs_butmask(struct Client* cptr, int mask) | |
336 | { | |
337 | struct SLink* link; | |
338 | struct SLink* next; | |
339 | assert(0 != cptr); | |
340 | ||
341 | for (link = cli_confs(cptr); link; link = next) { | |
342 | next = link->next; | |
343 | if ((link->value.aconf->status & mask) == 0) | |
344 | detach_conf(cptr, link->value.aconf); | |
345 | } | |
346 | } | |
347 | ||
348 | /** Find the first (best) Client block to attach. | |
349 | * @param cptr Client for whom to check rules. | |
350 | * @return Authorization check result. | |
351 | */ | |
352 | enum AuthorizationCheckResult attach_iline(struct Client* cptr) | |
353 | { | |
354 | struct ConfItem* aconf; | |
355 | ||
356 | assert(0 != cptr); | |
357 | ||
358 | for (aconf = GlobalConfList; aconf; aconf = aconf->next) { | |
359 | if (aconf->status != CONF_CLIENT) | |
360 | continue; | |
361 | /* If you change any of this logic, please make corresponding | |
362 | * changes in conf_debug_iline() below. | |
363 | */ | |
364 | if (aconf->address.port && aconf->address.port != cli_listener(cptr)->addr.port) | |
365 | continue; | |
366 | if (aconf->username && match(aconf->username, cli_username(cptr))) | |
367 | continue; | |
368 | if (aconf->host && match(aconf->host, cli_sockhost(cptr))) | |
369 | continue; | |
370 | if ((aconf->addrbits >= 0) | |
371 | && !ipmask_check(&cli_ip(cptr), &aconf->address.addr, aconf->addrbits)) | |
372 | continue; | |
373 | if (IPcheck_nr(cptr) > aconf->maximum) | |
374 | return ACR_TOO_MANY_FROM_IP; | |
375 | if (aconf->username) | |
376 | SetFlag(cptr, FLAG_DOID); | |
377 | return attach_conf(cptr, aconf); | |
378 | } | |
379 | return ACR_NO_AUTHORIZATION; | |
380 | } | |
381 | ||
382 | /** Interpret \a client as a client specifier and show which Client | |
383 | * block(s) match that client. | |
384 | * | |
385 | * The client specifier may contain an IP address, hostname, listener | |
386 | * port, or a combination of those separated by commas. IP addresses | |
387 | * and hostnamese may be preceded by "username@"; the last given | |
388 | * username will be used for the match. | |
389 | * | |
390 | * @param[in] client Client specifier. | |
391 | * @return Matching Client block structure. | |
392 | */ | |
393 | struct ConfItem *conf_debug_iline(const char *client) | |
394 | { | |
395 | struct irc_in_addr address; | |
396 | struct ConfItem *aconf; | |
397 | struct DenyConf *deny; | |
398 | char *sep; | |
399 | unsigned short listener; | |
400 | char username[USERLEN+1], hostname[HOSTLEN+1], realname[REALLEN+1]; | |
401 | ||
402 | /* Initialize variables. */ | |
403 | listener = 0; | |
404 | memset(&address, 0, sizeof(address)); | |
405 | memset(&username, 0, sizeof(username)); | |
406 | memset(&hostname, 0, sizeof(hostname)); | |
407 | memset(&realname, 0, sizeof(realname)); | |
408 | ||
409 | /* Parse client specifier. */ | |
410 | while (*client) { | |
411 | struct irc_in_addr tmpaddr; | |
412 | long tmp; | |
413 | ||
414 | /* Try to parse as listener port number first. */ | |
415 | tmp = strtol(client, &sep, 10); | |
416 | if (tmp && (*sep == '\0' || *sep == ',')) { | |
417 | listener = tmp; | |
418 | client = sep + (*sep != '\0'); | |
419 | continue; | |
420 | } | |
421 | ||
422 | /* Maybe username@ before an IP address or hostname? */ | |
423 | tmp = strcspn(client, ",@"); | |
424 | if (client[tmp] == '@') { | |
425 | if (tmp > USERLEN) | |
426 | tmp = USERLEN; | |
427 | ircd_strncpy(username, client, tmp); | |
428 | /* and fall through */ | |
429 | client += tmp + 1; | |
430 | } | |
431 | ||
432 | /* Looks like an IP address? */ | |
433 | tmp = ircd_aton(&tmpaddr, client); | |
434 | if (tmp && (client[tmp] == '\0' || client[tmp] == ',')) { | |
435 | memcpy(&address, &tmpaddr, sizeof(address)); | |
436 | client += tmp + (client[tmp] != '\0'); | |
437 | continue; | |
438 | } | |
439 | ||
440 | /* Realname? */ | |
441 | if (client[0] == '$' && client[1] == 'R') { | |
442 | client += 2; | |
443 | for (tmp = 0; *client != '\0' && *client != ',' && tmp < REALLEN; ++client, ++tmp) { | |
444 | if (*client == '\\') | |
445 | realname[tmp] = *++client; | |
446 | else | |
447 | realname[tmp] = *client; | |
448 | } | |
449 | continue; | |
450 | } | |
451 | ||
452 | /* Else must be a hostname. */ | |
453 | tmp = strcspn(client, ","); | |
454 | if (tmp > HOSTLEN) | |
455 | tmp = HOSTLEN; | |
456 | ircd_strncpy(hostname, client, tmp); | |
457 | client += tmp + (client[tmp] != '\0'); | |
458 | } | |
459 | ||
460 | /* Walk configuration to find matching Client block. */ | |
461 | for (aconf = GlobalConfList; aconf; aconf = aconf->next) { | |
462 | if (aconf->status != CONF_CLIENT) | |
463 | continue; | |
464 | if (aconf->address.port && aconf->address.port != listener) { | |
465 | fprintf(stdout, "Listener port mismatch: %u != %u\n", aconf->address.port, listener); | |
466 | continue; | |
467 | } | |
468 | if (aconf->username && match(aconf->username, username)) { | |
469 | fprintf(stdout, "Username mismatch: %s != %s\n", aconf->username, username); | |
470 | continue; | |
471 | } | |
472 | if (aconf->host && match(aconf->host, hostname)) { | |
473 | fprintf(stdout, "Hostname mismatch: %s != %s\n", aconf->host, hostname); | |
474 | continue; | |
475 | } | |
476 | if ((aconf->addrbits >= 0) | |
477 | && !ipmask_check(&address, &aconf->address.addr, aconf->addrbits)) { | |
478 | fprintf(stdout, "IP address mismatch: %s != %s\n", aconf->name, ircd_ntoa(&address)); | |
479 | continue; | |
480 | } | |
481 | fprintf(stdout, "Match! username=%s host=%s ip=%s class=%s maxlinks=%u password=%s\n", | |
482 | (aconf->username ? aconf->username : "(null)"), | |
483 | (aconf->host ? aconf->host : "(null)"), | |
484 | (aconf->name ? aconf->name : "(null)"), | |
485 | ConfClass(aconf), aconf->maximum, aconf->passwd); | |
486 | break; | |
487 | } | |
488 | ||
489 | /* If no authorization, say so and exit. */ | |
490 | if (!aconf) | |
491 | { | |
492 | fprintf(stdout, "No authorization found.\n"); | |
493 | return NULL; | |
494 | } | |
495 | ||
496 | /* Look for a Kill block with the user's name on it. */ | |
497 | for (deny = denyConfList; deny; deny = deny->next) { | |
498 | if (deny->usermask && match(deny->usermask, username)) | |
499 | continue; | |
500 | if (deny->realmask && match(deny->realmask, realname)) | |
501 | continue; | |
502 | if (deny->bits > 0) { | |
503 | if (!ipmask_check(&address, &deny->address, deny->bits)) | |
504 | continue; | |
505 | } else if (deny->hostmask && match(deny->hostmask, hostname)) | |
506 | continue; | |
507 | ||
508 | /* Looks like a match; report it. */ | |
509 | fprintf(stdout, "Denied! usermask=%s realmask=\"%s\" hostmask=%s (bits=%u)\n", | |
510 | deny->usermask ? deny->usermask : "(null)", | |
511 | deny->realmask ? deny->realmask : "(null)", | |
512 | deny->hostmask ? deny->hostmask : "(null)", | |
513 | deny->bits); | |
514 | } | |
515 | ||
516 | return aconf; | |
517 | } | |
518 | ||
519 | /** Check whether a particular ConfItem is already attached to a | |
520 | * Client. | |
521 | * @param aconf ConfItem to search for | |
522 | * @param cptr Client to check | |
523 | * @return Non-zero if \a aconf is attached to \a cptr, zero if not. | |
524 | */ | |
525 | static int is_attached(struct ConfItem *aconf, struct Client *cptr) | |
526 | { | |
527 | struct SLink *lp; | |
528 | ||
529 | for (lp = cli_confs(cptr); lp; lp = lp->next) { | |
530 | if (lp->value.aconf == aconf) | |
531 | return 1; | |
532 | } | |
533 | return 0; | |
534 | } | |
535 | ||
536 | /** Associate a specific configuration entry to a *local* client (this | |
537 | * is the one which used in accepting the connection). Note, that this | |
538 | * automatically changes the attachment if there was an old one... | |
539 | * @param cptr Client to attach \a aconf to | |
540 | * @param aconf ConfItem to attach | |
541 | * @return Authorization check result. | |
542 | */ | |
543 | enum AuthorizationCheckResult attach_conf(struct Client *cptr, struct ConfItem *aconf) | |
544 | { | |
545 | struct SLink *lp; | |
546 | ||
547 | if (is_attached(aconf, cptr)) | |
548 | return ACR_ALREADY_AUTHORIZED; | |
549 | if (IsIllegal(aconf)) | |
550 | return ACR_NO_AUTHORIZATION; | |
551 | if ((aconf->status & (CONF_OPERATOR | CONF_CLIENT)) && | |
552 | ConfLinks(aconf) >= ConfMaxLinks(aconf) && ConfMaxLinks(aconf) > 0) | |
553 | return ACR_TOO_MANY_IN_CLASS; /* Use this for printing error message */ | |
554 | lp = make_link(); | |
555 | lp->next = cli_confs(cptr); | |
556 | lp->value.aconf = aconf; | |
557 | cli_confs(cptr) = lp; | |
558 | ++aconf->clients; | |
559 | if (aconf->status & CONF_CLIENT_MASK) | |
560 | ConfLinks(aconf)++; | |
561 | return ACR_OK; | |
562 | } | |
563 | ||
564 | /** Return our LocalConf configuration structure. | |
565 | * @return A pointer to #localConf. | |
566 | */ | |
567 | const struct LocalConf* conf_get_local(void) | |
568 | { | |
569 | return &localConf; | |
570 | } | |
571 | ||
572 | /** Attach ConfItems to a client if the name passed matches that for | |
573 | * the ConfItems or is an exact match for them. | |
574 | * @param cptr Client getting the ConfItem attachments. | |
575 | * @param name Filter to match ConfItem::name. | |
576 | * @param statmask Filter to limit ConfItem::status. | |
577 | * @return First ConfItem attached to \a cptr. | |
578 | */ | |
579 | struct ConfItem* attach_confs_byname(struct Client* cptr, const char* name, | |
580 | int statmask) | |
581 | { | |
582 | struct ConfItem* tmp; | |
583 | struct ConfItem* first = NULL; | |
584 | ||
585 | assert(0 != name); | |
586 | ||
587 | if (HOSTLEN < strlen(name)) | |
588 | return 0; | |
589 | ||
590 | for (tmp = GlobalConfList; tmp; tmp = tmp->next) { | |
591 | if (0 != (tmp->status & statmask) && !IsIllegal(tmp)) { | |
592 | assert(0 != tmp->name); | |
593 | if (0 == match(tmp->name, name) || 0 == ircd_strcmp(tmp->name, name)) { | |
594 | if (ACR_OK == attach_conf(cptr, tmp) && !first) | |
595 | first = tmp; | |
596 | } | |
597 | } | |
598 | } | |
599 | return first; | |
600 | } | |
601 | ||
602 | /** Attach ConfItems to a client if the host passed matches that for | |
603 | * the ConfItems or is an exact match for them. | |
604 | * @param cptr Client getting the ConfItem attachments. | |
605 | * @param host Filter to match ConfItem::host. | |
606 | * @param statmask Filter to limit ConfItem::status. | |
607 | * @return First ConfItem attached to \a cptr. | |
608 | */ | |
609 | struct ConfItem* attach_confs_byhost(struct Client* cptr, const char* host, | |
610 | int statmask) | |
611 | { | |
612 | struct ConfItem* tmp; | |
613 | struct ConfItem* first = 0; | |
614 | ||
615 | assert(0 != host); | |
616 | if (HOSTLEN < strlen(host)) | |
617 | return 0; | |
618 | ||
619 | for (tmp = GlobalConfList; tmp; tmp = tmp->next) { | |
620 | if (0 != (tmp->status & statmask) && !IsIllegal(tmp)) { | |
621 | assert(0 != tmp->host); | |
622 | if (0 == match(tmp->host, host) || 0 == ircd_strcmp(tmp->host, host)) { | |
623 | if (ACR_OK == attach_conf(cptr, tmp) && !first) | |
624 | first = tmp; | |
625 | } | |
626 | } | |
627 | } | |
628 | return first; | |
629 | } | |
630 | ||
631 | /** Find a ConfItem that has the same name and user+host fields as | |
632 | * specified. Requires an exact match for \a name. | |
633 | * @param name Name to match | |
634 | * @param cptr Client to match against | |
635 | * @param statmask Filter for ConfItem::status | |
636 | * @return First found matching ConfItem. | |
637 | */ | |
638 | struct ConfItem* find_conf_exact(const char* name, struct Client *cptr, int statmask) | |
639 | { | |
640 | struct ConfItem *tmp; | |
641 | ||
642 | for (tmp = GlobalConfList; tmp; tmp = tmp->next) { | |
643 | if (!(tmp->status & statmask) || !tmp->name || !tmp->host || | |
644 | 0 != ircd_strcmp(tmp->name, name)) | |
645 | continue; | |
646 | if (tmp->username | |
647 | && (EmptyString(cli_username(cptr)) | |
648 | || match(tmp->username, cli_username(cptr)))) | |
649 | continue; | |
650 | if (tmp->addrbits < 0) | |
651 | { | |
652 | if (match(tmp->host, cli_sockhost(cptr))) | |
653 | continue; | |
654 | } | |
655 | else if (!ipmask_check(&cli_ip(cptr), &tmp->address.addr, tmp->addrbits)) | |
656 | continue; | |
657 | if ((tmp->status & CONF_OPERATOR) | |
658 | && (tmp->clients >= MaxLinks(tmp->conn_class))) | |
659 | continue; | |
660 | return tmp; | |
661 | } | |
662 | return 0; | |
663 | } | |
664 | ||
665 | /** Find a ConfItem from a list that has a name that matches \a name. | |
666 | * @param lp List to search in. | |
667 | * @param name Filter for ConfItem::name field; matches either exactly | |
668 | * or as a glob. | |
669 | * @param statmask Filter for ConfItem::status. | |
670 | * @return First matching ConfItem from \a lp. | |
671 | */ | |
672 | struct ConfItem* find_conf_byname(struct SLink* lp, const char* name, | |
673 | int statmask) | |
674 | { | |
675 | struct ConfItem* tmp; | |
676 | assert(0 != name); | |
677 | ||
678 | if (HOSTLEN < strlen(name)) | |
679 | return 0; | |
680 | ||
681 | for (; lp; lp = lp->next) { | |
682 | tmp = lp->value.aconf; | |
683 | if (0 != (tmp->status & statmask)) { | |
684 | assert(0 != tmp->name); | |
685 | if (0 == ircd_strcmp(tmp->name, name) || 0 == match(tmp->name, name)) | |
686 | return tmp; | |
687 | } | |
688 | } | |
689 | return 0; | |
690 | } | |
691 | ||
692 | /** Find a ConfItem from a list that has a host that matches \a host. | |
693 | * @param lp List to search in. | |
694 | * @param host Filter for ConfItem::host field; matches as a glob. | |
695 | * @param statmask Filter for ConfItem::status. | |
696 | * @return First matching ConfItem from \a lp. | |
697 | */ | |
698 | struct ConfItem* find_conf_byhost(struct SLink* lp, const char* host, | |
699 | int statmask) | |
700 | { | |
701 | struct ConfItem* tmp = NULL; | |
702 | assert(0 != host); | |
703 | ||
704 | if (HOSTLEN < strlen(host)) | |
705 | return 0; | |
706 | ||
707 | for (; lp; lp = lp->next) { | |
708 | tmp = lp->value.aconf; | |
709 | if (0 != (tmp->status & statmask)) { | |
710 | assert(0 != tmp->host); | |
711 | if (0 == match(tmp->host, host)) | |
712 | return tmp; | |
713 | } | |
714 | } | |
715 | return 0; | |
716 | } | |
717 | ||
718 | /** Find a ConfItem from a list that has an address equal to \a ip. | |
719 | * @param lp List to search in. | |
720 | * @param ip Filter for ConfItem::address field; matches exactly. | |
721 | * @param statmask Filter for ConfItem::status. | |
722 | * @return First matching ConfItem from \a lp. | |
723 | */ | |
724 | struct ConfItem* find_conf_byip(struct SLink* lp, const struct irc_in_addr* ip, | |
725 | int statmask) | |
726 | { | |
727 | struct ConfItem* tmp; | |
728 | ||
729 | for (; lp; lp = lp->next) { | |
730 | tmp = lp->value.aconf; | |
731 | if (0 != (tmp->status & statmask) | |
732 | && !irc_in_addr_cmp(&tmp->address.addr, ip)) | |
733 | return tmp; | |
734 | } | |
735 | return 0; | |
736 | } | |
737 | ||
738 | /** Free all CRules from #cruleConfList. */ | |
739 | void conf_erase_crule_list(void) | |
740 | { | |
741 | struct CRuleConf* next; | |
742 | struct CRuleConf* p = cruleConfList; | |
743 | ||
744 | for ( ; p; p = next) { | |
745 | next = p->next; | |
746 | crule_free(&p->node); | |
747 | MyFree(p->hostmask); | |
748 | MyFree(p->rule); | |
749 | MyFree(p); | |
750 | } | |
751 | cruleConfList = 0; | |
752 | } | |
753 | ||
754 | /** Return #cruleConfList. | |
755 | * @return #cruleConfList | |
756 | */ | |
757 | const struct CRuleConf* conf_get_crule_list(void) | |
758 | { | |
759 | return cruleConfList; | |
760 | } | |
761 | ||
762 | /** Free all deny rules from #denyConfList. */ | |
763 | void conf_erase_deny_list(void) | |
764 | { | |
765 | struct DenyConf* next; | |
766 | struct DenyConf* p = denyConfList; | |
767 | for ( ; p; p = next) { | |
768 | next = p->next; | |
769 | MyFree(p->hostmask); | |
770 | MyFree(p->usermask); | |
771 | MyFree(p->message); | |
772 | MyFree(p->realmask); | |
773 | MyFree(p); | |
774 | } | |
775 | denyConfList = 0; | |
776 | } | |
777 | ||
778 | /** Return #denyConfList. | |
779 | * @return #denyConfList | |
780 | */ | |
781 | const struct DenyConf* conf_get_deny_list(void) | |
782 | { | |
783 | return denyConfList; | |
784 | } | |
785 | ||
786 | /** Find any existing quarantine for the named channel. | |
787 | * @param chname Channel name to search for. | |
788 | * @return Reason for channel's quarantine, or NULL if none exists. | |
789 | */ | |
790 | const char* | |
791 | find_quarantine(const char *chname) | |
792 | { | |
793 | struct qline *qline; | |
794 | ||
795 | for (qline = GlobalQuarantineList; qline; qline = qline->next) | |
796 | if (!ircd_strcmp(qline->chname, chname)) | |
797 | return qline->reason; | |
798 | return NULL; | |
799 | } | |
800 | ||
801 | /** Free all qline structs from #GlobalQuarantineList. */ | |
802 | void clear_quarantines(void) | |
803 | { | |
804 | struct qline *qline; | |
805 | while ((qline = GlobalQuarantineList)) | |
806 | { | |
807 | GlobalQuarantineList = qline->next; | |
808 | MyFree(qline->reason); | |
809 | MyFree(qline->chname); | |
810 | MyFree(qline); | |
811 | } | |
812 | } | |
813 | ||
814 | /** When non-zero, indicates that a configuration error has been seen in this pass. */ | |
815 | static int conf_error; | |
816 | /** When non-zero, indicates that the configuration file was loaded at least once. */ | |
817 | static int conf_already_read; | |
818 | extern FILE *yyin; | |
819 | extern void yyparse(void); | |
820 | extern void init_lexer(void); | |
821 | ||
822 | /** Read configuration file. | |
823 | * @return Zero on failure, non-zero on success. */ | |
824 | int read_configuration_file(void) | |
825 | { | |
826 | conf_error = 0; | |
827 | feature_unmark(); /* unmark all features for resetting later */ | |
828 | /* Now just open an fd. The buffering isn't really needed... */ | |
829 | init_lexer(); | |
830 | yyparse(); | |
831 | fclose(yyin); | |
832 | yyin = NULL; | |
833 | feature_mark(); /* reset unmarked features */ | |
834 | conf_already_read = 1; | |
835 | return 1; | |
836 | } | |
837 | ||
838 | /** Report an error message about the configuration file. | |
839 | * @param msg The error to report. | |
840 | */ | |
841 | void | |
842 | yyerror(const char *msg) | |
843 | { | |
844 | sendto_opmask_butone(0, SNO_ALL, "Config file parse error line %d: %s", | |
845 | lineno, msg); | |
846 | log_write(LS_CONFIG, L_ERROR, 0, "Config file parse error line %d: %s", | |
847 | lineno, msg); | |
848 | if (!conf_already_read) | |
849 | fprintf(stderr, "Config file parse error line %d: %s\n", lineno, msg); | |
850 | conf_error = 1; | |
851 | } | |
852 | ||
853 | /** Attach CONF_UWORLD items to a server and everything attached to it. */ | |
854 | static void | |
855 | attach_conf_uworld(struct Client *cptr) | |
856 | { | |
857 | struct DLink *lp; | |
858 | ||
859 | attach_confs_byhost(cptr, cli_name(cptr), CONF_UWORLD); | |
860 | for (lp = cli_serv(cptr)->down; lp; lp = lp->next) | |
861 | attach_conf_uworld(lp->value.cptr); | |
862 | } | |
863 | ||
864 | /** Free all memory associated with service mapping \a smap. | |
865 | * @param smap[in] The mapping to free. | |
866 | */ | |
867 | void free_mapping(struct s_map *smap) | |
868 | { | |
869 | struct nick_host *nh, *next; | |
870 | for (nh = smap->services; nh; nh = next) | |
871 | { | |
872 | next = nh->next; | |
873 | MyFree(nh); | |
874 | } | |
875 | MyFree(smap->name); | |
876 | MyFree(smap->command); | |
877 | MyFree(smap->prepend); | |
878 | MyFree(smap); | |
879 | } | |
880 | ||
881 | /** Unregister and free all current service mappings. */ | |
882 | static void close_mappings(void) | |
883 | { | |
884 | struct s_map *map, *next; | |
885 | ||
886 | for (map = GlobalServiceMapList; map; map = next) { | |
887 | next = map->next; | |
888 | unregister_mapping(map); | |
889 | free_mapping(map); | |
890 | } | |
891 | GlobalServiceMapList = NULL; | |
892 | } | |
893 | ||
894 | /** Reload the configuration file. | |
895 | * @param cptr Client that requested rehash (if a signal, &me). | |
896 | * @param sig Type of rehash (0 = oper-requested, 1 = signal, 2 = | |
897 | * oper-requested but do not restart resolver) | |
898 | * @return CPTR_KILLED if any client was K/G-lined because of the | |
899 | * rehash; otherwise 0. | |
900 | */ | |
901 | int rehash(struct Client *cptr, int sig) | |
902 | { | |
903 | struct ConfItem** tmp = &GlobalConfList; | |
904 | struct ConfItem* tmp2; | |
905 | struct Client* acptr; | |
906 | int i; | |
907 | int ret = 0; | |
908 | int found_g = 0; | |
909 | ||
910 | if (1 == sig) | |
911 | sendto_opmask_butone(0, SNO_OLDSNO, | |
912 | "Got signal SIGHUP, reloading ircd conf. file"); | |
913 | ||
914 | while ((tmp2 = *tmp)) { | |
915 | if (tmp2->clients) { | |
916 | /* | |
917 | * Configuration entry is still in use by some | |
918 | * local clients, cannot delete it--mark it so | |
919 | * that it will be deleted when the last client | |
920 | * exits... | |
921 | */ | |
922 | if (CONF_CLIENT == (tmp2->status & CONF_CLIENT)) | |
923 | tmp = &tmp2->next; | |
924 | else { | |
925 | *tmp = tmp2->next; | |
926 | tmp2->next = 0; | |
927 | } | |
928 | tmp2->status |= CONF_ILLEGAL; | |
929 | } | |
930 | else { | |
931 | *tmp = tmp2->next; | |
932 | free_conf(tmp2); | |
933 | } | |
934 | } | |
935 | conf_erase_crule_list(); | |
936 | conf_erase_deny_list(); | |
937 | motd_clear(); | |
938 | ||
939 | /* | |
940 | * delete the juped nicks list | |
941 | */ | |
942 | clearNickJupes(); | |
943 | ||
944 | clear_quarantines(); | |
945 | ||
946 | if (sig != 2) | |
947 | restart_resolver(); | |
948 | ||
949 | class_mark_delete(); | |
950 | mark_listeners_closing(); | |
951 | iauth_mark_closing(); | |
952 | close_mappings(); | |
953 | ||
954 | read_configuration_file(); | |
955 | ||
956 | log_reopen(); /* reopen log files */ | |
957 | ||
958 | iauth_close_unused(); | |
959 | close_listeners(); | |
960 | class_delete_marked(); /* unless it fails */ | |
961 | ||
962 | /* | |
963 | * Flush out deleted I and P lines although still in use. | |
964 | */ | |
965 | for (tmp = &GlobalConfList; (tmp2 = *tmp);) { | |
966 | if (CONF_ILLEGAL == (tmp2->status & CONF_ILLEGAL)) { | |
967 | *tmp = tmp2->next; | |
968 | tmp2->next = NULL; | |
969 | if (!tmp2->clients) | |
970 | free_conf(tmp2); | |
971 | } | |
972 | else | |
973 | tmp = &tmp2->next; | |
974 | } | |
975 | ||
976 | for (i = 0; i <= HighestFd; i++) { | |
977 | if ((acptr = LocalClientArray[i])) { | |
978 | assert(!IsMe(acptr)); | |
979 | if (IsServer(acptr)) | |
980 | det_confs_butmask(acptr, ~(CONF_UWORLD | CONF_ILLEGAL)); | |
981 | /* Because admin's are getting so uppity about people managing to | |
982 | * get past K/G's etc, we'll "fix" the bug by actually explaining | |
983 | * whats going on. | |
984 | */ | |
985 | if ((found_g = find_kill(acptr))) { | |
986 | sendto_opmask_butone(0, found_g == -2 ? SNO_GLINE : SNO_OPERKILL, | |
987 | found_g == -2 ? "G-line active for %s%s" : | |
988 | "K-line active for %s%s", | |
989 | IsUnknown(acptr) ? "Unregistered Client ":"", | |
990 | get_client_name(acptr, SHOW_IP)); | |
991 | if (exit_client(cptr, acptr, &me, found_g == -2 ? "G-lined" : | |
992 | "K-lined") == CPTR_KILLED) | |
993 | ret = CPTR_KILLED; | |
994 | } | |
995 | } | |
996 | } | |
997 | ||
998 | attach_conf_uworld(&me); | |
999 | ||
1000 | return ret; | |
1001 | } | |
1002 | ||
1003 | /** Read configuration file for the very first time. | |
1004 | * @return Non-zero on success, zero on failure. | |
1005 | */ | |
1006 | ||
1007 | int init_conf(void) | |
1008 | { | |
1009 | if (read_configuration_file()) { | |
1010 | /* | |
1011 | * make sure we're sane to start if the config | |
1012 | * file read didn't get everything we need. | |
1013 | * XXX - should any of these abort the server? | |
1014 | * TODO: add warning messages | |
1015 | */ | |
1016 | if (0 == localConf.name || 0 == localConf.numeric) | |
1017 | return 0; | |
1018 | if (conf_error) | |
1019 | return 0; | |
1020 | ||
1021 | if (0 == localConf.location1) | |
1022 | DupString(localConf.location1, ""); | |
1023 | if (0 == localConf.location2) | |
1024 | DupString(localConf.location2, ""); | |
1025 | if (0 == localConf.contact) | |
1026 | DupString(localConf.contact, ""); | |
1027 | ||
1028 | return 1; | |
1029 | } | |
1030 | return 0; | |
1031 | } | |
1032 | ||
1033 | /** Searches for a K/G-line for a client. If one is found, notify the | |
1034 | * user and disconnect them. | |
1035 | * @param cptr Client to search for. | |
1036 | * @return 0 if client is accepted; -1 if client was locally denied | |
1037 | * (K-line); -2 if client was globally denied (G-line). | |
1038 | */ | |
1039 | int find_kill(struct Client *cptr) | |
1040 | { | |
1041 | const char* host; | |
1042 | const char* name; | |
1043 | const char* realname; | |
1044 | struct DenyConf* deny; | |
1045 | struct Gline* agline = NULL; | |
1046 | ||
1047 | assert(0 != cptr); | |
1048 | ||
1049 | if (!cli_user(cptr)) | |
1050 | return 0; | |
1051 | ||
1052 | host = cli_sockhost(cptr); | |
1053 | name = cli_user(cptr)->username; | |
1054 | realname = cli_info(cptr); | |
1055 | ||
1056 | assert(strlen(host) <= HOSTLEN); | |
1057 | assert((name ? strlen(name) : 0) <= HOSTLEN); | |
1058 | assert((realname ? strlen(realname) : 0) <= REALLEN); | |
1059 | ||
1060 | /* 2000-07-14: Rewrote this loop for massive speed increases. | |
1061 | * -- Isomer | |
1062 | */ | |
1063 | for (deny = denyConfList; deny; deny = deny->next) { | |
1064 | if (deny->usermask && match(deny->usermask, name)) | |
1065 | continue; | |
1066 | if (deny->realmask && match(deny->realmask, realname)) | |
1067 | continue; | |
1068 | if (deny->bits > 0) { | |
1069 | if (!ipmask_check(&cli_ip(cptr), &deny->address, deny->bits)) | |
1070 | continue; | |
1071 | } else if (deny->hostmask && match(deny->hostmask, host)) | |
1072 | continue; | |
1073 | ||
1074 | if (EmptyString(deny->message)) | |
1075 | send_reply(cptr, SND_EXPLICIT | ERR_YOUREBANNEDCREEP, | |
1076 | ":Connection from your host is refused on this server."); | |
1077 | else { | |
1078 | if (deny->flags & DENY_FLAGS_FILE) | |
1079 | killcomment(cptr, deny->message); | |
1080 | else | |
1081 | send_reply(cptr, SND_EXPLICIT | ERR_YOUREBANNEDCREEP, ":%s.", deny->message); | |
1082 | } | |
1083 | return -1; | |
1084 | } | |
1085 | ||
1086 | if ((agline = gline_lookup(cptr, 0))) { | |
1087 | /* | |
1088 | * find active glines | |
1089 | * added a check against the user's IP address to find_gline() -Kev | |
1090 | */ | |
1091 | send_reply(cptr, SND_EXPLICIT | ERR_YOUREBANNEDCREEP, ":%s.", GlineReason(agline)); | |
1092 | return -2; | |
1093 | } | |
1094 | ||
1095 | return 0; | |
1096 | } | |
1097 | ||
1098 | /** Attempt to attach Client blocks to \a cptr. If attach_iline() | |
1099 | * fails for the client, emit a debugging message. | |
1100 | * @param cptr Client to check for access. | |
1101 | * @return Access check result. | |
1102 | */ | |
1103 | enum AuthorizationCheckResult conf_check_client(struct Client *cptr) | |
1104 | { | |
1105 | enum AuthorizationCheckResult acr = ACR_OK; | |
1106 | ||
1107 | if ((acr = attach_iline(cptr))) { | |
1108 | Debug((DEBUG_DNS, "ch_cl: access denied: %s[%s]", | |
1109 | cli_name(cptr), cli_sockhost(cptr))); | |
1110 | return acr; | |
1111 | } | |
1112 | return ACR_OK; | |
1113 | } | |
1114 | ||
1115 | /** Check access for a server given its name (passed in cptr struct). | |
1116 | * Must check for all C/N lines which have a name which matches the | |
1117 | * name given and a host which matches. A host alias which is the | |
1118 | * same as the server name is also acceptable in the host field of a | |
1119 | * C/N line. | |
1120 | * @param cptr Peer server to check. | |
1121 | * @return 0 if accepted, -1 if access denied. | |
1122 | */ | |
1123 | int conf_check_server(struct Client *cptr) | |
1124 | { | |
1125 | struct ConfItem* c_conf = NULL; | |
1126 | struct SLink* lp; | |
1127 | ||
1128 | Debug((DEBUG_DNS, "sv_cl: check access for %s[%s]", | |
1129 | cli_name(cptr), cli_sockhost(cptr))); | |
1130 | ||
1131 | if (IsUnknown(cptr) && !attach_confs_byname(cptr, cli_name(cptr), CONF_SERVER)) { | |
1132 | Debug((DEBUG_DNS, "No C/N lines for %s", cli_sockhost(cptr))); | |
1133 | return -1; | |
1134 | } | |
1135 | lp = cli_confs(cptr); | |
1136 | /* | |
1137 | * We initiated this connection so the client should have a C and N | |
1138 | * line already attached after passing through the connect_server() | |
1139 | * function earlier. | |
1140 | */ | |
1141 | if (IsConnecting(cptr) || IsHandshake(cptr)) { | |
1142 | c_conf = find_conf_byname(lp, cli_name(cptr), CONF_SERVER); | |
1143 | if (!c_conf) { | |
1144 | sendto_opmask_butone(0, SNO_OLDSNO, | |
1145 | "Connect Error: lost Connect block for %s", | |
1146 | cli_name(cptr)); | |
1147 | det_confs_butmask(cptr, 0); | |
1148 | return -1; | |
1149 | } | |
1150 | } | |
1151 | ||
1152 | /* Try finding the Connect block by DNS name and IP next. */ | |
1153 | if (!c_conf && !(c_conf = find_conf_byhost(lp, cli_sockhost(cptr), CONF_SERVER))) | |
1154 | c_conf = find_conf_byip(lp, &cli_ip(cptr), CONF_SERVER); | |
1155 | ||
1156 | /* | |
1157 | * Attach by IP# only if all other checks have failed. | |
1158 | * It is quite possible to get here with the strange things that can | |
1159 | * happen when using DNS in the way the irc server does. -avalon | |
1160 | */ | |
1161 | if (!c_conf) | |
1162 | c_conf = find_conf_byip(lp, &cli_ip(cptr), CONF_SERVER); | |
1163 | /* | |
1164 | * detach all conf lines that got attached by attach_confs() | |
1165 | */ | |
1166 | det_confs_butmask(cptr, 0); | |
1167 | /* | |
1168 | * if no Connect block, then deny access | |
1169 | */ | |
1170 | if (!c_conf) { | |
1171 | Debug((DEBUG_DNS, "sv_cl: access denied: %s[%s@%s]", | |
1172 | cli_name(cptr), cli_username(cptr), cli_sockhost(cptr))); | |
1173 | return -1; | |
1174 | } | |
1175 | /* | |
1176 | * attach the Connect block to the client structure for later use. | |
1177 | */ | |
1178 | attach_conf(cptr, c_conf); | |
1179 | ||
1180 | if (!irc_in_addr_valid(&c_conf->address.addr)) | |
1181 | memcpy(&c_conf->address.addr, &cli_ip(cptr), sizeof(c_conf->address.addr)); | |
1182 | ||
1183 | Debug((DEBUG_DNS, "sv_cl: access ok: %s[%s]", | |
1184 | cli_name(cptr), cli_sockhost(cptr))); | |
1185 | return 0; | |
1186 | } | |
1187 |