]>
Commit | Line | Data |
---|---|---|
212380e3 | 1 | /* |
2 | * ircd-ratbox: A slightly useful ircd. | |
3 | * m_kline.c: Bans/unbans a user. | |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
7 | * Copyright (C) 2002-2005 ircd-ratbox development team | |
8 | * | |
9 | * This program is free software; you can redistribute it and/or modify | |
10 | * it under the terms of the GNU General Public License as published by | |
11 | * the Free Software Foundation; either version 2 of the License, or | |
12 | * (at your option) any later version. | |
13 | * | |
14 | * This program is distributed in the hope that it will be useful, | |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
17 | * GNU General Public License for more details. | |
18 | * | |
19 | * You should have received a copy of the GNU General Public License | |
20 | * along with this program; if not, write to the Free Software | |
21 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
22 | * USA | |
23 | * | |
24 | * $Id: m_kline.c 3063 2006-12-27 00:47:45Z jilles $ | |
25 | */ | |
26 | ||
27 | #include "stdinc.h" | |
28 | #include "tools.h" | |
29 | #include "channel.h" | |
30 | #include "class.h" | |
31 | #include "client.h" | |
32 | #include "common.h" | |
33 | #include "irc_string.h" | |
34 | #include "sprintf_irc.h" | |
35 | #include "ircd.h" | |
36 | #include "hostmask.h" | |
37 | #include "numeric.h" | |
38 | #include "commio.h" | |
39 | #include "s_conf.h" | |
40 | #include "s_newconf.h" | |
41 | #include "s_log.h" | |
42 | #include "send.h" | |
43 | #include "hash.h" | |
44 | #include "s_serv.h" | |
45 | #include "msg.h" | |
46 | #include "parse.h" | |
47 | #include "modules.h" | |
48 | #include "event.h" | |
49 | ||
50 | static int mo_kline(struct Client *, struct Client *, int, const char **); | |
51 | static int ms_kline(struct Client *, struct Client *, int, const char **); | |
52 | static int me_kline(struct Client *, struct Client *, int, const char **); | |
53 | static int mo_unkline(struct Client *, struct Client *, int, const char **); | |
54 | static int ms_unkline(struct Client *, struct Client *, int, const char **); | |
55 | static int me_unkline(struct Client *, struct Client *, int, const char **); | |
56 | ||
57 | struct Message kline_msgtab = { | |
58 | "KLINE", 0, 0, 0, MFLG_SLOW, | |
59 | {mg_unreg, mg_not_oper, {ms_kline, 5}, {ms_kline, 5}, {me_kline, 5}, {mo_kline, 3}} | |
60 | }; | |
61 | ||
62 | struct Message unkline_msgtab = { | |
63 | "UNKLINE", 0, 0, 0, MFLG_SLOW, | |
64 | {mg_unreg, mg_not_oper, {ms_unkline, 4}, {ms_unkline, 4}, {me_unkline, 3}, {mo_unkline, 2}} | |
65 | }; | |
66 | ||
67 | mapi_clist_av1 kline_clist[] = { &kline_msgtab, &unkline_msgtab, NULL }; | |
68 | DECLARE_MODULE_AV1(kline, NULL, NULL, kline_clist, NULL, NULL, "$Revision: 3063 $"); | |
69 | ||
70 | /* Local function prototypes */ | |
71 | static int find_user_host(struct Client *source_p, const char *userhost, char *user, char *host); | |
72 | static int valid_comment(struct Client *source_p, char *comment); | |
73 | static int valid_user_host(struct Client *source_p, const char *user, const char *host); | |
74 | static int valid_wild_card(struct Client *source_p, const char *user, const char *host); | |
75 | ||
76 | static void handle_remote_kline(struct Client *source_p, int tkline_time, | |
77 | const char *user, const char *host, const char *reason); | |
78 | static void apply_kline(struct Client *source_p, struct ConfItem *aconf, | |
79 | const char *reason, const char *oper_reason, const char *current_date); | |
80 | static void apply_tkline(struct Client *source_p, struct ConfItem *aconf, | |
81 | const char *, const char *, const char *, int); | |
82 | static int already_placed_kline(struct Client *, const char *, const char *, int); | |
83 | ||
84 | static void handle_remote_unkline(struct Client *source_p, | |
85 | const char *user, const char *host); | |
86 | static void remove_permkline_match(struct Client *, const char *, const char *); | |
87 | static int flush_write(struct Client *, FILE *, const char *, const char *); | |
88 | static int remove_temp_kline(const char *, const char *); | |
89 | ||
90 | /* mo_kline() | |
91 | * | |
92 | * parv[1] - temp time or user@host | |
93 | * parv[2] - user@host, "ON", or reason | |
94 | * parv[3] - "ON", reason, or server to target | |
95 | * parv[4] - server to target, or reason | |
96 | * parv[5] - reason | |
97 | */ | |
98 | static int | |
99 | mo_kline(struct Client *client_p, struct Client *source_p, | |
100 | int parc, const char **parv) | |
101 | { | |
102 | char def[] = "No Reason"; | |
103 | char user[USERLEN + 2]; | |
104 | char host[HOSTLEN + 2]; | |
105 | char buffer[IRCD_BUFSIZE]; | |
106 | char *reason = def; | |
107 | char *oper_reason; | |
108 | const char *current_date; | |
109 | const char *target_server = NULL; | |
110 | struct ConfItem *aconf; | |
111 | int tkline_time = 0; | |
112 | int loc = 1; | |
113 | ||
114 | if(!IsOperK(source_p)) | |
115 | { | |
116 | sendto_one(source_p, form_str(ERR_NOPRIVS), | |
117 | me.name, source_p->name, "kline"); | |
118 | return 0; | |
119 | } | |
120 | ||
121 | if((tkline_time = valid_temp_time(parv[loc])) >= 0) | |
122 | loc++; | |
123 | /* we just set tkline_time to -1! */ | |
124 | else | |
125 | tkline_time = 0; | |
126 | ||
127 | if(find_user_host(source_p, parv[loc], user, host) == 0) | |
128 | return 0; | |
129 | ||
130 | loc++; | |
131 | ||
132 | if(parc >= loc+2 && !irccmp(parv[loc], "ON")) | |
133 | { | |
134 | if(!IsOperRemoteBan(source_p)) | |
135 | { | |
136 | sendto_one(source_p, form_str(ERR_NOPRIVS), | |
137 | me.name, source_p->name, "remoteban"); | |
138 | return 0; | |
139 | } | |
140 | ||
141 | target_server = parv[loc+1]; | |
142 | loc += 2; | |
143 | } | |
144 | ||
145 | if(parc <= loc || EmptyString(parv[loc])) | |
146 | { | |
147 | sendto_one(source_p, form_str(ERR_NEEDMOREPARAMS), | |
148 | me.name, source_p->name, "KLINE"); | |
149 | return 0; | |
150 | } | |
151 | ||
152 | reason = LOCAL_COPY(parv[loc]); | |
153 | ||
154 | if(target_server != NULL) | |
155 | { | |
156 | propagate_generic(source_p, "KLINE", target_server, CAP_KLN, | |
157 | "%d %s %s :%s", | |
158 | tkline_time, user, host, reason); | |
159 | ||
160 | /* If we are sending it somewhere that doesnt include us, stop */ | |
161 | if(!match(target_server, me.name)) | |
162 | return 0; | |
163 | } | |
164 | /* if we have cluster servers, send it to them.. */ | |
165 | else if(dlink_list_length(&cluster_conf_list) > 0) | |
166 | cluster_generic(source_p, "KLINE", | |
167 | (tkline_time > 0) ? SHARED_TKLINE : SHARED_PKLINE, CAP_KLN, | |
168 | "%lu %s %s :%s", | |
169 | tkline_time, user, host, reason); | |
170 | ||
171 | if(!valid_user_host(source_p, user, host) || | |
172 | !valid_wild_card(source_p, user, host) || | |
173 | !valid_comment(source_p, reason)) | |
174 | return 0; | |
175 | ||
176 | if(already_placed_kline(source_p, user, host, tkline_time)) | |
177 | return 0; | |
178 | ||
179 | set_time(); | |
180 | current_date = smalldate(); | |
181 | aconf = make_conf(); | |
182 | aconf->status = CONF_KILL; | |
183 | DupString(aconf->host, host); | |
184 | DupString(aconf->user, user); | |
185 | aconf->port = 0; | |
186 | ||
187 | /* Look for an oper reason */ | |
188 | if((oper_reason = strchr(reason, '|')) != NULL) | |
189 | { | |
190 | *oper_reason = '\0'; | |
191 | oper_reason++; | |
192 | ||
193 | if(!EmptyString(oper_reason)) | |
194 | DupString(aconf->spasswd, oper_reason); | |
195 | } | |
196 | ||
197 | if(tkline_time > 0) | |
198 | { | |
199 | ircsnprintf(buffer, sizeof(buffer), | |
200 | "Temporary K-line %d min. - %s (%s)", | |
201 | (int) (tkline_time / 60), reason, current_date); | |
202 | DupString(aconf->passwd, buffer); | |
203 | apply_tkline(source_p, aconf, reason, oper_reason, current_date, tkline_time); | |
204 | } | |
205 | else | |
206 | { | |
207 | ircsnprintf(buffer, sizeof(buffer), "%s (%s)", reason, current_date); | |
208 | DupString(aconf->passwd, buffer); | |
209 | apply_kline(source_p, aconf, reason, oper_reason, current_date); | |
210 | } | |
211 | ||
212 | if(ConfigFileEntry.kline_delay) | |
213 | { | |
214 | if(kline_queued == 0) | |
215 | { | |
216 | eventAddOnce("check_klines", check_klines_event, NULL, | |
217 | ConfigFileEntry.kline_delay); | |
218 | kline_queued = 1; | |
219 | } | |
220 | } | |
221 | else | |
222 | check_klines(); | |
223 | ||
224 | return 0; | |
225 | } | |
226 | ||
227 | /* ms_kline() | |
228 | * | |
229 | * parv[1] - server targeted at | |
230 | * parv[2] - tkline time (0 if perm) | |
231 | * parv[3] - user | |
232 | * parv[4] - host | |
233 | * parv[5] - reason | |
234 | */ | |
235 | static int | |
236 | ms_kline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
237 | { | |
238 | int tkline_time = atoi(parv[2]); | |
239 | ||
240 | /* 1.5-3 and earlier contains a bug that allows remote klines to be | |
241 | * sent with an empty reason field. This is a protocol violation, | |
242 | * but its not worth dropping the link over.. --anfl | |
243 | */ | |
244 | if(parc < 6 || EmptyString(parv[5])) | |
245 | return 0; | |
246 | ||
247 | propagate_generic(source_p, "KLINE", parv[1], CAP_KLN, | |
248 | "%d %s %s :%s", | |
249 | tkline_time, parv[3], parv[4], parv[5]); | |
250 | ||
251 | if(!match(parv[1], me.name)) | |
252 | return 0; | |
253 | ||
254 | if(!IsPerson(source_p)) | |
255 | return 0; | |
256 | ||
257 | handle_remote_kline(source_p, tkline_time, parv[3], parv[4], parv[5]); | |
258 | return 0; | |
259 | } | |
260 | ||
261 | static int | |
262 | me_kline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
263 | { | |
264 | /* <tkline_time> <user> <host> :<reason> */ | |
265 | if(!IsPerson(source_p)) | |
266 | return 0; | |
267 | ||
268 | handle_remote_kline(source_p, atoi(parv[1]), parv[2], parv[3], parv[4]); | |
269 | return 0; | |
270 | } | |
271 | ||
272 | static void | |
273 | handle_remote_kline(struct Client *source_p, int tkline_time, | |
274 | const char *user, const char *host, const char *kreason) | |
275 | { | |
276 | char buffer[BUFSIZE]; | |
277 | const char *current_date; | |
278 | char *reason = LOCAL_COPY(kreason); | |
279 | struct ConfItem *aconf = NULL; | |
280 | char *oper_reason; | |
281 | ||
282 | if(!find_shared_conf(source_p->username, source_p->host, | |
283 | source_p->user->server, | |
284 | (tkline_time > 0) ? SHARED_TKLINE : SHARED_PKLINE)) | |
285 | return; | |
286 | ||
287 | if(!valid_user_host(source_p, user, host) || | |
288 | !valid_wild_card(source_p, user, host) || | |
289 | !valid_comment(source_p, reason)) | |
290 | return; | |
291 | ||
292 | if(already_placed_kline(source_p, user, host, tkline_time)) | |
293 | return; | |
294 | ||
295 | aconf = make_conf(); | |
296 | ||
297 | aconf->status = CONF_KILL; | |
298 | DupString(aconf->user, user); | |
299 | DupString(aconf->host, host); | |
300 | ||
301 | /* Look for an oper reason */ | |
302 | if((oper_reason = strchr(reason, '|')) != NULL) | |
303 | { | |
304 | *oper_reason = '\0'; | |
305 | oper_reason++; | |
306 | ||
307 | if(!EmptyString(oper_reason)) | |
308 | DupString(aconf->spasswd, oper_reason); | |
309 | } | |
310 | ||
311 | current_date = smalldate(); | |
312 | ||
313 | if(tkline_time > 0) | |
314 | { | |
315 | ircsnprintf(buffer, sizeof(buffer), | |
316 | "Temporary K-line %d min. - %s (%s)", | |
317 | (int) (tkline_time / 60), reason, current_date); | |
318 | DupString(aconf->passwd, buffer); | |
319 | apply_tkline(source_p, aconf, reason, oper_reason, current_date, tkline_time); | |
320 | } | |
321 | else | |
322 | { | |
323 | ircsnprintf(buffer, sizeof(buffer), "%s (%s)", reason, current_date); | |
324 | DupString(aconf->passwd, buffer); | |
325 | apply_kline(source_p, aconf, reason, oper_reason, current_date); | |
326 | } | |
327 | ||
328 | if(ConfigFileEntry.kline_delay) | |
329 | { | |
330 | if(kline_queued == 0) | |
331 | { | |
332 | eventAddOnce("check_klines", check_klines_event, NULL, | |
333 | ConfigFileEntry.kline_delay); | |
334 | kline_queued = 1; | |
335 | } | |
336 | } | |
337 | else | |
338 | check_klines(); | |
339 | ||
340 | return; | |
341 | } | |
342 | ||
343 | /* mo_unkline() | |
344 | * | |
345 | * parv[1] - kline to remove | |
346 | * parv[2] - optional "ON" | |
347 | * parv[3] - optional target server | |
348 | */ | |
349 | static int | |
350 | mo_unkline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
351 | { | |
352 | const char *user; | |
353 | char *host; | |
354 | char splat[] = "*"; | |
355 | char *h = LOCAL_COPY(parv[1]); | |
356 | ||
357 | if(!IsOperUnkline(source_p)) | |
358 | { | |
359 | sendto_one(source_p, form_str(ERR_NOPRIVS), | |
360 | me.name, source_p->name, "unkline"); | |
361 | return 0; | |
362 | } | |
363 | ||
364 | if((host = strchr(h, '@')) || *h == '*' || strchr(h, '.') || strchr(h, ':')) | |
365 | { | |
366 | /* Explicit user@host mask given */ | |
367 | ||
368 | if(host) /* Found user@host */ | |
369 | { | |
370 | *host++ = '\0'; | |
371 | ||
372 | /* check for @host */ | |
373 | if(*h) | |
374 | user = h; | |
375 | else | |
376 | user = splat; | |
377 | ||
378 | /* check for user@ */ | |
379 | if(!*host) | |
380 | host = splat; | |
381 | } | |
382 | else | |
383 | { | |
384 | user = splat; /* no @ found, assume its *@somehost */ | |
385 | host = h; | |
386 | } | |
387 | } | |
388 | else | |
389 | { | |
390 | sendto_one(source_p, ":%s NOTICE %s :Invalid parameters", me.name, source_p->name); | |
391 | return 0; | |
392 | } | |
393 | ||
394 | /* possible remote kline.. */ | |
395 | if((parc > 3) && (irccmp(parv[2], "ON") == 0)) | |
396 | { | |
397 | if(!IsOperRemoteBan(source_p)) | |
398 | { | |
399 | sendto_one(source_p, form_str(ERR_NOPRIVS), | |
400 | me.name, source_p->name, "remoteban"); | |
401 | return 0; | |
402 | } | |
403 | ||
404 | propagate_generic(source_p, "UNKLINE", parv[3], CAP_UNKLN, | |
405 | "%s %s", user, host); | |
406 | ||
407 | if(match(parv[3], me.name) == 0) | |
408 | return 0; | |
409 | } | |
410 | else if(dlink_list_length(&cluster_conf_list) > 0) | |
411 | cluster_generic(source_p, "UNKLINE", SHARED_UNKLINE, CAP_UNKLN, | |
412 | "%s %s", user, host); | |
413 | ||
414 | if(remove_temp_kline(user, host)) | |
415 | { | |
416 | sendto_one(source_p, | |
417 | ":%s NOTICE %s :Un-klined [%s@%s] from temporary k-lines", | |
418 | me.name, parv[0], user, host); | |
419 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
420 | "%s has removed the temporary K-Line for: [%s@%s]", | |
421 | get_oper_name(source_p), user, host); | |
422 | ilog(L_KLINE, "UK %s %s %s", | |
423 | get_oper_name(source_p), user, host); | |
424 | return 0; | |
425 | } | |
426 | ||
427 | remove_permkline_match(source_p, host, user); | |
428 | ||
429 | return 0; | |
430 | } | |
431 | ||
432 | /* ms_unkline() | |
433 | * | |
434 | * parv[1] - target server | |
435 | * parv[2] - user to unkline | |
436 | * parv[3] - host to unkline | |
437 | */ | |
438 | static int | |
439 | ms_unkline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
440 | { | |
441 | /* parv[0] parv[1] parv[2] parv[3] | |
442 | * oper target server user host */ | |
443 | propagate_generic(source_p, "UNKLINE", parv[1], CAP_UNKLN, | |
444 | "%s %s", parv[2], parv[3]); | |
445 | ||
446 | if(!match(parv[1], me.name)) | |
447 | return 0; | |
448 | ||
449 | if(!IsPerson(source_p)) | |
450 | return 0; | |
451 | ||
452 | handle_remote_unkline(source_p, parv[2], parv[3]); | |
453 | return 0; | |
454 | } | |
455 | ||
456 | static int | |
457 | me_unkline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) | |
458 | { | |
459 | /* user host */ | |
460 | if(!IsPerson(source_p)) | |
461 | return 0; | |
462 | ||
463 | handle_remote_unkline(source_p, parv[1], parv[2]); | |
464 | return 0; | |
465 | } | |
466 | ||
467 | static void | |
468 | handle_remote_unkline(struct Client *source_p, const char *user, const char *host) | |
469 | { | |
470 | if(!find_shared_conf(source_p->username, source_p->host, | |
471 | source_p->user->server, SHARED_UNKLINE)) | |
472 | return; | |
473 | ||
474 | if(remove_temp_kline(user, host)) | |
475 | { | |
476 | sendto_one_notice(source_p, | |
477 | ":Un-klined [%s@%s] from temporary k-lines", | |
478 | user, host); | |
479 | ||
480 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
481 | "%s has removed the temporary K-Line for: [%s@%s]", | |
482 | get_oper_name(source_p), user, host); | |
483 | ||
484 | ilog(L_KLINE, "UK %s %s %s", | |
485 | get_oper_name(source_p), user, host); | |
486 | return; | |
487 | } | |
488 | ||
489 | remove_permkline_match(source_p, host, user); | |
490 | } | |
491 | ||
492 | /* apply_kline() | |
493 | * | |
494 | * inputs - | |
495 | * output - NONE | |
496 | * side effects - kline as given, is added to the hashtable | |
497 | * and conf file | |
498 | */ | |
499 | static void | |
500 | apply_kline(struct Client *source_p, struct ConfItem *aconf, | |
501 | const char *reason, const char *oper_reason, const char *current_date) | |
502 | { | |
503 | add_conf_by_address(aconf->host, CONF_KILL, aconf->user, aconf); | |
504 | write_confitem(KLINE_TYPE, source_p, aconf->user, aconf->host, | |
505 | reason, oper_reason, current_date, 0); | |
506 | } | |
507 | ||
508 | /* apply_tkline() | |
509 | * | |
510 | * inputs - | |
511 | * output - NONE | |
512 | * side effects - tkline as given is placed | |
513 | */ | |
514 | static void | |
515 | apply_tkline(struct Client *source_p, struct ConfItem *aconf, | |
516 | const char *reason, const char *oper_reason, const char *current_date, int tkline_time) | |
517 | { | |
518 | aconf->hold = CurrentTime + tkline_time; | |
519 | add_temp_kline(aconf); | |
520 | ||
521 | /* no oper reason.. */ | |
522 | if(EmptyString(oper_reason)) | |
523 | { | |
524 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
525 | "%s added temporary %d min. K-Line for [%s@%s] [%s]", | |
526 | get_oper_name(source_p), tkline_time / 60, | |
527 | aconf->user, aconf->host, reason); | |
528 | ilog(L_KLINE, "K %s %d %s %s %s", | |
529 | get_oper_name(source_p), tkline_time / 60, | |
530 | aconf->user, aconf->host, reason); | |
531 | } | |
532 | else | |
533 | { | |
534 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
535 | "%s added temporary %d min. K-Line for [%s@%s] [%s|%s]", | |
536 | get_oper_name(source_p), tkline_time / 60, | |
537 | aconf->user, aconf->host, reason, oper_reason); | |
538 | ilog(L_KLINE, "K %s %d %s %s %s|%s", | |
539 | get_oper_name(source_p), tkline_time / 60, | |
540 | aconf->user, aconf->host, reason, oper_reason); | |
541 | } | |
542 | ||
543 | sendto_one_notice(source_p, ":Added temporary %d min. K-Line [%s@%s]", | |
544 | tkline_time / 60, aconf->user, aconf->host); | |
545 | } | |
546 | ||
547 | /* find_user_host() | |
548 | * | |
549 | * inputs - client placing kline, user@host, user buffer, host buffer | |
550 | * output - 0 if not ok to kline, 1 to kline i.e. if valid user host | |
551 | * side effects - | |
552 | */ | |
553 | static int | |
554 | find_user_host(struct Client *source_p, const char *userhost, char *luser, char *lhost) | |
555 | { | |
556 | char *hostp; | |
557 | ||
558 | hostp = strchr(userhost, '@'); | |
559 | ||
560 | if(hostp != NULL) /* I'm a little user@host */ | |
561 | { | |
562 | *(hostp++) = '\0'; /* short and squat */ | |
563 | if(*userhost) | |
564 | strlcpy(luser, userhost, USERLEN + 1); /* here is my user */ | |
565 | else | |
566 | strcpy(luser, "*"); | |
567 | if(*hostp) | |
568 | strlcpy(lhost, hostp, HOSTLEN + 1); /* here is my host */ | |
569 | else | |
570 | strcpy(lhost, "*"); | |
571 | } | |
572 | else | |
573 | { | |
574 | /* no '@', no '.', so its not a user@host or host, therefore | |
575 | * its a nick, which support was removed for. | |
576 | */ | |
577 | if(strchr(userhost, '.') == NULL && strchr(userhost, ':') == NULL) | |
578 | return 0; | |
579 | ||
580 | luser[0] = '*'; /* no @ found, assume its *@somehost */ | |
581 | luser[1] = '\0'; | |
582 | strlcpy(lhost, userhost, HOSTLEN + 1); | |
583 | } | |
584 | ||
585 | return 1; | |
586 | } | |
587 | ||
588 | /* valid_user_host() | |
589 | * | |
590 | * inputs - user buffer, host buffer | |
591 | * output - 0 if invalid, 1 if valid | |
592 | * side effects - | |
593 | */ | |
594 | static int | |
595 | valid_user_host(struct Client *source_p, const char *luser, const char *lhost) | |
596 | { | |
597 | /* # is invalid, as is '!' (n!u@h kline) */ | |
598 | if(strchr(lhost, '#') || strchr(luser, '#') || strchr(luser, '!')) | |
599 | { | |
600 | sendto_one_notice(source_p, ":Invalid K-Line"); | |
601 | return 0; | |
602 | } | |
603 | ||
604 | return 1; | |
605 | } | |
606 | ||
607 | /* valid_wild_card() | |
608 | * | |
609 | * input - user buffer, host buffer | |
610 | * output - 0 if invalid, 1 if valid | |
611 | * side effects - | |
612 | */ | |
613 | static int | |
614 | valid_wild_card(struct Client *source_p, const char *luser, const char *lhost) | |
615 | { | |
616 | const char *p; | |
617 | char tmpch; | |
618 | int nonwild = 0; | |
619 | ||
620 | /* check there are enough non wildcard chars */ | |
621 | p = luser; | |
622 | while ((tmpch = *p++)) | |
623 | { | |
624 | if(!IsKWildChar(tmpch)) | |
625 | { | |
626 | /* found enough chars, return */ | |
627 | if(++nonwild >= ConfigFileEntry.min_nonwildcard) | |
628 | return 1; | |
629 | } | |
630 | } | |
631 | ||
632 | /* try host, as user didnt contain enough */ | |
633 | p = lhost; | |
634 | while ((tmpch = *p++)) | |
635 | { | |
636 | if(!IsKWildChar(tmpch)) | |
637 | if(++nonwild >= ConfigFileEntry.min_nonwildcard) | |
638 | return 1; | |
639 | } | |
640 | ||
641 | sendto_one_notice(source_p, | |
642 | ":Please include at least %d non-wildcard " | |
643 | "characters with the user@host", | |
644 | ConfigFileEntry.min_nonwildcard); | |
645 | return 0; | |
646 | } | |
647 | ||
648 | /* | |
649 | * valid_comment | |
650 | * inputs - pointer to client | |
651 | * - pointer to comment | |
652 | * output - 0 if no valid comment, 1 if valid | |
653 | * side effects - NONE | |
654 | */ | |
655 | static int | |
656 | valid_comment(struct Client *source_p, char *comment) | |
657 | { | |
658 | if(strchr(comment, '"')) | |
659 | { | |
660 | sendto_one_notice(source_p, ":Invalid character '\"' in comment"); | |
661 | return 0; | |
662 | } | |
663 | ||
664 | if(strlen(comment) > REASONLEN) | |
665 | comment[REASONLEN] = '\0'; | |
666 | ||
667 | return 1; | |
668 | } | |
669 | ||
670 | /* already_placed_kline() | |
671 | * | |
672 | * inputs - source to notify, user@host to check, tkline time | |
673 | * outputs - 1 if a perm kline or a tkline when a tkline is being | |
674 | * set exists, else 0 | |
675 | * side effects - notifies source_p kline exists | |
676 | */ | |
677 | /* Note: This currently works if the new K-line is a special case of an | |
678 | * existing K-line, but not the other way round. To do that we would | |
679 | * have to walk the hash and check every existing K-line. -A1kmm. | |
680 | */ | |
681 | static int | |
682 | already_placed_kline(struct Client *source_p, const char *luser, const char *lhost, int tkline) | |
683 | { | |
684 | const char *reason; | |
685 | struct irc_sockaddr_storage iphost, *piphost; | |
686 | struct ConfItem *aconf; | |
687 | int t; | |
688 | if(ConfigFileEntry.non_redundant_klines) | |
689 | { | |
690 | if((t = parse_netmask(lhost, (struct sockaddr *)&iphost, NULL)) != HM_HOST) | |
691 | { | |
692 | #ifdef IPV6 | |
693 | if(t == HM_IPV6) | |
694 | t = AF_INET6; | |
695 | else | |
696 | #endif | |
697 | t = AF_INET; | |
698 | ||
699 | piphost = &iphost; | |
700 | } | |
701 | else | |
702 | piphost = NULL; | |
703 | ||
704 | if((aconf = find_conf_by_address(lhost, NULL, NULL, (struct sockaddr *)piphost, CONF_KILL, t, luser))) | |
705 | { | |
706 | /* setting a tkline, or existing one is perm */ | |
707 | if(tkline || ((aconf->flags & CONF_FLAGS_TEMPORARY) == 0)) | |
708 | { | |
709 | reason = aconf->passwd ? aconf->passwd : "<No Reason>"; | |
710 | ||
711 | sendto_one_notice(source_p, | |
712 | ":[%s@%s] already K-Lined by [%s@%s] - %s", | |
713 | luser, lhost, aconf->user, | |
714 | aconf->host, reason); | |
715 | return 1; | |
716 | } | |
717 | } | |
718 | } | |
719 | ||
720 | return 0; | |
721 | } | |
722 | ||
723 | /* remove_permkline_match() | |
724 | * | |
725 | * hunts for a permanent kline, and removes it. | |
726 | */ | |
727 | static void | |
728 | remove_permkline_match(struct Client *source_p, const char *host, const char *user) | |
729 | { | |
730 | FILE *in, *out; | |
731 | int pairme = 0; | |
732 | int error_on_write = NO; | |
733 | char buf[BUFSIZE]; | |
734 | char matchbuf[BUFSIZE]; | |
735 | char temppath[BUFSIZE]; | |
736 | const char *filename; | |
737 | mode_t oldumask; | |
738 | int matchlen; | |
739 | ||
740 | ircsnprintf(temppath, sizeof(temppath), | |
741 | "%s.tmp", ConfigFileEntry.klinefile); | |
742 | ||
743 | filename = get_conf_name(KLINE_TYPE); | |
744 | ||
745 | if((in = fopen(filename, "r")) == 0) | |
746 | { | |
747 | sendto_one_notice(source_p, ":Cannot open %s", filename); | |
748 | return; | |
749 | } | |
750 | ||
751 | oldumask = umask(0); | |
752 | if((out = fopen(temppath, "w")) == 0) | |
753 | { | |
754 | sendto_one_notice(source_p, ":Cannot open %s", temppath); | |
755 | fclose(in); | |
756 | umask(oldumask); | |
757 | return; | |
758 | } | |
759 | ||
760 | umask(oldumask); | |
761 | ||
762 | snprintf(matchbuf, sizeof(matchbuf), "\"%s\",\"%s\"", user, host); | |
763 | matchlen = strlen(matchbuf); | |
764 | ||
765 | while (fgets(buf, sizeof(buf), in)) | |
766 | { | |
767 | if(error_on_write) | |
768 | break; | |
769 | ||
770 | if(!strncasecmp(buf, matchbuf, matchlen)) | |
771 | { | |
772 | pairme++; | |
773 | break; | |
774 | } | |
775 | else | |
776 | error_on_write = flush_write(source_p, out, buf, temppath); | |
777 | } | |
778 | ||
779 | /* we dropped out of the loop early because we found a match, | |
780 | * to drop into this somewhat faster loop as we presume we'll never | |
781 | * have two matching klines --anfl | |
782 | */ | |
783 | if(pairme && !error_on_write) | |
784 | { | |
785 | while(fgets(buf, sizeof(buf), in)) | |
786 | { | |
787 | if(error_on_write) | |
788 | break; | |
789 | ||
790 | error_on_write = flush_write(source_p, out, buf, temppath); | |
791 | } | |
792 | } | |
793 | ||
794 | fclose(in); | |
795 | if (fclose(out)) | |
796 | error_on_write = YES; | |
797 | ||
798 | /* The result of the rename should be checked too... oh well */ | |
799 | /* If there was an error on a write above, then its been reported | |
800 | * and I am not going to trash the original kline /conf file | |
801 | */ | |
802 | if(error_on_write) | |
803 | { | |
804 | sendto_one_notice(source_p, ":Couldn't write temp kline file, aborted"); | |
805 | return; | |
806 | } | |
807 | else if(!pairme) | |
808 | { | |
809 | sendto_one_notice(source_p, ":No K-Line for %s@%s", | |
810 | user, host); | |
811 | ||
812 | if(temppath != NULL) | |
813 | (void) unlink(temppath); | |
814 | ||
815 | return; | |
816 | } | |
817 | ||
818 | if (rename(temppath, filename)) | |
819 | { | |
820 | sendto_one_notice(source_p, ":Couldn't rename temp file, aborted"); | |
821 | return; | |
822 | } | |
823 | rehash_bans(0); | |
824 | ||
825 | sendto_one_notice(source_p, ":K-Line for [%s@%s] is removed", | |
826 | user, host); | |
827 | ||
828 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
829 | "%s has removed the K-Line for: [%s@%s]", | |
830 | get_oper_name(source_p), user, host); | |
831 | ||
832 | ilog(L_KLINE, "UK %s %s %s", | |
833 | get_oper_name(source_p), user, host); | |
834 | return; | |
835 | } | |
836 | ||
837 | /* | |
838 | * flush_write() | |
839 | * | |
840 | * inputs - pointer to client structure of oper requesting unkline | |
841 | * - out is the file descriptor | |
842 | * - buf is the buffer to write | |
843 | * - ntowrite is the expected number of character to be written | |
844 | * - temppath is the temporary file name to be written | |
845 | * output - YES for error on write | |
846 | * - NO for success | |
847 | * side effects - if successful, the buf is written to output file | |
848 | * if a write failure happesn, and the file pointed to | |
849 | * by temppath, if its non NULL, is removed. | |
850 | * | |
851 | * The idea here is, to be as robust as possible when writing to the | |
852 | * kline file. | |
853 | * | |
854 | * -Dianora | |
855 | */ | |
856 | ||
857 | static int | |
858 | flush_write(struct Client *source_p, FILE * out, const char *buf, const char *temppath) | |
859 | { | |
860 | int error_on_write = (fputs(buf, out) < 0) ? YES : NO; | |
861 | ||
862 | if(error_on_write) | |
863 | { | |
864 | sendto_one_notice(source_p, ":Unable to write to %s", | |
865 | temppath); | |
866 | if(temppath != NULL) | |
867 | (void) unlink(temppath); | |
868 | } | |
869 | return (error_on_write); | |
870 | } | |
871 | ||
872 | /* remove_temp_kline() | |
873 | * | |
874 | * inputs - username, hostname to unkline | |
875 | * outputs - | |
876 | * side effects - tries to unkline anything that matches | |
877 | */ | |
878 | static int | |
879 | remove_temp_kline(const char *user, const char *host) | |
880 | { | |
881 | struct ConfItem *aconf; | |
882 | dlink_node *ptr; | |
883 | struct irc_sockaddr_storage addr, caddr; | |
884 | int bits, cbits; | |
885 | int mtype, ktype; | |
886 | int i; | |
887 | ||
888 | mtype = parse_netmask(host, (struct sockaddr *)&addr, &bits); | |
889 | ||
890 | for (i = 0; i < LAST_TEMP_TYPE; i++) | |
891 | { | |
892 | DLINK_FOREACH(ptr, temp_klines[i].head) | |
893 | { | |
894 | aconf = ptr->data; | |
895 | ||
896 | ktype = parse_netmask(aconf->host, (struct sockaddr *)&caddr, &cbits); | |
897 | ||
898 | if(ktype != mtype || (user && irccmp(user, aconf->user))) | |
899 | continue; | |
900 | ||
901 | if(ktype == HM_HOST) | |
902 | { | |
903 | if(irccmp(aconf->host, host)) | |
904 | continue; | |
905 | } | |
906 | else if(bits != cbits || | |
907 | !comp_with_mask_sock((struct sockaddr *)&addr, | |
908 | (struct sockaddr *)&caddr, bits)) | |
909 | continue; | |
910 | ||
911 | dlinkDestroy(ptr, &temp_klines[i]); | |
912 | delete_one_address_conf(aconf->host, aconf); | |
913 | return YES; | |
914 | } | |
915 | } | |
916 | ||
917 | return NO; | |
918 | } |