]> jfr.im git - irc/rqf/shadowircd.git/blame - modules/m_kline.c
Start bandb on ircd initialization.
[irc/rqf/shadowircd.git] / modules / m_kline.c
CommitLineData
212380e3 1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * m_kline.c: Bans/unbans a user.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
23 *
d8a4c5f6 24 * $Id$
212380e3 25 */
26
27#include "stdinc.h"
212380e3 28#include "channel.h"
29#include "class.h"
30#include "client.h"
31#include "common.h"
13ae2f4b 32#include "match.h"
212380e3 33#include "ircd.h"
34#include "hostmask.h"
35#include "numeric.h"
212380e3 36#include "s_conf.h"
37#include "s_newconf.h"
d3455e2c 38#include "logger.h"
212380e3 39#include "send.h"
40#include "hash.h"
41#include "s_serv.h"
42#include "msg.h"
43#include "parse.h"
44#include "modules.h"
35f6f850 45#include "reject.h"
d8a4c5f6 46#include "bandbi.h"
212380e3 47
48static int mo_kline(struct Client *, struct Client *, int, const char **);
49static int ms_kline(struct Client *, struct Client *, int, const char **);
50static int me_kline(struct Client *, struct Client *, int, const char **);
51static int mo_unkline(struct Client *, struct Client *, int, const char **);
52static int ms_unkline(struct Client *, struct Client *, int, const char **);
53static int me_unkline(struct Client *, struct Client *, int, const char **);
54
55struct Message kline_msgtab = {
56 "KLINE", 0, 0, 0, MFLG_SLOW,
57 {mg_unreg, mg_not_oper, {ms_kline, 5}, {ms_kline, 5}, {me_kline, 5}, {mo_kline, 3}}
58};
59
60struct Message unkline_msgtab = {
61 "UNKLINE", 0, 0, 0, MFLG_SLOW,
62 {mg_unreg, mg_not_oper, {ms_unkline, 4}, {ms_unkline, 4}, {me_unkline, 3}, {mo_unkline, 2}}
63};
64
65mapi_clist_av1 kline_clist[] = { &kline_msgtab, &unkline_msgtab, NULL };
d8a4c5f6
WP
66
67DECLARE_MODULE_AV1(kline, NULL, NULL, kline_clist, NULL, NULL, "$Revision$");
212380e3 68
69/* Local function prototypes */
70static int find_user_host(struct Client *source_p, const char *userhost, char *user, char *host);
71static int valid_comment(struct Client *source_p, char *comment);
72static int valid_user_host(struct Client *source_p, const char *user, const char *host);
73static int valid_wild_card(struct Client *source_p, const char *user, const char *host);
74
75static void handle_remote_kline(struct Client *source_p, int tkline_time,
d8a4c5f6 76 const char *user, const char *host, const char *reason);
212380e3 77static void apply_kline(struct Client *source_p, struct ConfItem *aconf,
78 const char *reason, const char *oper_reason, const char *current_date);
79static void apply_tkline(struct Client *source_p, struct ConfItem *aconf,
80 const char *, const char *, const char *, int);
81static int already_placed_kline(struct Client *, const char *, const char *, int);
82
d8a4c5f6 83static void handle_remote_unkline(struct Client *source_p, const char *user, const char *host);
40a1d446 84static void remove_permkline_match(struct Client *, struct ConfItem *);
4c171a9c 85static int remove_temp_kline(struct Client *, struct ConfItem *);
212380e3 86
87/* mo_kline()
88 *
89 * parv[1] - temp time or user@host
90 * parv[2] - user@host, "ON", or reason
91 * parv[3] - "ON", reason, or server to target
92 * parv[4] - server to target, or reason
93 * parv[5] - reason
94 */
95static int
d8a4c5f6 96mo_kline(struct Client *client_p, struct Client *source_p, int parc, const char **parv)
212380e3 97{
d8a4c5f6 98 char def[] = "No Reason";
212380e3 99 char user[USERLEN + 2];
100 char host[HOSTLEN + 2];
101 char buffer[IRCD_BUFSIZE];
d8a4c5f6 102 char *reason = def;
212380e3 103 char *oper_reason;
104 const char *current_date;
105 const char *target_server = NULL;
106 struct ConfItem *aconf;
107 int tkline_time = 0;
108 int loc = 1;
109
110 if(!IsOperK(source_p))
111 {
d8a4c5f6 112 sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "kline");
212380e3 113 return 0;
114 }
115
116 if((tkline_time = valid_temp_time(parv[loc])) >= 0)
117 loc++;
118 /* we just set tkline_time to -1! */
119 else
120 tkline_time = 0;
121
122 if(find_user_host(source_p, parv[loc], user, host) == 0)
123 return 0;
124
125 loc++;
126
d8a4c5f6 127 if(parc >= loc + 2 && !irccmp(parv[loc], "ON"))
212380e3 128 {
129 if(!IsOperRemoteBan(source_p))
130 {
131 sendto_one(source_p, form_str(ERR_NOPRIVS),
d8a4c5f6 132 me.name, source_p->name, "remoteban");
212380e3 133 return 0;
134 }
135
d8a4c5f6 136 target_server = parv[loc + 1];
212380e3 137 loc += 2;
138 }
139
140 if(parc <= loc || EmptyString(parv[loc]))
141 {
142 sendto_one(source_p, form_str(ERR_NEEDMOREPARAMS),
143 me.name, source_p->name, "KLINE");
144 return 0;
145 }
146
147 reason = LOCAL_COPY(parv[loc]);
148
149 if(target_server != NULL)
150 {
151 propagate_generic(source_p, "KLINE", target_server, CAP_KLN,
d8a4c5f6 152 "%d %s %s :%s", tkline_time, user, host, reason);
212380e3 153
154 /* If we are sending it somewhere that doesnt include us, stop */
155 if(!match(target_server, me.name))
156 return 0;
157 }
158 /* if we have cluster servers, send it to them.. */
08d11e34 159 else if(rb_dlink_list_length(&cluster_conf_list) > 0)
d8a4c5f6 160 cluster_generic(source_p, "KLINE",
212380e3 161 (tkline_time > 0) ? SHARED_TKLINE : SHARED_PKLINE, CAP_KLN,
d8a4c5f6 162 "%lu %s %s :%s", tkline_time, user, host, reason);
212380e3 163
d8a4c5f6
WP
164 if(!valid_user_host(source_p, user, host) ||
165 !valid_wild_card(source_p, user, host) || !valid_comment(source_p, reason))
212380e3 166 return 0;
167
168 if(already_placed_kline(source_p, user, host, tkline_time))
169 return 0;
170
4362b282 171 rb_set_time();
212380e3 172 current_date = smalldate();
173 aconf = make_conf();
174 aconf->status = CONF_KILL;
62d28946
VY
175 aconf->host = rb_strdup(host);
176 aconf->user = rb_strdup(user);
212380e3 177 aconf->port = 0;
178
179 /* Look for an oper reason */
180 if((oper_reason = strchr(reason, '|')) != NULL)
181 {
182 *oper_reason = '\0';
183 oper_reason++;
184
185 if(!EmptyString(oper_reason))
62d28946 186 aconf->spasswd = rb_strdup(oper_reason);
212380e3 187 }
188
189 if(tkline_time > 0)
190 {
581fa5c4 191 rb_snprintf(buffer, sizeof(buffer),
d8a4c5f6
WP
192 "Temporary K-line %d min. - %s (%s)",
193 (int) (tkline_time / 60), reason, current_date);
62d28946 194 aconf->passwd = rb_strdup(buffer);
212380e3 195 apply_tkline(source_p, aconf, reason, oper_reason, current_date, tkline_time);
196 }
197 else
198 {
581fa5c4 199 rb_snprintf(buffer, sizeof(buffer), "%s (%s)", reason, current_date);
62d28946 200 aconf->passwd = rb_strdup(buffer);
212380e3 201 apply_kline(source_p, aconf, reason, oper_reason, current_date);
202 }
203
204 if(ConfigFileEntry.kline_delay)
205 {
206 if(kline_queued == 0)
207 {
bfccb2c0 208 rb_event_addonce("check_klines", check_klines_event, NULL,
d8a4c5f6 209 ConfigFileEntry.kline_delay);
212380e3 210 kline_queued = 1;
211 }
212 }
213 else
214 check_klines();
215
216 return 0;
217}
218
219/* ms_kline()
220 *
221 * parv[1] - server targeted at
222 * parv[2] - tkline time (0 if perm)
223 * parv[3] - user
224 * parv[4] - host
225 * parv[5] - reason
226 */
227static int
228ms_kline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
229{
230 int tkline_time = atoi(parv[2]);
231
232 /* 1.5-3 and earlier contains a bug that allows remote klines to be
233 * sent with an empty reason field. This is a protocol violation,
234 * but its not worth dropping the link over.. --anfl
235 */
236 if(parc < 6 || EmptyString(parv[5]))
237 return 0;
238
239 propagate_generic(source_p, "KLINE", parv[1], CAP_KLN,
d8a4c5f6 240 "%d %s %s :%s", tkline_time, parv[3], parv[4], parv[5]);
212380e3 241
242 if(!match(parv[1], me.name))
243 return 0;
244
245 if(!IsPerson(source_p))
246 return 0;
247
248 handle_remote_kline(source_p, tkline_time, parv[3], parv[4], parv[5]);
249 return 0;
250}
251
252static int
253me_kline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
254{
255 /* <tkline_time> <user> <host> :<reason> */
256 if(!IsPerson(source_p))
257 return 0;
258
259 handle_remote_kline(source_p, atoi(parv[1]), parv[2], parv[3], parv[4]);
260 return 0;
261}
262
263static void
264handle_remote_kline(struct Client *source_p, int tkline_time,
d8a4c5f6 265 const char *user, const char *host, const char *kreason)
212380e3 266{
267 char buffer[BUFSIZE];
268 const char *current_date;
269 char *reason = LOCAL_COPY(kreason);
270 struct ConfItem *aconf = NULL;
271 char *oper_reason;
272
273 if(!find_shared_conf(source_p->username, source_p->host,
d8a4c5f6
WP
274 source_p->servptr->name,
275 (tkline_time > 0) ? SHARED_TKLINE : SHARED_PKLINE))
212380e3 276 return;
277
278 if(!valid_user_host(source_p, user, host) ||
d8a4c5f6 279 !valid_wild_card(source_p, user, host) || !valid_comment(source_p, reason))
212380e3 280 return;
281
282 if(already_placed_kline(source_p, user, host, tkline_time))
283 return;
284
285 aconf = make_conf();
286
287 aconf->status = CONF_KILL;
62d28946
VY
288 aconf->user = rb_strdup(user);
289 aconf->host = rb_strdup(host);
212380e3 290
291 /* Look for an oper reason */
292 if((oper_reason = strchr(reason, '|')) != NULL)
293 {
294 *oper_reason = '\0';
295 oper_reason++;
296
297 if(!EmptyString(oper_reason))
62d28946 298 aconf->spasswd = rb_strdup(oper_reason);
212380e3 299 }
300
301 current_date = smalldate();
302
303 if(tkline_time > 0)
304 {
581fa5c4 305 rb_snprintf(buffer, sizeof(buffer),
d8a4c5f6
WP
306 "Temporary K-line %d min. - %s (%s)",
307 (int) (tkline_time / 60), reason, current_date);
62d28946 308 aconf->passwd = rb_strdup(buffer);
212380e3 309 apply_tkline(source_p, aconf, reason, oper_reason, current_date, tkline_time);
310 }
311 else
312 {
581fa5c4 313 rb_snprintf(buffer, sizeof(buffer), "%s (%s)", reason, current_date);
62d28946 314 aconf->passwd = rb_strdup(buffer);
212380e3 315 apply_kline(source_p, aconf, reason, oper_reason, current_date);
316 }
317
318 if(ConfigFileEntry.kline_delay)
319 {
320 if(kline_queued == 0)
321 {
bfccb2c0 322 rb_event_addonce("check_klines", check_klines_event, NULL,
d8a4c5f6 323 ConfigFileEntry.kline_delay);
212380e3 324 kline_queued = 1;
325 }
326 }
327 else
328 check_klines();
329
330 return;
331}
332
333/* mo_unkline()
334 *
335 * parv[1] - kline to remove
336 * parv[2] - optional "ON"
337 * parv[3] - optional target server
338 */
339static int
340mo_unkline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
341{
342 const char *user;
343 char *host;
344 char splat[] = "*";
345 char *h = LOCAL_COPY(parv[1]);
40a1d446 346 struct ConfItem *aconf;
212380e3 347
348 if(!IsOperUnkline(source_p))
349 {
d8a4c5f6 350 sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "unkline");
212380e3 351 return 0;
352 }
353
354 if((host = strchr(h, '@')) || *h == '*' || strchr(h, '.') || strchr(h, ':'))
355 {
356 /* Explicit user@host mask given */
357
358 if(host) /* Found user@host */
359 {
360 *host++ = '\0';
361
362 /* check for @host */
363 if(*h)
364 user = h;
365 else
366 user = splat;
367
368 /* check for user@ */
369 if(!*host)
370 host = splat;
371 }
372 else
373 {
374 user = splat; /* no @ found, assume its *@somehost */
375 host = h;
376 }
377 }
378 else
379 {
5366977b 380 sendto_one_notice(source_p, ":Invalid parameters");
212380e3 381 return 0;
382 }
383
384 /* possible remote kline.. */
385 if((parc > 3) && (irccmp(parv[2], "ON") == 0))
386 {
387 if(!IsOperRemoteBan(source_p))
388 {
389 sendto_one(source_p, form_str(ERR_NOPRIVS),
d8a4c5f6 390 me.name, source_p->name, "remoteban");
212380e3 391 return 0;
392 }
393
d8a4c5f6 394 propagate_generic(source_p, "UNKLINE", parv[3], CAP_UNKLN, "%s %s", user, host);
212380e3 395
396 if(match(parv[3], me.name) == 0)
397 return 0;
398 }
08d11e34 399 else if(rb_dlink_list_length(&cluster_conf_list) > 0)
212380e3 400 cluster_generic(source_p, "UNKLINE", SHARED_UNKLINE, CAP_UNKLN,
401 "%s %s", user, host);
402
40a1d446
JT
403 aconf = find_exact_conf_by_address(host, CONF_KILL, user);
404 if(aconf == NULL)
405 {
406 sendto_one_notice(source_p, ":No K-Line for %s@%s", user, host);
407 return 0;
408 }
409
4c171a9c 410 if(remove_temp_kline(source_p, aconf))
212380e3 411 return 0;
212380e3 412
40a1d446 413 remove_permkline_match(source_p, aconf);
212380e3 414
415 return 0;
416}
417
418/* ms_unkline()
419 *
420 * parv[1] - target server
421 * parv[2] - user to unkline
422 * parv[3] - host to unkline
423 */
424static int
425ms_unkline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
426{
d8a4c5f6
WP
427 /* parv[0] parv[1] parv[2] parv[3]
428 * oper target server user host */
429 propagate_generic(source_p, "UNKLINE", parv[1], CAP_UNKLN, "%s %s", parv[2], parv[3]);
212380e3 430
431 if(!match(parv[1], me.name))
432 return 0;
433
434 if(!IsPerson(source_p))
435 return 0;
436
437 handle_remote_unkline(source_p, parv[2], parv[3]);
438 return 0;
439}
440
441static int
442me_unkline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
443{
444 /* user host */
445 if(!IsPerson(source_p))
446 return 0;
447
448 handle_remote_unkline(source_p, parv[1], parv[2]);
449 return 0;
450}
451
452static void
453handle_remote_unkline(struct Client *source_p, const char *user, const char *host)
454{
40a1d446
JT
455 struct ConfItem *aconf;
456
212380e3 457 if(!find_shared_conf(source_p->username, source_p->host,
d8a4c5f6 458 source_p->servptr->name, SHARED_UNKLINE))
212380e3 459 return;
460
40a1d446
JT
461 aconf = find_exact_conf_by_address(host, CONF_KILL, user);
462 if(aconf == NULL)
463 {
464 sendto_one_notice(source_p, ":No K-Line for %s@%s", user, host);
465 return;
466 }
467
4c171a9c 468 if(remove_temp_kline(source_p, aconf))
212380e3 469 return;
212380e3 470
40a1d446 471 remove_permkline_match(source_p, aconf);
212380e3 472}
473
474/* apply_kline()
475 *
476 * inputs -
477 * output - NONE
478 * side effects - kline as given, is added to the hashtable
479 * and conf file
480 */
481static void
482apply_kline(struct Client *source_p, struct ConfItem *aconf,
483 const char *reason, const char *oper_reason, const char *current_date)
484{
969a1ae6 485 add_conf_by_address(aconf->host, CONF_KILL, aconf->user, NULL, aconf);
d8a4c5f6
WP
486 bandb_add(BANDB_KLINE, source_p, aconf->user, aconf->host,
487 reason, EmptyString(oper_reason) ? NULL : oper_reason, 0);
212380e3 488}
489
490/* apply_tkline()
491 *
492 * inputs -
493 * output - NONE
494 * side effects - tkline as given is placed
495 */
496static void
497apply_tkline(struct Client *source_p, struct ConfItem *aconf,
498 const char *reason, const char *oper_reason, const char *current_date, int tkline_time)
499{
9f6bbe3c 500 aconf->hold = rb_current_time() + tkline_time;
212380e3 501 add_temp_kline(aconf);
502
503 /* no oper reason.. */
504 if(EmptyString(oper_reason))
505 {
506 sendto_realops_snomask(SNO_GENERAL, L_ALL,
d8a4c5f6
WP
507 "%s added temporary %d min. K-Line for [%s@%s] [%s]",
508 get_oper_name(source_p), tkline_time / 60,
509 aconf->user, aconf->host, reason);
212380e3 510 ilog(L_KLINE, "K %s %d %s %s %s",
d8a4c5f6 511 get_oper_name(source_p), tkline_time / 60, aconf->user, aconf->host, reason);
212380e3 512 }
513 else
514 {
515 sendto_realops_snomask(SNO_GENERAL, L_ALL,
d8a4c5f6
WP
516 "%s added temporary %d min. K-Line for [%s@%s] [%s|%s]",
517 get_oper_name(source_p), tkline_time / 60,
518 aconf->user, aconf->host, reason, oper_reason);
212380e3 519 ilog(L_KLINE, "K %s %d %s %s %s|%s",
d8a4c5f6
WP
520 get_oper_name(source_p), tkline_time / 60,
521 aconf->user, aconf->host, reason, oper_reason);
212380e3 522 }
523
524 sendto_one_notice(source_p, ":Added temporary %d min. K-Line [%s@%s]",
525 tkline_time / 60, aconf->user, aconf->host);
526}
527
528/* find_user_host()
529 *
530 * inputs - client placing kline, user@host, user buffer, host buffer
531 * output - 0 if not ok to kline, 1 to kline i.e. if valid user host
532 * side effects -
533 */
534static int
535find_user_host(struct Client *source_p, const char *userhost, char *luser, char *lhost)
536{
537 char *hostp;
538
539 hostp = strchr(userhost, '@');
d8a4c5f6 540
212380e3 541 if(hostp != NULL) /* I'm a little user@host */
542 {
543 *(hostp++) = '\0'; /* short and squat */
544 if(*userhost)
907468c4 545 rb_strlcpy(luser, userhost, USERLEN + 1); /* here is my user */
212380e3 546 else
547 strcpy(luser, "*");
548 if(*hostp)
907468c4 549 rb_strlcpy(lhost, hostp, HOSTLEN + 1); /* here is my host */
212380e3 550 else
551 strcpy(lhost, "*");
d8a4c5f6 552 }
212380e3 553 else
554 {
555 /* no '@', no '.', so its not a user@host or host, therefore
556 * its a nick, which support was removed for.
557 */
558 if(strchr(userhost, '.') == NULL && strchr(userhost, ':') == NULL)
1dc9ac1d
JT
559 {
560 sendto_one_notice(source_p, ":K-Line must be a user@host or host");
212380e3 561 return 0;
1dc9ac1d 562 }
212380e3 563
564 luser[0] = '*'; /* no @ found, assume its *@somehost */
565 luser[1] = '\0';
907468c4 566 rb_strlcpy(lhost, userhost, HOSTLEN + 1);
212380e3 567 }
568
569 return 1;
570}
571
572/* valid_user_host()
573 *
574 * inputs - user buffer, host buffer
575 * output - 0 if invalid, 1 if valid
576 * side effects -
577 */
578static int
579valid_user_host(struct Client *source_p, const char *luser, const char *lhost)
580{
d8a4c5f6
WP
581 /* # is invalid, as are '!' (n!u@h kline) and '@' (u@@h kline) */
582 if(strchr(lhost, '#') || strchr(luser, '#') || strchr(luser, '!') || strchr(lhost, '@'))
212380e3 583 {
584 sendto_one_notice(source_p, ":Invalid K-Line");
585 return 0;
586 }
587
588 return 1;
589}
590
591/* valid_wild_card()
592 *
593 * input - user buffer, host buffer
594 * output - 0 if invalid, 1 if valid
595 * side effects -
596 */
597static int
598valid_wild_card(struct Client *source_p, const char *luser, const char *lhost)
599{
600 const char *p;
601 char tmpch;
602 int nonwild = 0;
88a2a148 603 int bitlen;
212380e3 604
598ebb42 605 /* user has no wildcards, always accept -- jilles */
d8a4c5f6 606 if(!strchr(luser, '?') && !strchr(luser, '*'))
598ebb42 607 return 1;
608
212380e3 609 /* check there are enough non wildcard chars */
610 p = luser;
d8a4c5f6 611 while((tmpch = *p++))
212380e3 612 {
613 if(!IsKWildChar(tmpch))
614 {
615 /* found enough chars, return */
616 if(++nonwild >= ConfigFileEntry.min_nonwildcard)
617 return 1;
618 }
619 }
620
621 /* try host, as user didnt contain enough */
88a2a148 622 /* special case for cidr masks -- jilles */
d8a4c5f6 623 if((p = strrchr(lhost, '/')) != NULL && IsDigit(p[1]))
212380e3 624 {
88a2a148 625 bitlen = atoi(p + 1);
626 /* much like non-cidr for ipv6, rather arbitrary for ipv4 */
d8a4c5f6
WP
627 if(bitlen > 0
628 && bitlen >=
629 (strchr(lhost, ':') ? 4 * (ConfigFileEntry.min_nonwildcard - nonwild) : 6 -
630 2 * nonwild))
88a2a148 631 return 1;
632 }
633 else
634 {
635 p = lhost;
d8a4c5f6 636 while((tmpch = *p++))
88a2a148 637 {
638 if(!IsKWildChar(tmpch))
639 if(++nonwild >= ConfigFileEntry.min_nonwildcard)
640 return 1;
641 }
212380e3 642 }
643
644 sendto_one_notice(source_p,
d8a4c5f6
WP
645 ":Please include at least %d non-wildcard "
646 "characters with the user@host", ConfigFileEntry.min_nonwildcard);
212380e3 647 return 0;
648}
649
650/*
651 * valid_comment
652 * inputs - pointer to client
653 * - pointer to comment
654 * output - 0 if no valid comment, 1 if valid
655 * side effects - NONE
656 */
657static int
658valid_comment(struct Client *source_p, char *comment)
659{
660 if(strchr(comment, '"'))
661 {
662 sendto_one_notice(source_p, ":Invalid character '\"' in comment");
663 return 0;
664 }
665
61569b65 666 if(strlen(comment) > BANREASONLEN)
667 comment[BANREASONLEN] = '\0';
212380e3 668
669 return 1;
670}
671
672/* already_placed_kline()
673 *
674 * inputs - source to notify, user@host to check, tkline time
675 * outputs - 1 if a perm kline or a tkline when a tkline is being
676 * set exists, else 0
677 * side effects - notifies source_p kline exists
678 */
679/* Note: This currently works if the new K-line is a special case of an
680 * existing K-line, but not the other way round. To do that we would
681 * have to walk the hash and check every existing K-line. -A1kmm.
682 */
683static int
684already_placed_kline(struct Client *source_p, const char *luser, const char *lhost, int tkline)
685{
df7a3250 686 const char *reason, *p;
3ea5fee7 687 struct rb_sockaddr_storage iphost, *piphost;
212380e3 688 struct ConfItem *aconf;
d8a4c5f6 689 int t, bits;
df7a3250
JT
690
691 aconf = find_exact_conf_by_address(lhost, CONF_KILL, luser);
d8a4c5f6 692 if(aconf == NULL && ConfigFileEntry.non_redundant_klines)
212380e3 693 {
df7a3250 694 bits = 0;
d8a4c5f6 695 if((t = parse_netmask(lhost, (struct sockaddr *) &iphost, &bits)) != HM_HOST)
212380e3 696 {
2c2e0aa9 697#ifdef RB_IPV6
212380e3 698 if(t == HM_IPV6)
699 t = AF_INET6;
700 else
701#endif
702 t = AF_INET;
d8a4c5f6 703
212380e3 704 piphost = &iphost;
705 }
706 else
707 piphost = NULL;
708
d8a4c5f6
WP
709 aconf = find_conf_by_address(lhost, NULL, NULL, (struct sockaddr *) piphost,
710 CONF_KILL, t, luser, NULL);
711 if(aconf != NULL)
212380e3 712 {
df7a3250
JT
713 /* The above was really a lookup of a single IP,
714 * so check if the new kline is wider than the
715 * existing one.
716 * -- jilles
717 */
718 p = strchr(aconf->host, '/');
d8a4c5f6 719 if(bits > 0 && (p == NULL || bits < atoi(p + 1)))
df7a3250
JT
720 aconf = NULL;
721 }
722 }
d8a4c5f6 723 if(aconf != NULL)
df7a3250
JT
724 {
725 /* setting a tkline, or existing one is perm */
726 if(tkline || ((aconf->flags & CONF_FLAGS_TEMPORARY) == 0))
727 {
728 reason = aconf->passwd ? aconf->passwd : "<No Reason>";
729
730 sendto_one_notice(source_p,
731 ":[%s@%s] already K-Lined by [%s@%s] - %s",
d8a4c5f6 732 luser, lhost, aconf->user, aconf->host, reason);
df7a3250 733 return 1;
212380e3 734 }
735 }
736
737 return 0;
738}
739
740/* remove_permkline_match()
741 *
742 * hunts for a permanent kline, and removes it.
743 */
744static void
40a1d446 745remove_permkline_match(struct Client *source_p, struct ConfItem *aconf)
212380e3 746{
d8a4c5f6 747 sendto_one_notice(source_p, ":K-Line for [%s@%s] is removed", aconf->user, aconf->host);
212380e3 748
749 sendto_realops_snomask(SNO_GENERAL, L_ALL,
d8a4c5f6
WP
750 "%s has removed the K-Line for: [%s@%s]",
751 get_oper_name(source_p), aconf->user, aconf->host);
212380e3 752
d8a4c5f6 753 ilog(L_KLINE, "UK %s %s %s", get_oper_name(source_p), aconf->user, aconf->host);
40a1d446 754
21c9d815 755 remove_reject_mask(aconf->user, aconf->host);
d8a4c5f6 756 bandb_del(BANDB_KLINE, aconf->user, aconf->host);
40a1d446
JT
757 delete_one_address_conf(aconf->host, aconf);
758
212380e3 759 return;
760}
761
212380e3 762/* remove_temp_kline()
763 *
764 * inputs - username, hostname to unkline
765 * outputs -
766 * side effects - tries to unkline anything that matches
767 */
768static int
4c171a9c 769remove_temp_kline(struct Client *source_p, struct ConfItem *aconf)
212380e3 770{
08d11e34 771 rb_dlink_node *ptr;
212380e3 772 int i;
773
d8a4c5f6 774 for(i = 0; i < LAST_TEMP_TYPE; i++)
212380e3 775 {
08d11e34 776 RB_DLINK_FOREACH(ptr, temp_klines[i].head)
212380e3 777 {
d8a4c5f6 778 if(aconf == ptr->data)
212380e3 779 {
4c171a9c 780 sendto_one_notice(source_p,
d8a4c5f6
WP
781 ":Un-klined [%s@%s] from temporary k-lines",
782 aconf->user, aconf->host);
4c171a9c 783 sendto_realops_snomask(SNO_GENERAL, L_ALL,
d8a4c5f6
WP
784 "%s has removed the temporary K-Line for: [%s@%s]",
785 get_oper_name(source_p), aconf->user,
786 aconf->host);
4c171a9c
JT
787
788 ilog(L_KLINE, "UK %s %s %s",
d8a4c5f6 789 get_oper_name(source_p), aconf->user, aconf->host);
9f6c3353 790 rb_dlinkDestroy(ptr, &temp_klines[i]);
21c9d815 791 remove_reject_mask(aconf->user, aconf->host);
40a1d446
JT
792 delete_one_address_conf(aconf->host, aconf);
793 return YES;
212380e3 794 }
212380e3 795 }
796 }
797
798 return NO;
799}