X-Git-Url: https://jfr.im/git/irc/rqf/shadowircd.git/blobdiff_plain/d29b1834c36ec874e67374244eb9c12772397f8f..585e477be8d7cfa2c0308568e5cab8df095a639e:/modules/core/m_message.c diff --git a/modules/core/m_message.c b/modules/core/m_message.c index 5af579f..670a609 100644 --- a/modules/core/m_message.c +++ b/modules/core/m_message.c @@ -21,7 +21,6 @@ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 * USA * - * $Id: m_message.c 3173 2007-01-31 23:57:18Z jilles $ */ #include "stdinc.h" @@ -43,7 +42,9 @@ #include "send.h" #include "s_newconf.h" #include "s_stats.h" +#include "tgchange.h" #include "inline/stringops.h" +#include "irc_dictionary.h" static int m_message(int, const char *, struct Client *, struct Client *, int, const char **); static int m_privmsg(struct Client *, struct Client *, int, const char **); @@ -90,7 +91,6 @@ static int build_target_list(int p_or_n, const char *command, struct Client *client_p, struct Client *source_p, const char *nicks_channels, const char *text); -static struct Channel *find_allowing_channel(struct Client *source_p, struct Client *target_p); static int flood_attack_client(int p_or_n, struct Client *source_p, struct Client *target_p); static int flood_attack_channel(int p_or_n, struct Client *source_p, struct Channel *chptr, char *chname); @@ -484,6 +484,11 @@ msg_channel(int p_or_n, const char *command, { int result; char text2[BUFSIZE]; + size_t contor; + int caps = 0; + int len = 0; + struct membership *msptr = find_channel_membership(chptr, source_p); + struct Metadata *md; if(MyClient(source_p)) { @@ -492,7 +497,25 @@ msg_channel(int p_or_n, const char *command, source_p->localClient->last = rb_current_time(); } - if(chptr->mode.mode & MODE_NOCOLOR) + if(chptr->mode.mode & MODE_NOREPEAT) + { + rb_strlcpy(text2, text, BUFSIZE); + strip_unprintable(text2); + md = channel_metadata_find(chptr, "NOREPEAT"); + if(md && (!ConfigChannel.exempt_cmode_K || !is_any_op(msptr))) + { + if(!(strcmp(md->value, text2))) + { + if(p_or_n != NOTICE) + sendto_one_numeric(source_p, 404, "%s :Cannot send to channel - Message blocked due to repeating (+K set)", chptr->chname); + return; + } + } + channel_metadata_delete(chptr, "NOREPEAT", 0); + channel_metadata_add(chptr, "NOREPEAT", text2, 0); + } + + if(chptr->mode.mode & MODE_NOCOLOR && (!ConfigChannel.exempt_cmode_c || !is_any_op(msptr))) { rb_strlcpy(text2, text, BUFSIZE); strip_colour(text2); @@ -510,16 +533,52 @@ msg_channel(int p_or_n, const char *command, /* chanops and voiced can flood their own channel with impunity */ if((result = can_send(chptr, source_p, NULL))) { + if(result != CAN_SEND_OPV && MyClient(source_p) && + !IsOper(source_p) && + !add_channel_target(source_p, chptr)) + { + sendto_one(source_p, form_str(ERR_TARGCHANGE), + me.name, source_p->name, chptr->chname); + return; + } if(result == CAN_SEND_OPV || !flood_attack_channel(p_or_n, source_p, chptr, chptr->chname)) { + if (strlen(text) > 10 && chptr->mode.mode & MODE_NOCAPS && (!ConfigChannel.exempt_cmode_G || !is_any_op(msptr))) + { + rb_strlcpy(text2, text, BUFSIZE); + strip_unprintable(text2); + for(contor=0; contor < strlen(text2); contor++) + { + if(IsUpper(text2[contor]) && !isdigit(text2[contor])) + caps++; + len++; + } + /* Added divide by 0 check --alxbl */ + if(len != 0 && ((caps*100)/(len)) >= 50) + { + sendto_one_numeric(source_p, 404, "%s :Cannot send to channel - Your message contains mostly capital letters (+G set)", chptr->chname); + return; + } + } + if (p_or_n != PRIVMSG && chptr->mode.mode & MODE_NONOTICE && (!ConfigChannel.exempt_cmode_T || !is_any_op(msptr))) + { + sendto_one_numeric(source_p, 404, "%s :Cannot send to channel - Notices are disallowed (+T set)", chptr->chname); + return; + } + if (p_or_n != NOTICE && chptr->mode.mode & MODE_NOACTION && + !strncasecmp(text + 1, "ACTION", 6) && + (!ConfigChannel.exempt_cmode_D || !is_any_op(msptr))) + { + sendto_one_numeric(source_p, 404, "%s :Cannot send to channel - ACTIONs are disallowed (+D set)", chptr->chname); + return; + } if (p_or_n != NOTICE && *text == '\001' && - strncasecmp(text + 1, "ACTION", 6)) + strncasecmp(text + 1, "ACTION ", 7)) { - if (chptr->mode.mode & MODE_NOCTCP) + if (chptr->mode.mode & MODE_NOCTCP && (!ConfigChannel.exempt_cmode_C || !is_any_op(msptr))) { - sendto_one_numeric(source_p, ERR_CANNOTSENDTOCHAN, - form_str(ERR_CANNOTSENDTOCHAN), chptr->chname); + sendto_one_numeric(source_p, 404, "%s :Cannot send to channel - CTCPs to this channel are disallowed (+C set)", chptr->chname); return; } else if (rb_dlink_list_length(&chptr->locmembers) > (unsigned)(GlobalSetOptions.floodcount / 2)) @@ -533,6 +592,13 @@ msg_channel(int p_or_n, const char *command, (!(chptr->mode.mode & MODE_NOPRIVMSGS) || IsMember(source_p, chptr))) { + if(MyClient(source_p) && !IsOper(source_p) && + !add_channel_target(source_p, chptr)) + { + sendto_one(source_p, form_str(ERR_TARGCHANGE), + me.name, source_p->name, chptr->chname); + return; + } if(!flood_attack_channel(p_or_n, source_p, chptr, chptr->chname)) { sendto_channel_opmod(client_p, source_p, chptr, @@ -642,10 +708,6 @@ msg_channel_flags(int p_or_n, const char *command, struct Client *client_p, command, c, chptr->chname, text); } -#define PREV_FREE_TARGET(x) ((FREE_TARGET(x) == 0) ? TGCHANGE_NUM - 1 : FREE_TARGET(x) - 1) -#define PREV_TARGET(i) ((i == 0) ? i = TGCHANGE_NUM - 1 : --i) -#define NEXT_TARGET(i) ((i == TGCHANGE_NUM - 1) ? i = 0 : ++i) - static void expire_tgchange(void *unused) { @@ -666,77 +728,6 @@ expire_tgchange(void *unused) } } -static int -add_target(struct Client *source_p, struct Client *target_p) -{ - int i, j; - uint32_t hashv; - - /* can msg themselves or services without using any target slots */ - if(source_p == target_p || IsService(target_p)) - return 1; - - /* special condition for those who have had PRIVMSG crippled to allow them - * to talk to IRCops still. - * - * XXX: is this controversial? - */ - if(source_p->localClient->target_last > rb_current_time() && IsOper(target_p)) - return 1; - - hashv = fnv_hash_upper((const unsigned char *)use_id(target_p), 32); - - if(USED_TARGETS(source_p)) - { - /* hunt for an existing target */ - for(i = PREV_FREE_TARGET(source_p), j = USED_TARGETS(source_p); - j; --j, PREV_TARGET(i)) - { - if(source_p->localClient->targets[i] == hashv) - return 1; - } - - /* first message after connect, we may only start clearing - * slots after this message --anfl - */ - if(!IsTGChange(source_p)) - { - SetTGChange(source_p); - source_p->localClient->target_last = rb_current_time(); - } - /* clear as many targets as we can */ - else if((i = (rb_current_time() - source_p->localClient->target_last) / 60)) - { - if(i > USED_TARGETS(source_p)) - USED_TARGETS(source_p) = 0; - else - USED_TARGETS(source_p) -= i; - - source_p->localClient->target_last = rb_current_time(); - } - /* cant clear any, full target list */ - else if(USED_TARGETS(source_p) == TGCHANGE_NUM) - { - ServerStats.is_tgch++; - add_tgchange(source_p->sockhost); - return 0; - } - } - /* no targets in use, reset their target_last so that they cant - * abuse a long idle to get targets back more quickly - */ - else - { - source_p->localClient->target_last = rb_current_time(); - SetTGChange(source_p); - } - - source_p->localClient->targets[FREE_TARGET(source_p)] = hashv; - NEXT_TARGET(FREE_TARGET(source_p)); - ++USED_TARGETS(source_p); - return 1; -} - /* * msg_client * @@ -754,9 +745,39 @@ msg_client(int p_or_n, const char *command, struct Client *source_p, struct Client *target_p, const char *text) { int do_floodcount = 0; + struct Metadata *md; + struct DictionaryIter iter; + int oaccept = 0; + char text3[10]; if(MyClient(source_p)) { + /* + * XXX: Controversial? Allow target users to send replies + * through a +g. Rationale is that people can presently use +g + * as a way to taunt users, e.g. harass them and hide behind +g + * as a way of griefing. --nenolod + */ + if(p_or_n != NOTICE && MyClient(source_p) && + IsSetCallerId(source_p) && + IsSetSCallerId(source_p) && + !accept_message(target_p, source_p)) + { + if(rb_dlink_list_length(&source_p->localClient->allow_list) < + ConfigFileEntry.max_accept) + { + rb_dlinkAddAlloc(target_p, &source_p->localClient->allow_list); + rb_dlinkAddAlloc(source_p, &target_p->on_allow_list); + } + else + { + sendto_one_numeric(source_p, ERR_OWNMODE, + form_str(ERR_OWNMODE), + target_p->name, "+g"); + return; + } + } + /* reset idle time for message only if its not to self * and its not a notice */ if(p_or_n != NOTICE) @@ -803,13 +824,33 @@ msg_client(int p_or_n, const char *command, if(MyClient(target_p)) { - /* XXX Controversial? allow opers always to send through a +g */ - if(!IsServer(source_p) && (IsSetCallerId(target_p) || + if (IsSetNoCTCP(target_p) && p_or_n != NOTICE && *text == '\001' && strncasecmp(text + 1, "ACTION", 6)) + { + sendto_one_numeric(source_p, ERR_NOCTCP, + form_str(ERR_NOCTCP), + target_p->name); + } + /* If opers want to go through +g, they should load oaccept.*/ + else if(!IsServer(source_p) && !IsService(source_p) && (IsSetCallerId(target_p) || + (IsSetSCallerId(target_p) && !has_common_channel(source_p, target_p)) || (IsSetRegOnlyMsg(target_p) && !source_p->user->suser[0]))) { + if (IsOper(source_p)) + { + rb_snprintf(text3, sizeof(text3), "O%s", source_p->id); + DICTIONARY_FOREACH(md, &iter, target_p->user->metadata) + { + if(!strcmp(md->value, "OACCEPT") && !strcmp(md->name, text3)) + { + oaccept = 1; + break; + } + } + } /* Here is the anti-flood bot/spambot code -db */ - if(accept_message(source_p, target_p) || IsOper(source_p)) + if(accept_message(source_p, target_p) || oaccept) { + add_reply_target(target_p, source_p); sendto_one(target_p, ":%s!%s@%s %s %s :%s", source_p->name, source_p->username, @@ -822,6 +863,13 @@ msg_client(int p_or_n, const char *command, form_str(ERR_NONONREG), target_p->name); } + else if (IsSetSCallerId(target_p) && !has_common_channel(source_p, target_p)) + { + if (p_or_n != NOTICE) + sendto_one_numeric(source_p, ERR_NOCOMMONCHAN, + form_str(ERR_NOCOMMONCHAN), + target_p->name); + } else { /* check for accept, flag recipient incoming message */ @@ -840,6 +888,7 @@ msg_client(int p_or_n, const char *command, form_str(RPL_TARGNOTIFY), target_p->name); + add_reply_target(target_p, source_p); sendto_one(target_p, form_str(RPL_UMODEGMSG), me.name, target_p->name, source_p->name, source_p->username, source_p->host); @@ -849,7 +898,10 @@ msg_client(int p_or_n, const char *command, } } else + { + add_reply_target(target_p, source_p); sendto_anywhere(target_p, source_p, command, ":%s", text); + } } else sendto_anywhere(target_p, source_p, command, ":%s", text); @@ -857,21 +909,6 @@ msg_client(int p_or_n, const char *command, return; } -static struct Channel * -find_allowing_channel(struct Client *source_p, struct Client *target_p) -{ - rb_dlink_node *ptr; - struct membership *msptr; - - RB_DLINK_FOREACH(ptr, source_p->user->channel.head) - { - msptr = ptr->data; - if (is_chanop_voiced(msptr) && IsMember(target_p, msptr->chptr)) - return msptr->chptr; - } - return NULL; -} - /* * flood_attack_client * inputs - flag 0 if PRIVMSG 1 if NOTICE. RFC @@ -891,7 +928,7 @@ flood_attack_client(int p_or_n, struct Client *source_p, struct Client *target_p * and msg user@server. * -- jilles */ - if(GlobalSetOptions.floodcount && IsClient(source_p) && source_p != target_p && !IsService(target_p)) + if(GlobalSetOptions.floodcount && IsClient(source_p) && source_p != target_p && !IsService(target_p) && (!IsOper(source_p) || !ConfigFileEntry.true_no_oper_flood)) { if((target_p->first_received_message_time + 1) < rb_current_time()) { @@ -946,7 +983,7 @@ flood_attack_channel(int p_or_n, struct Client *source_p, struct Channel *chptr, { int delta; - if(GlobalSetOptions.floodcount && MyClient(source_p)) + if(GlobalSetOptions.floodcount && MyClient(source_p) && (!IsOper(source_p) || !ConfigFileEntry.true_no_oper_flood)) { if((chptr->first_received_message_time + 1) < rb_current_time()) {