]> jfr.im git - solanum.git/blame - ircd/listener.c
Add tests for valid_temp_time
[solanum.git] / ircd / listener.c
CommitLineData
54ac8b60
VY
1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * listener.c: Listens on a port.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
e2ade304 8 * Copyright (C) 2021 Ariadne Conill
54ac8b60
VY
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
14 *
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
19 *
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
23 * USA
54ac8b60
VY
24 */
25
26#include "stdinc.h"
27#include "setup.h"
28#include "listener.h"
29#include "client.h"
4562c604 30#include "match.h"
54ac8b60
VY
31#include "ircd.h"
32#include "ircd_defs.h"
33#include "numeric.h"
34#include "s_conf.h"
35#include "s_newconf.h"
36#include "s_stats.h"
37#include "send.h"
64fae260 38#include "authproc.h"
54ac8b60 39#include "reject.h"
54ac8b60 40#include "hostmask.h"
c6d72037 41#include "sslproc.h"
c53ca1e0 42#include "wsproc.h"
c6d72037 43#include "hash.h"
77d3d2db
KB
44#include "s_assert.h"
45#include "logger.h"
54ac8b60 46
e2ade304 47static rb_dlink_list listener_list = {};
1087485c 48static int accept_precallback(rb_fde_t *F, struct sockaddr *addr, rb_socklen_t addrlen, void *data);
8e09c4a2 49static void accept_callback(rb_fde_t *F, int status, struct sockaddr *addr, rb_socklen_t addrlen, void *data);
762468f8 50static SSL_OPEN_CB accept_sslcallback;
54ac8b60 51
8f103562 52static struct Listener *
e7046ee5 53make_listener(struct rb_sockaddr_storage *addr)
54ac8b60 54{
8f103562 55 struct Listener *listener = (struct Listener *) rb_malloc(sizeof(struct Listener));
54ac8b60 56 s_assert(0 != listener);
54ac8b60 57 listener->name = me.name;
f691939a
VY
58 listener->F = NULL;
59
c6ad9b0c 60 memcpy(&listener->addr, addr, sizeof(listener->addr));
54ac8b60
VY
61 return listener;
62}
63
64void
8f103562 65free_listener(struct Listener *listener)
54ac8b60
VY
66{
67 s_assert(NULL != listener);
68 if(listener == NULL)
69 return;
54ac8b60 70
e2ade304 71 rb_dlinkDelete(&listener->lnode, &listener_list);
54ac8b60
VY
72 rb_free(listener);
73}
74
75#define PORTNAMELEN 6 /* ":31337" */
76
40173bcb
JT
77/*
78 * get_listener_port - return displayable listener port
79 */
80static uint16_t
81get_listener_port(const struct Listener *listener)
82{
c6ad9b0c 83 return ntohs(GET_SS_PORT(&listener->addr[0]));
40173bcb
JT
84}
85
54ac8b60
VY
86/*
87 * get_listener_name - return displayable listener name and port
54ac8b60
VY
88 */
89const char *
8f103562 90get_listener_name(const struct Listener *listener)
54ac8b60 91{
c6ad9b0c 92 static char buf[BUFSIZE];
54ac8b60 93
5203cba5 94 snprintf(buf, sizeof(buf), "%s[%s/%u]",
40173bcb 95 me.name, listener->name, get_listener_port(listener));
54ac8b60
VY
96 return buf;
97}
98
99/*
100 * show_ports - send port listing to a client
101 * inputs - pointer to client to show ports to
102 * output - none
103 * side effects - show ports
104 */
105void
106show_ports(struct Client *source_p)
107{
e2ade304 108 rb_dlink_node *n;
54ac8b60 109
e2ade304 110 RB_DLINK_FOREACH(n, listener_list.head)
54ac8b60 111 {
e2ade304
AC
112 struct Listener *listener = n->data;
113
55abcbb2 114 sendto_one_numeric(source_p, RPL_STATSPLINE,
40173bcb
JT
115 form_str(RPL_STATSPLINE), 'P',
116 get_listener_port(listener),
54ac8b60 117 IsOperAdmin(source_p) ? listener->name : me.name,
8bd5767b 118 listener->ref_count, (listener->active) ? "active" : "disabled",
c6ad9b0c 119 listener->sctp ? " sctp" : " tcp",
c6d72037 120 listener->ssl ? " ssl" : "");
54ac8b60
VY
121 }
122}
123
124/*
125 * inetport - create a listener socket in the AF_INET or AF_INET6 domain,
126 * bind it to the port given in 'port' and listen to it
127 * returns true (1) if successful false (0) on error.
54ac8b60 128 */
54ac8b60
VY
129
130static int
8f103562 131inetport(struct Listener *listener)
54ac8b60 132{
f691939a 133 rb_fde_t *F;
40173bcb 134 const char *errstr;
c6ad9b0c
SA
135 int ret;
136
137 if (listener->sctp) {
138#ifdef HAVE_LIBSCTP
139 /* only AF_INET6 sockets can have both AF_INET and AF_INET6 addresses */
140 F = rb_socket(AF_INET6, SOCK_STREAM, IPPROTO_SCTP, "Listener socket");
141#else
142 F = NULL;
143#endif
144 } else {
145 F = rb_socket(GET_SS_FAMILY(&listener->addr[0]), SOCK_STREAM, IPPROTO_TCP, "Listener socket");
146 }
54ac8b60 147
c6ad9b0c 148 memset(listener->vhost, 0, sizeof(listener->vhost));
55abcbb2 149
c6ad9b0c
SA
150 if (GET_SS_FAMILY(&listener->addr[0]) == AF_INET6) {
151 struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)&listener->addr[0];
152 rb_inet_ntop(AF_INET6, &in6->sin6_addr, listener->vhost, sizeof(listener->vhost));
153 } else if (GET_SS_FAMILY(&listener->addr[0]) == AF_INET) {
154 struct sockaddr_in *in = (struct sockaddr_in *)&listener->addr[0];
155 rb_inet_ntop(AF_INET, &in->sin_addr, listener->vhost, sizeof(listener->vhost));
156 }
54ac8b60 157
c6ad9b0c
SA
158 if (GET_SS_FAMILY(&listener->addr[1]) == AF_INET6) {
159 struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)&listener->addr[1];
160 strncat(listener->vhost, "&", sizeof(listener->vhost));
161 rb_inet_ntop(AF_INET6, &in6->sin6_addr, &listener->vhost[strlen(listener->vhost)], sizeof(listener->vhost) - strlen(listener->vhost));
162 } else if (GET_SS_FAMILY(&listener->addr[1]) == AF_INET) {
163 struct sockaddr_in *in = (struct sockaddr_in *)&listener->addr[1];
164 strncat(listener->vhost, "&", sizeof(listener->vhost));
165 rb_inet_ntop(AF_INET, &in->sin_addr, &listener->vhost[strlen(listener->vhost)], sizeof(listener->vhost) - strlen(listener->vhost));
54ac8b60
VY
166 }
167
c6ad9b0c
SA
168 if (listener->vhost[0] != '\0') {
169 listener->name = listener->vhost;
1087485c 170 }
c6ad9b0c
SA
171
172 if (F == NULL) {
a9227555 173 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
c6ad9b0c
SA
174 "Cannot open socket for listener on %s port %d",
175 listener->sctp ? "SCTP" : "TCP",
40173bcb 176 get_listener_port(listener));
c6ad9b0c
SA
177 ilog(L_MAIN, "Cannot open socket for %s listener %s",
178 listener->sctp ? "SCTP" : "TCP",
40173bcb 179 get_listener_name(listener));
1087485c 180 return 0;
54ac8b60
VY
181 }
182
c6ad9b0c
SA
183 if (listener->sctp) {
184 ret = rb_sctp_bindx(F, listener->addr, ARRAY_SIZE(listener->addr));
185 } else {
186 ret = rb_bind(F, (struct sockaddr *)&listener->addr[0]);
54ac8b60
VY
187 }
188
c6ad9b0c 189 if (ret) {
40173bcb 190 errstr = strerror(rb_get_sockerr(F));
a9227555 191 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
c6ad9b0c
SA
192 "Cannot bind for listener on %s port %d: %s",
193 listener->sctp ? "SCTP" : "TCP",
40173bcb 194 get_listener_port(listener), errstr);
c6ad9b0c
SA
195 ilog(L_MAIN, "Cannot bind for %s listener %s: %s",
196 listener->sctp ? "SCTP" : "TCP",
40173bcb 197 get_listener_name(listener), errstr);
1087485c
JT
198 rb_close(F);
199 return 0;
54ac8b60
VY
200 }
201
9057170c 202 if(rb_listen(F, SOMAXCONN, listener->defer_accept))
1087485c 203 {
40173bcb 204 errstr = strerror(rb_get_sockerr(F));
a9227555 205 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
c6ad9b0c
SA
206 "Cannot listen() for listener on %s port %d: %s",
207 listener->sctp ? "SCTP" : "TCP",
40173bcb 208 get_listener_port(listener), errstr);
c6ad9b0c
SA
209 ilog(L_MAIN, "Cannot listen() for %s listener %s: %s",
210 listener->sctp ? "SCTP" : "TCP",
40173bcb 211 get_listener_name(listener), errstr);
1087485c
JT
212 rb_close(F);
213 return 0;
54ac8b60
VY
214 }
215
1087485c
JT
216 listener->F = F;
217
f691939a 218 rb_accept_tcp(listener->F, accept_precallback, accept_callback, listener);
54ac8b60
VY
219 return 1;
220}
221
8f103562 222static struct Listener *
c6ad9b0c 223find_listener(struct rb_sockaddr_storage *addr, int sctp)
54ac8b60 224{
e2ade304 225 rb_dlink_node *n;
8f103562 226 struct Listener *last_closed = NULL;
54ac8b60 227
e2ade304
AC
228 RB_DLINK_FOREACH(n, listener_list.head) {
229 struct Listener *listener = n->data;
230
c6ad9b0c 231 if (listener->sctp != sctp)
54ac8b60 232 continue;
55abcbb2 233
c6ad9b0c
SA
234 for (int i = 0; i < ARRAY_SIZE(listener->addr); i++) {
235 if (GET_SS_FAMILY(&addr[i]) != GET_SS_FAMILY(&listener->addr[i]))
236 goto next;
237
238 switch (GET_SS_FAMILY(&addr[i])) {
239 case AF_INET:
54ac8b60 240 {
c6ad9b0c
SA
241 struct sockaddr_in *in4 = (struct sockaddr_in *)&addr[i];
242 struct sockaddr_in *lin4 = (struct sockaddr_in *)&listener->addr[i];
243 if(in4->sin_addr.s_addr != lin4->sin_addr.s_addr ||
244 in4->sin_port != lin4->sin_port)
245 {
246 goto next;
247 }
248 break;
54ac8b60 249 }
c6ad9b0c
SA
250
251 case AF_INET6:
54ac8b60 252 {
c6ad9b0c
SA
253 struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)&addr[i];
254 struct sockaddr_in6 *lin6 =(struct sockaddr_in6 *)&listener->addr[i];
255 if (!IN6_ARE_ADDR_EQUAL(&in6->sin6_addr, &lin6->sin6_addr) ||
256 in6->sin6_port != lin6->sin6_port)
257 {
258 goto next;
259 }
260 break;
54ac8b60 261 }
55abcbb2 262
c6ad9b0c
SA
263 default:
264 break;
54ac8b60 265 }
c6ad9b0c 266 }
54ac8b60 267
c6ad9b0c
SA
268 if (listener->F == NULL) {
269 last_closed = listener;
270 } else {
271 return listener;
54ac8b60 272 }
c6ad9b0c
SA
273
274next:
275 continue;
54ac8b60
VY
276 }
277 return last_closed;
278}
279
280
281/*
c6ad9b0c 282 * add_tcp_listener- create a new listener
54ac8b60
VY
283 * port - the port number to listen on
284 * vhost_ip - if non-null must contain a valid IP address string in
285 * the format "255.255.255.255"
286 */
287void
c6ad9b0c 288add_tcp_listener(int port, const char *vhost_ip, int family, int ssl, int defer_accept, int wsock)
54ac8b60 289{
8f103562 290 struct Listener *listener;
c6ad9b0c 291 struct rb_sockaddr_storage vaddr[ARRAY_SIZE(listener->addr)];
54ac8b60
VY
292
293 /*
294 * if no port in conf line, don't bother
295 */
c6ad9b0c 296 if (port == 0)
54ac8b60
VY
297 return;
298 memset(&vaddr, 0, sizeof(vaddr));
c6ad9b0c
SA
299 SET_SS_FAMILY(&vaddr[0], AF_UNSPEC);
300 SET_SS_LEN(&vaddr[0], sizeof(struct sockaddr_storage));
301 SET_SS_FAMILY(&vaddr[1], AF_UNSPEC);
302 SET_SS_LEN(&vaddr[1], sizeof(struct sockaddr_storage));
303
304 if (vhost_ip != NULL) {
305 if (family == AF_INET) {
306 if (rb_inet_pton(family, vhost_ip, &((struct sockaddr_in *)&vaddr[0])->sin_addr) <= 0)
54ac8b60 307 return;
c6ad9b0c
SA
308 } else {
309 if (rb_inet_pton(family, vhost_ip, &((struct sockaddr_in6 *)&vaddr[0])->sin6_addr) <= 0)
54ac8b60 310 return;
54ac8b60 311 }
c6ad9b0c
SA
312 } else {
313 switch(family) {
54ac8b60 314 case AF_INET:
c6ad9b0c 315 ((struct sockaddr_in *)&vaddr[0])->sin_addr.s_addr = INADDR_ANY;
54ac8b60 316 break;
54ac8b60 317 case AF_INET6:
c6ad9b0c 318 memcpy(&((struct sockaddr_in6 *)&vaddr[0])->sin6_addr, &in6addr_any, sizeof(struct in6_addr));
54ac8b60
VY
319 break;
320 default:
321 return;
55abcbb2 322 }
54ac8b60 323 }
c6ad9b0c 324 switch(family) {
54ac8b60 325 case AF_INET:
c6ad9b0c
SA
326 SET_SS_LEN(&vaddr[0], sizeof(struct sockaddr_in));
327 SET_SS_FAMILY(&vaddr[0], AF_INET);
328 SET_SS_PORT(&vaddr[0], htons(port));
54ac8b60 329 break;
54ac8b60 330 case AF_INET6:
c6ad9b0c
SA
331 SET_SS_LEN(&vaddr[0], sizeof(struct sockaddr_in6));
332 SET_SS_FAMILY(&vaddr[0], AF_INET6);
333 SET_SS_PORT(&vaddr[0], htons(port));
54ac8b60 334 break;
54ac8b60
VY
335 default:
336 break;
337 }
c6ad9b0c
SA
338 if ((listener = find_listener(vaddr, 0))) {
339 if (listener->F != NULL)
54ac8b60 340 return;
c6ad9b0c
SA
341 } else {
342 listener = make_listener(vaddr);
e2ade304 343 rb_dlinkAdd(listener, &listener->lnode, &listener_list);
54ac8b60
VY
344 }
345
f691939a 346 listener->F = NULL;
c6d72037 347 listener->ssl = ssl;
02270e96 348 listener->defer_accept = defer_accept;
c6ad9b0c 349 listener->sctp = 0;
c53ca1e0 350 listener->wsock = wsock;
54ac8b60 351
c6ad9b0c 352 if (inetport(listener)) {
54ac8b60 353 listener->active = 1;
c6ad9b0c 354 } else {
54ac8b60 355 close_listener(listener);
c6ad9b0c
SA
356 }
357}
358
359/*
360 * add_sctp_listener- create a new listener
361 * port - the port number to listen on
362 * vhost_ip1/2 - if non-null must contain a valid IP address string
363 */
364void
365add_sctp_listener(int port, const char *vhost_ip1, const char *vhost_ip2, int ssl, int wsock)
366{
367 struct Listener *listener;
368 struct rb_sockaddr_storage vaddr[ARRAY_SIZE(listener->addr)];
369
370 /*
371 * if no port in conf line, don't bother
372 */
373 if (port == 0)
374 return;
375 memset(&vaddr, 0, sizeof(vaddr));
376
377 if (vhost_ip1 != NULL) {
17809d2d 378 if (rb_inet_pton_sock(vhost_ip1, &vaddr[0]) <= 0)
c6ad9b0c
SA
379 return;
380
381 if (vhost_ip2 != NULL) {
17809d2d 382 if (rb_inet_pton_sock(vhost_ip2, &vaddr[1]) <= 0)
c6ad9b0c
SA
383 return;
384 } else {
385 SET_SS_FAMILY(&vaddr[1], AF_UNSPEC);
386 SET_SS_LEN(&vaddr[1], sizeof(struct sockaddr_storage));
387 }
388
389 if (GET_SS_FAMILY(&vaddr[0]) == AF_INET && GET_SS_FAMILY(&vaddr[1]) == AF_INET6) {
390 /* always put INET6 first */
391 struct rb_sockaddr_storage tmp;
392 tmp = vaddr[0];
393 vaddr[0] = vaddr[1];
394 vaddr[1] = tmp;
395 }
396 } else {
397 memcpy(&((struct sockaddr_in6 *)&vaddr[0])->sin6_addr, &in6addr_any, sizeof(struct in6_addr));
398 SET_SS_FAMILY(&vaddr[0], AF_INET6);
399 SET_SS_LEN(&vaddr[0], sizeof(struct sockaddr_in6));
400
401 SET_SS_FAMILY(&vaddr[1], AF_UNSPEC);
402 SET_SS_LEN(&vaddr[1], sizeof(struct sockaddr_storage));
403 }
404
405 SET_SS_PORT(&vaddr[0], htons(port));
406 SET_SS_PORT(&vaddr[1], htons(port));
407
408 if ((listener = find_listener(vaddr, 1))) {
409 if(listener->F != NULL)
410 return;
411 } else {
412 listener = make_listener(vaddr);
e2ade304 413 rb_dlinkAdd(listener, &listener->lnode, &listener_list);
c6ad9b0c
SA
414 }
415
416 listener->F = NULL;
417 listener->ssl = ssl;
418 listener->defer_accept = 0;
419 listener->sctp = 1;
420 listener->wsock = wsock;
421
422 if (inetport(listener)) {
423 listener->active = 1;
424 } else {
425 close_listener(listener);
426 }
54ac8b60
VY
427}
428
429/*
430 * close_listener - close a single listener
431 */
432void
8f103562 433close_listener(struct Listener *listener)
54ac8b60
VY
434{
435 s_assert(listener != NULL);
436 if(listener == NULL)
437 return;
1087485c
JT
438 if(listener->F != NULL)
439 {
440 rb_close(listener->F);
441 listener->F = NULL;
54ac8b60
VY
442 }
443
444 listener->active = 0;
445
446 if(listener->ref_count)
447 return;
448
449 free_listener(listener);
450}
451
452/*
453 * close_listeners - close and free all listeners that are not being used
454 */
455void
e2ade304 456close_listeners(void)
54ac8b60 457{
e2ade304
AC
458 rb_dlink_node *n, *tn;
459
54ac8b60
VY
460 /*
461 * close all 'extra' listening ports we have
462 */
e2ade304 463 RB_DLINK_FOREACH_SAFE(n, tn, listener_list.head)
54ac8b60 464 {
e2ade304
AC
465 struct Listener *listener = n->data;
466
54ac8b60
VY
467 close_listener(listener);
468 }
e2ade304 469
0ab6dbbc 470 rb_close_pending_fds();
54ac8b60
VY
471}
472
54ac8b60 473/*
55abcbb2 474 * add_connection - creates a client which has just connected to us on
54ac8b60
VY
475 * the given fd. The sockhost field is initialized with the ip# of the host.
476 * The client is sent to the auth module for verification, and not put in
477 * any client list yet.
478 */
1087485c 479static void
b5b4a0e7 480add_connection(struct Listener *listener, rb_fde_t *F, struct sockaddr *sai, struct sockaddr *lai)
54ac8b60
VY
481{
482 struct Client *new_client;
762468f8 483 bool defer = false;
54ac8b60
VY
484 s_assert(NULL != listener);
485
55abcbb2 486 /*
54ac8b60
VY
487 * get the client socket name from the socket
488 * the client has already been checked out in accept_connection
489 */
490 new_client = make_client(NULL);
50b1e598
SA
491 new_client->localClient->F = F;
492
493 memcpy(&new_client->localClient->ip, sai, sizeof(struct rb_sockaddr_storage));
494 memcpy(&new_client->preClient->lip, lai, sizeof(struct rb_sockaddr_storage));
495
496 /*
497 * copy address to 'sockhost' as a string, copy it to host too
498 * so we have something valid to put into error messages...
499 */
500 rb_inet_ntop_sock((struct sockaddr *)&new_client->localClient->ip, new_client->sockhost,
501 sizeof(new_client->sockhost));
502
503 rb_strlcpy(new_client->host, new_client->sockhost, sizeof(new_client->host));
54ac8b60 504
c6ad9b0c
SA
505 if (listener->sctp) {
506 SetSCTP(new_client);
507 }
508
b5b4a0e7
AC
509 if (listener->ssl)
510 {
511 rb_fde_t *xF[2];
512 if(rb_socketpair(AF_UNIX, SOCK_STREAM, 0, &xF[0], &xF[1], "Incoming ssld Connection") == -1)
513 {
50b1e598
SA
514 SetIOError(new_client);
515 exit_client(new_client, new_client, new_client, "Fatal Error");
b5b4a0e7
AC
516 return;
517 }
762468f8
SA
518 new_client->localClient->ssl_callback = accept_sslcallback;
519 defer = true;
de7cf7e0 520 new_client->localClient->ssl_ctl = start_ssld_accept(F, xF[1], connid_get(new_client)); /* this will close F for us */
b5b4a0e7
AC
521 if(new_client->localClient->ssl_ctl == NULL)
522 {
50b1e598
SA
523 SetIOError(new_client);
524 exit_client(new_client, new_client, new_client, "Service Unavailable");
b5b4a0e7
AC
525 return;
526 }
527 F = xF[0];
50b1e598 528 new_client->localClient->F = F;
b5b4a0e7 529 SetSSL(new_client);
bbdc439a 530 SetSecure(new_client);
b5b4a0e7 531 }
1cf798be
EK
532 else
533 {
534 struct ConfItem *aconf;
535 aconf = find_conf_by_address(NULL, NULL, NULL, sai, CONF_SECURE | 1, sai->sa_family, NULL, NULL);
536
537 if (aconf != NULL)
538 SetSecure(new_client);
539 }
b5b4a0e7 540
c53ca1e0
AC
541 if (listener->wsock)
542 {
543 rb_fde_t *xF[2];
544 if(rb_socketpair(AF_UNIX, SOCK_STREAM, 0, &xF[0], &xF[1], "Incoming wsockd Connection") == -1)
545 {
50b1e598
SA
546 SetIOError(new_client);
547 exit_client(new_client, new_client, new_client, "Fatal Error");
c53ca1e0
AC
548 return;
549 }
550 new_client->localClient->ws_ctl = start_wsockd_accept(F, xF[1], connid_get(new_client)); /* this will close F for us */
551 if(new_client->localClient->ws_ctl == NULL)
552 {
50b1e598
SA
553 SetIOError(new_client);
554 exit_client(new_client, new_client, new_client, "Service Unavailable");
c53ca1e0
AC
555 return;
556 }
557 F = xF[0];
50b1e598 558 new_client->localClient->F = F;
c53ca1e0
AC
559 }
560
54ac8b60 561 new_client->localClient->listener = listener;
c6d72037 562
54ac8b60
VY
563 ++listener->ref_count;
564
762468f8
SA
565 authd_initiate_client(new_client, defer);
566}
567
568static int
569accept_sslcallback(struct Client *client_p, int status)
570{
571 authd_deferred_client(client_p);
572 return 0; /* use default handler if status != RB_OK */
54ac8b60 573}
0d89d5cd 574
43946961
JT
575static const char *toofast = "ERROR :Reconnecting too fast, throttled.\r\n";
576
1087485c
JT
577static int
578accept_precallback(rb_fde_t *F, struct sockaddr *addr, rb_socklen_t addrlen, void *data)
579{
580 struct Listener *listener = (struct Listener *)data;
581 char buf[BUFSIZE];
582 struct ConfItem *aconf;
583 static time_t last_oper_notice = 0;
b52c2949 584 int len;
1087485c 585
bfc44622 586 if(listener->ssl && (!ircd_ssl_ok || !get_ssld_count()))
8bd5767b
JT
587 {
588 rb_close(F);
589 return 0;
c6d72037
VY
590 }
591
1087485c
JT
592 if((maxconnections - 10) < rb_get_fd(F)) /* XXX this is kinda bogus */
593 {
47adde3d 594 ++ServerStats.is_ref;
1087485c
JT
595 /*
596 * slow down the whining to opers bit
597 */
598 if((last_oper_notice + 20) <= rb_current_time())
599 {
a9227555 600 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
1087485c
JT
601 "All connections in use. (%s)",
602 get_listener_name(listener));
603 last_oper_notice = rb_current_time();
604 }
55abcbb2 605
76d82c19 606 rb_write(F, "ERROR :All connections in use\r\n", 31);
1087485c 607 rb_close(F);
1087485c
JT
608 return 0;
609 }
610
41d7fefa 611 aconf = find_dline(addr, addr->sa_family);
1087485c
JT
612 if(aconf != NULL && (aconf->status & CONF_EXEMPTDLINE))
613 return 1;
55abcbb2 614
1087485c
JT
615 /* Do an initial check we aren't connecting too fast or with too many
616 * from this IP... */
617 if(aconf != NULL)
618 {
47adde3d 619 ServerStats.is_ref++;
55abcbb2 620
1087485c
JT
621 if(ConfigFileEntry.dline_with_reason)
622 {
5203cba5 623 len = snprintf(buf, sizeof(buf), "ERROR :*** Banned: %s\r\n", get_user_ban_reason(aconf));
b52c2949 624 if (len >= (int)(sizeof(buf)-1))
1087485c
JT
625 {
626 buf[sizeof(buf) - 3] = '\r';
627 buf[sizeof(buf) - 2] = '\n';
628 buf[sizeof(buf) - 1] = '\0';
629 }
630 }
631 else
632 strcpy(buf, "ERROR :You have been D-lined.\r\n");
55abcbb2 633
1087485c
JT
634 rb_write(F, buf, strlen(buf));
635 rb_close(F);
636 return 0;
637 }
638
8467fd9c
SA
639 if(check_reject(F, addr)) {
640 /* Reject the connection without closing the socket
641 * because it is now on the delay_exit list. */
43946961 642 return 0;
8467fd9c 643 }
55abcbb2 644
43946961
JT
645 if(throttle_add(addr))
646 {
647 rb_write(F, toofast, strlen(toofast));
648 rb_close(F);
649 return 0;
650 }
651
1087485c
JT
652 return 1;
653}
654
655static void
656accept_callback(rb_fde_t *F, int status, struct sockaddr *addr, rb_socklen_t addrlen, void *data)
657{
658 struct Listener *listener = data;
659 struct rb_sockaddr_storage lip;
660 unsigned int locallen = sizeof(struct rb_sockaddr_storage);
55abcbb2 661
47adde3d 662 ServerStats.is_ac++;
1087485c
JT
663
664 if(getsockname(rb_get_fd(F), (struct sockaddr *) &lip, &locallen) < 0)
665 {
d60a42a2 666 /* this can fail if the connection disappeared in the meantime */
1087485c 667 rb_close(F);
9692f954 668 return;
1087485c 669 }
55abcbb2 670
b5b4a0e7 671 add_connection(listener, F, addr, (struct sockaddr *)&lip);
0d89d5cd 672}