]> jfr.im git - solanum.git/blame - ircd/listener.c
sslproc: simplify ssl open callback
[solanum.git] / ircd / listener.c
CommitLineData
54ac8b60
VY
1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * listener.c: Listens on a port.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
54ac8b60
VY
23 */
24
25#include "stdinc.h"
26#include "setup.h"
27#include "listener.h"
28#include "client.h"
4562c604 29#include "match.h"
54ac8b60
VY
30#include "ircd.h"
31#include "ircd_defs.h"
32#include "numeric.h"
33#include "s_conf.h"
34#include "s_newconf.h"
35#include "s_stats.h"
36#include "send.h"
64fae260 37#include "authproc.h"
54ac8b60
VY
38#include "reject.h"
39#include "s_conf.h"
40#include "hostmask.h"
c6d72037 41#include "sslproc.h"
c53ca1e0 42#include "wsproc.h"
c6d72037 43#include "hash.h"
77d3d2db
KB
44#include "s_assert.h"
45#include "logger.h"
54ac8b60
VY
46
47#ifndef INADDR_NONE
48#define INADDR_NONE ((unsigned int) 0xffffffff)
49#endif
50
9ea3ea10 51#if defined(NO_IN6ADDR_ANY) && defined(RB_IPV6)
54ac8b60
VY
52static const struct in6_addr in6addr_any =
53{ { { 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 } } };
55abcbb2 54#endif
54ac8b60 55
8f103562 56static struct Listener *ListenerPollList = NULL;
1087485c 57static int accept_precallback(rb_fde_t *F, struct sockaddr *addr, rb_socklen_t addrlen, void *data);
8e09c4a2 58static void accept_callback(rb_fde_t *F, int status, struct sockaddr *addr, rb_socklen_t addrlen, void *data);
54ac8b60 59
8f103562 60static struct Listener *
e7046ee5 61make_listener(struct rb_sockaddr_storage *addr)
54ac8b60 62{
8f103562 63 struct Listener *listener = (struct Listener *) rb_malloc(sizeof(struct Listener));
54ac8b60 64 s_assert(0 != listener);
54ac8b60 65 listener->name = me.name;
f691939a
VY
66 listener->F = NULL;
67
e7046ee5 68 memcpy(&listener->addr, addr, sizeof(struct rb_sockaddr_storage));
54ac8b60
VY
69 listener->next = NULL;
70 return listener;
71}
72
73void
8f103562 74free_listener(struct Listener *listener)
54ac8b60
VY
75{
76 s_assert(NULL != listener);
77 if(listener == NULL)
78 return;
79 /*
80 * remove from listener list
81 */
82 if(listener == ListenerPollList)
83 ListenerPollList = listener->next;
84 else
85 {
8f103562 86 struct Listener *prev = ListenerPollList;
54ac8b60
VY
87 for (; prev; prev = prev->next)
88 {
89 if(listener == prev->next)
90 {
91 prev->next = listener->next;
92 break;
93 }
94 }
95 }
96
97 /* free */
98 rb_free(listener);
99}
100
101#define PORTNAMELEN 6 /* ":31337" */
102
40173bcb
JT
103/*
104 * get_listener_port - return displayable listener port
105 */
106static uint16_t
107get_listener_port(const struct Listener *listener)
108{
d86692fa 109 return ntohs(GET_SS_PORT(&listener->addr));
40173bcb
JT
110}
111
54ac8b60
VY
112/*
113 * get_listener_name - return displayable listener name and port
114 * returns "host.foo.org:6667" for a given listener
115 */
116const char *
8f103562 117get_listener_name(const struct Listener *listener)
54ac8b60
VY
118{
119 static char buf[HOSTLEN + HOSTLEN + PORTNAMELEN + 4];
54ac8b60
VY
120
121 s_assert(NULL != listener);
122 if(listener == NULL)
123 return NULL;
124
5203cba5 125 snprintf(buf, sizeof(buf), "%s[%s/%u]",
40173bcb 126 me.name, listener->name, get_listener_port(listener));
54ac8b60
VY
127 return buf;
128}
129
130/*
131 * show_ports - send port listing to a client
132 * inputs - pointer to client to show ports to
133 * output - none
134 * side effects - show ports
135 */
136void
137show_ports(struct Client *source_p)
138{
8f103562 139 struct Listener *listener = 0;
54ac8b60
VY
140
141 for (listener = ListenerPollList; listener; listener = listener->next)
142 {
55abcbb2 143 sendto_one_numeric(source_p, RPL_STATSPLINE,
40173bcb
JT
144 form_str(RPL_STATSPLINE), 'P',
145 get_listener_port(listener),
54ac8b60 146 IsOperAdmin(source_p) ? listener->name : me.name,
8bd5767b 147 listener->ref_count, (listener->active) ? "active" : "disabled",
c6d72037 148 listener->ssl ? " ssl" : "");
54ac8b60
VY
149 }
150}
151
152/*
153 * inetport - create a listener socket in the AF_INET or AF_INET6 domain,
154 * bind it to the port given in 'port' and listen to it
155 * returns true (1) if successful false (0) on error.
54ac8b60 156 */
54ac8b60
VY
157
158static int
8f103562 159inetport(struct Listener *listener)
54ac8b60 160{
f691939a 161 rb_fde_t *F;
54ac8b60 162 int opt = 1;
40173bcb 163 const char *errstr;
54ac8b60
VY
164
165 /*
166 * At first, open a new socket
167 */
55abcbb2 168
f691939a 169 F = rb_socket(GET_SS_FAMILY(&listener->addr), SOCK_STREAM, 0, "Listener socket");
54ac8b60 170
9ea3ea10 171#ifdef RB_IPV6
e867208d 172 if(GET_SS_FAMILY(&listener->addr) == AF_INET6)
54ac8b60
VY
173 {
174 struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)&listener->addr;
175 if(!IN6_ARE_ADDR_EQUAL(&in6->sin6_addr, &in6addr_any))
176 {
caa4d9d2 177 rb_inet_ntop(AF_INET6, &in6->sin6_addr, listener->vhost, sizeof(listener->vhost));
54ac8b60
VY
178 listener->name = listener->vhost;
179 }
180 } else
181#endif
182 {
183 struct sockaddr_in *in = (struct sockaddr_in *)&listener->addr;
184 if(in->sin_addr.s_addr != INADDR_ANY)
185 {
caa4d9d2 186 rb_inet_ntop(AF_INET, &in->sin_addr, listener->vhost, sizeof(listener->vhost));
54ac8b60 187 listener->name = listener->vhost;
55abcbb2 188 }
54ac8b60
VY
189 }
190
1087485c
JT
191 if(F == NULL)
192 {
40173bcb
JT
193 sendto_realops_snomask(SNO_GENERAL, L_ALL,
194 "Cannot open socket for listener on port %d",
195 get_listener_port(listener));
196 ilog(L_MAIN, "Cannot open socket for listener %s",
197 get_listener_name(listener));
1087485c
JT
198 return 0;
199 }
200 else if((maxconnections - 10) < rb_get_fd(F)) /* XXX this is kinda bogus*/
201 {
825ddf13 202 ilog_error("no more connections left for listener");
40173bcb
JT
203 sendto_realops_snomask(SNO_GENERAL, L_ALL,
204 "No more connections left for listener on port %d",
205 get_listener_port(listener));
206 ilog(L_MAIN, "No more connections left for listener %s",
207 get_listener_name(listener));
1087485c
JT
208 rb_close(F);
209 return 0;
54ac8b60
VY
210 }
211
1087485c
JT
212 /*
213 * XXX - we don't want to do all this crap for a listener
214 * set_sock_opts(listener);
bf3ecca2
EM
215 *
216 * FIXME - doesn't this belong in librb? --Elizafox
1087485c
JT
217 */
218 if(setsockopt(rb_get_fd(F), SOL_SOCKET, SO_REUSEADDR, (char *) &opt, sizeof(opt)))
219 {
40173bcb
JT
220 errstr = strerror(rb_get_sockerr(F));
221 sendto_realops_snomask(SNO_GENERAL, L_ALL,
222 "Cannot set SO_REUSEADDR for listener on port %d: %s",
223 get_listener_port(listener), errstr);
224 ilog(L_MAIN, "Cannot set SO_REUSEADDR for listener %s: %s",
225 get_listener_name(listener), errstr);
1087485c
JT
226 rb_close(F);
227 return 0;
54ac8b60
VY
228 }
229
bf3ecca2 230 /* FIXME - doesn't this belong in librb? --Elizafox */
1087485c
JT
231 if(bind(rb_get_fd(F), (struct sockaddr *) &listener->addr, GET_SS_LEN(&listener->addr)))
232 {
40173bcb
JT
233 errstr = strerror(rb_get_sockerr(F));
234 sendto_realops_snomask(SNO_GENERAL, L_ALL,
235 "Cannot bind for listener on port %d: %s",
236 get_listener_port(listener), errstr);
237 ilog(L_MAIN, "Cannot bind for listener %s: %s",
238 get_listener_name(listener), errstr);
1087485c
JT
239 rb_close(F);
240 return 0;
54ac8b60
VY
241 }
242
9057170c 243 if(rb_listen(F, SOMAXCONN, listener->defer_accept))
1087485c 244 {
40173bcb
JT
245 errstr = strerror(rb_get_sockerr(F));
246 sendto_realops_snomask(SNO_GENERAL, L_ALL,
247 "Cannot listen() for listener on port %d: %s",
248 get_listener_port(listener), errstr);
249 ilog(L_MAIN, "Cannot listen() for listener %s: %s",
250 get_listener_name(listener), errstr);
1087485c
JT
251 rb_close(F);
252 return 0;
54ac8b60
VY
253 }
254
1087485c
JT
255 listener->F = F;
256
f691939a 257 rb_accept_tcp(listener->F, accept_precallback, accept_callback, listener);
54ac8b60
VY
258 return 1;
259}
260
8f103562 261static struct Listener *
e7046ee5 262find_listener(struct rb_sockaddr_storage *addr)
54ac8b60 263{
8f103562
JT
264 struct Listener *listener = NULL;
265 struct Listener *last_closed = NULL;
54ac8b60
VY
266
267 for (listener = ListenerPollList; listener; listener = listener->next)
268 {
e867208d 269 if(GET_SS_FAMILY(addr) != GET_SS_FAMILY(&listener->addr))
54ac8b60 270 continue;
55abcbb2 271
a7fb2693 272 switch(GET_SS_FAMILY(addr))
54ac8b60
VY
273 {
274 case AF_INET:
275 {
276 struct sockaddr_in *in4 = (struct sockaddr_in *)addr;
277 struct sockaddr_in *lin4 = (struct sockaddr_in *)&listener->addr;
55abcbb2 278 if(in4->sin_addr.s_addr == lin4->sin_addr.s_addr &&
54ac8b60
VY
279 in4->sin_port == lin4->sin_port )
280 {
1087485c
JT
281 if(listener->F == NULL)
282 last_closed = listener;
283 else
54ac8b60
VY
284 return(listener);
285 }
286 break;
287 }
9ea3ea10 288#ifdef RB_IPV6
54ac8b60
VY
289 case AF_INET6:
290 {
291 struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)addr;
292 struct sockaddr_in6 *lin6 =(struct sockaddr_in6 *)&listener->addr;
293 if(IN6_ARE_ADDR_EQUAL(&in6->sin6_addr, &lin6->sin6_addr) &&
294 in6->sin6_port == lin6->sin6_port)
295 {
1087485c
JT
296 if(listener->F == NULL)
297 last_closed = listener;
298 else
54ac8b60
VY
299 return(listener);
300 }
301 break;
55abcbb2 302
54ac8b60
VY
303 }
304#endif
305
306 default:
307 break;
308 }
309 }
310 return last_closed;
311}
312
313
314/*
315 * add_listener- create a new listener
316 * port - the port number to listen on
317 * vhost_ip - if non-null must contain a valid IP address string in
318 * the format "255.255.255.255"
319 */
320void
c53ca1e0 321add_listener(int port, const char *vhost_ip, int family, int ssl, int defer_accept, int wsock)
54ac8b60 322{
8f103562 323 struct Listener *listener;
e7046ee5 324 struct rb_sockaddr_storage vaddr;
54ac8b60
VY
325
326 /*
327 * if no port in conf line, don't bother
328 */
329 if(port == 0)
330 return;
331 memset(&vaddr, 0, sizeof(vaddr));
e867208d 332 SET_SS_FAMILY(&vaddr, family);
54ac8b60
VY
333
334 if(vhost_ip != NULL)
335 {
336 if(family == AF_INET)
337 {
caa4d9d2 338 if(rb_inet_pton(family, vhost_ip, &((struct sockaddr_in *)&vaddr)->sin_addr) <= 0)
54ac8b60 339 return;
55abcbb2 340 }
9ea3ea10 341#ifdef RB_IPV6
54ac8b60
VY
342 else
343 {
caa4d9d2 344 if(rb_inet_pton(family, vhost_ip, &((struct sockaddr_in6 *)&vaddr)->sin6_addr) <= 0)
54ac8b60 345 return;
55abcbb2 346
54ac8b60
VY
347 }
348#endif
349 } else
350 {
351 switch(family)
352 {
353 case AF_INET:
354 ((struct sockaddr_in *)&vaddr)->sin_addr.s_addr = INADDR_ANY;
355 break;
9ea3ea10 356#ifdef RB_IPV6
54ac8b60
VY
357 case AF_INET6:
358 memcpy(&((struct sockaddr_in6 *)&vaddr)->sin6_addr, &in6addr_any, sizeof(struct in6_addr));
359 break;
360 default:
361 return;
362#endif
55abcbb2 363 }
54ac8b60
VY
364 }
365 switch(family)
366 {
367 case AF_INET:
99c4835f 368 SET_SS_LEN(&vaddr, sizeof(struct sockaddr_in));
d86692fa
EM
369 SET_SS_FAMILY(&vaddr, AF_INET);
370 SET_SS_PORT(&vaddr, htons(port));
54ac8b60 371 break;
9ea3ea10 372#ifdef RB_IPV6
54ac8b60 373 case AF_INET6:
99c4835f 374 SET_SS_LEN(&vaddr, sizeof(struct sockaddr_in6));
d86692fa
EM
375 SET_SS_FAMILY(&vaddr, AF_INET6);
376 SET_SS_PORT(&vaddr, htons(port));
54ac8b60
VY
377 break;
378#endif
379 default:
380 break;
381 }
382 if((listener = find_listener(&vaddr)))
383 {
1087485c 384 if(listener->F != NULL)
54ac8b60
VY
385 return;
386 }
387 else
388 {
389 listener = make_listener(&vaddr);
390 listener->next = ListenerPollList;
391 ListenerPollList = listener;
392 }
393
f691939a 394 listener->F = NULL;
c6d72037 395 listener->ssl = ssl;
02270e96 396 listener->defer_accept = defer_accept;
c53ca1e0 397 listener->wsock = wsock;
54ac8b60
VY
398
399 if(inetport(listener))
400 listener->active = 1;
401 else
402 close_listener(listener);
403}
404
405/*
406 * close_listener - close a single listener
407 */
408void
8f103562 409close_listener(struct Listener *listener)
54ac8b60
VY
410{
411 s_assert(listener != NULL);
412 if(listener == NULL)
413 return;
1087485c
JT
414 if(listener->F != NULL)
415 {
416 rb_close(listener->F);
417 listener->F = NULL;
54ac8b60
VY
418 }
419
420 listener->active = 0;
421
422 if(listener->ref_count)
423 return;
424
425 free_listener(listener);
426}
427
428/*
429 * close_listeners - close and free all listeners that are not being used
430 */
431void
432close_listeners()
433{
8f103562
JT
434 struct Listener *listener;
435 struct Listener *listener_next = 0;
54ac8b60
VY
436 /*
437 * close all 'extra' listening ports we have
438 */
439 for (listener = ListenerPollList; listener; listener = listener_next)
440 {
441 listener_next = listener->next;
442 close_listener(listener);
443 }
444}
445
446#define DLINE_WARNING "ERROR :You have been D-lined.\r\n"
447
448/*
55abcbb2 449 * add_connection - creates a client which has just connected to us on
54ac8b60
VY
450 * the given fd. The sockhost field is initialized with the ip# of the host.
451 * The client is sent to the auth module for verification, and not put in
452 * any client list yet.
453 */
1087485c 454static void
b5b4a0e7 455add_connection(struct Listener *listener, rb_fde_t *F, struct sockaddr *sai, struct sockaddr *lai)
54ac8b60
VY
456{
457 struct Client *new_client;
458 s_assert(NULL != listener);
459
55abcbb2 460 /*
54ac8b60
VY
461 * get the client socket name from the socket
462 * the client has already been checked out in accept_connection
463 */
464 new_client = make_client(NULL);
465
b5b4a0e7
AC
466 if (listener->ssl)
467 {
468 rb_fde_t *xF[2];
469 if(rb_socketpair(AF_UNIX, SOCK_STREAM, 0, &xF[0], &xF[1], "Incoming ssld Connection") == -1)
470 {
471 free_client(new_client);
472 return;
473 }
de7cf7e0 474 new_client->localClient->ssl_ctl = start_ssld_accept(F, xF[1], connid_get(new_client)); /* this will close F for us */
b5b4a0e7
AC
475 if(new_client->localClient->ssl_ctl == NULL)
476 {
477 free_client(new_client);
478 return;
479 }
480 F = xF[0];
481 SetSSL(new_client);
482 }
483
c53ca1e0
AC
484 if (listener->wsock)
485 {
486 rb_fde_t *xF[2];
487 if(rb_socketpair(AF_UNIX, SOCK_STREAM, 0, &xF[0], &xF[1], "Incoming wsockd Connection") == -1)
488 {
489 free_client(new_client);
490 return;
491 }
492 new_client->localClient->ws_ctl = start_wsockd_accept(F, xF[1], connid_get(new_client)); /* this will close F for us */
493 if(new_client->localClient->ws_ctl == NULL)
494 {
495 free_client(new_client);
496 return;
497 }
498 F = xF[0];
499 }
500
e7046ee5 501 memcpy(&new_client->localClient->ip, sai, sizeof(struct rb_sockaddr_storage));
3540120a 502 memcpy(&new_client->preClient->lip, lai, sizeof(struct rb_sockaddr_storage));
54ac8b60 503
55abcbb2 504 /*
54ac8b60
VY
505 * copy address to 'sockhost' as a string, copy it to host too
506 * so we have something valid to put into error messages...
507 */
55abcbb2 508 rb_inet_ntop_sock((struct sockaddr *)&new_client->localClient->ip, new_client->sockhost,
54ac8b60
VY
509 sizeof(new_client->sockhost));
510
511
f427c8b0 512 rb_strlcpy(new_client->host, new_client->sockhost, sizeof(new_client->host));
54ac8b60 513
99c4835f 514 new_client->localClient->F = F;
54ac8b60 515 new_client->localClient->listener = listener;
c6d72037 516
54ac8b60
VY
517 ++listener->ref_count;
518
d3f6b808 519 authd_initiate_client(new_client);
54ac8b60 520}
0d89d5cd 521
43946961
JT
522static const char *toofast = "ERROR :Reconnecting too fast, throttled.\r\n";
523
1087485c
JT
524static int
525accept_precallback(rb_fde_t *F, struct sockaddr *addr, rb_socklen_t addrlen, void *data)
526{
527 struct Listener *listener = (struct Listener *)data;
528 char buf[BUFSIZE];
529 struct ConfItem *aconf;
530 static time_t last_oper_notice = 0;
b52c2949 531 int len;
1087485c 532
bfc44622 533 if(listener->ssl && (!ircd_ssl_ok || !get_ssld_count()))
8bd5767b
JT
534 {
535 rb_close(F);
536 return 0;
c6d72037
VY
537 }
538
1087485c
JT
539 if((maxconnections - 10) < rb_get_fd(F)) /* XXX this is kinda bogus */
540 {
47adde3d 541 ++ServerStats.is_ref;
1087485c
JT
542 /*
543 * slow down the whining to opers bit
544 */
545 if((last_oper_notice + 20) <= rb_current_time())
546 {
26716d6d 547 sendto_realops_snomask(SNO_GENERAL, L_ALL,
1087485c
JT
548 "All connections in use. (%s)",
549 get_listener_name(listener));
550 last_oper_notice = rb_current_time();
551 }
55abcbb2 552
76d82c19 553 rb_write(F, "ERROR :All connections in use\r\n", 31);
1087485c 554 rb_close(F);
1087485c
JT
555 return 0;
556 }
557
41d7fefa 558 aconf = find_dline(addr, addr->sa_family);
1087485c
JT
559 if(aconf != NULL && (aconf->status & CONF_EXEMPTDLINE))
560 return 1;
55abcbb2 561
1087485c
JT
562 /* Do an initial check we aren't connecting too fast or with too many
563 * from this IP... */
564 if(aconf != NULL)
565 {
47adde3d 566 ServerStats.is_ref++;
55abcbb2 567
1087485c
JT
568 if(ConfigFileEntry.dline_with_reason)
569 {
5203cba5 570 len = snprintf(buf, sizeof(buf), "ERROR :*** Banned: %s\r\n", get_user_ban_reason(aconf));
b52c2949 571 if (len >= (int)(sizeof(buf)-1))
1087485c
JT
572 {
573 buf[sizeof(buf) - 3] = '\r';
574 buf[sizeof(buf) - 2] = '\n';
575 buf[sizeof(buf) - 1] = '\0';
576 }
577 }
578 else
579 strcpy(buf, "ERROR :You have been D-lined.\r\n");
55abcbb2 580
1087485c
JT
581 rb_write(F, buf, strlen(buf));
582 rb_close(F);
583 return 0;
584 }
585
43946961
JT
586 if(check_reject(F, addr))
587 return 0;
55abcbb2 588
43946961
JT
589 if(throttle_add(addr))
590 {
591 rb_write(F, toofast, strlen(toofast));
592 rb_close(F);
593 return 0;
594 }
595
1087485c
JT
596 return 1;
597}
598
599static void
600accept_callback(rb_fde_t *F, int status, struct sockaddr *addr, rb_socklen_t addrlen, void *data)
601{
602 struct Listener *listener = data;
603 struct rb_sockaddr_storage lip;
604 unsigned int locallen = sizeof(struct rb_sockaddr_storage);
55abcbb2 605
47adde3d 606 ServerStats.is_ac++;
1087485c
JT
607
608 if(getsockname(rb_get_fd(F), (struct sockaddr *) &lip, &locallen) < 0)
609 {
d60a42a2 610 /* this can fail if the connection disappeared in the meantime */
1087485c 611 rb_close(F);
9692f954 612 return;
1087485c 613 }
55abcbb2 614
b5b4a0e7 615 add_connection(listener, F, addr, (struct sockaddr *)&lip);
0d89d5cd 616}