]> jfr.im git - solanum.git/blame - modules/m_dline.c
add separate priv (oper:message) for walking over CALLERID (umode +g) (#152)
[solanum.git] / modules / m_dline.c
CommitLineData
212380e3
AC
1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * m_dline.c: Bans/unbans a user.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
212380e3
AC
23 */
24
25#include "stdinc.h"
212380e3
AC
26#include "channel.h"
27#include "class.h"
28#include "client.h"
4562c604 29#include "match.h"
212380e3
AC
30#include "ircd.h"
31#include "hostmask.h"
32#include "numeric.h"
212380e3
AC
33#include "s_conf.h"
34#include "s_newconf.h"
4016731b 35#include "logger.h"
212380e3
AC
36#include "send.h"
37#include "hash.h"
38#include "s_serv.h"
39#include "msg.h"
40#include "parse.h"
41#include "modules.h"
8bbeb278 42#include "bandbi.h"
27f616dd 43#include "operhash.h"
212380e3 44
eeabf33a
EM
45static const char dline_desc[] = "Provides the DLINE facility to ban users via IP address";
46
3c7d6fcc
EM
47static void mo_dline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
48static void me_dline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
49static void mo_undline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
50static void me_undline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
212380e3
AC
51
52struct Message dline_msgtab = {
7baa37a9 53 "DLINE", 0, 0, 0, 0,
b647efa0 54 {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, {me_dline, 4}, {mo_dline, 2}}
212380e3 55};
8bbeb278 56
212380e3 57struct Message undline_msgtab = {
7baa37a9 58 "UNDLINE", 0, 0, 0, 0,
b647efa0 59 {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, {me_undline, 2}, {mo_undline, 2}}
212380e3
AC
60};
61
62mapi_clist_av1 dline_clist[] = { &dline_msgtab, &undline_msgtab, NULL };
8bbeb278 63
9fd8e7cb 64DECLARE_MODULE_AV2(dline, NULL, NULL, dline_clist, NULL, NULL, NULL, NULL, dline_desc);
212380e3 65
3c7d6fcc
EM
66static bool remove_temp_dline(struct ConfItem *);
67static void apply_dline(struct Client *, const char *, int, char *);
68static void apply_undline(struct Client *, const char *);
212380e3
AC
69
70/* mo_dline()
55abcbb2 71 *
212380e3
AC
72 * parv[1] - dline to add
73 * parv[2] - reason
74 */
3c7d6fcc 75static void
428ca87b 76mo_dline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
77{
78 char def[] = "No Reason";
79 const char *dlhost;
212380e3 80 char *reason = def;
212380e3 81 int tdline_time = 0;
f5cb68d5 82 const char *target_server = NULL;
212380e3
AC
83 int loc = 1;
84
85 if(!IsOperK(source_p))
86 {
8bbeb278 87 sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "kline");
3c7d6fcc 88 return;
212380e3
AC
89 }
90
91 if((tdline_time = valid_temp_time(parv[loc])) >= 0)
92 loc++;
93
a77ebe1e
EK
94 if (loc >= parc)
95 {
96 sendto_one_notice(source_p, ":Need an IP to D-Line");
97 return;
98 }
99
212380e3 100 dlhost = parv[loc];
f5cb68d5
VY
101 loc++;
102
2b843a5b
JT
103 /* would break the protocol */
104 if (*dlhost == ':')
105 {
72464c6a 106 sendto_one_notice(source_p, ":Invalid D-Line [%s] - IP cannot start with :", dlhost);
3c7d6fcc 107 return;
2b843a5b
JT
108 }
109
bf493a34
EK
110 int ty = parse_netmask_strict(dlhost, NULL, NULL);
111 if (ty != HM_IPV4 && ty != HM_IPV6)
112 {
72464c6a 113 sendto_one_notice(source_p, ":Invalid D-Line [%s] - doesn't look like IP[/cidr]", dlhost);
bf493a34
EK
114 return;
115 }
116
8bbeb278
AC
117 if(parc >= loc + 2 && !irccmp(parv[loc], "ON"))
118 {
2cfb7214
JT
119 if(!IsOperRemoteBan(source_p))
120 {
121 sendto_one(source_p, form_str(ERR_NOPRIVS),
8bbeb278 122 me.name, source_p->name, "remoteban");
3c7d6fcc 123 return;
2cfb7214
JT
124 }
125
8bbeb278 126 target_server = parv[loc + 1];
f5cb68d5
VY
127 loc += 2;
128 }
129
130 if(parc >= loc + 1 && !EmptyString(parv[loc]))
131 reason = LOCAL_COPY(parv[loc]);
132
133 if(target_server != NULL)
212380e3 134 {
f5cb68d5 135 sendto_match_servs(source_p, target_server,
8bbeb278
AC
136 CAP_ENCAP, NOCAPS,
137 "ENCAP %s DLINE %d %s :%s",
138 target_server, tdline_time, dlhost, reason);
f5cb68d5
VY
139
140 if(!match(target_server, me.name))
3c7d6fcc 141 return;
212380e3
AC
142 }
143
f5cb68d5
VY
144 apply_dline(source_p, dlhost, tdline_time, reason);
145
146 check_dlines();
f5cb68d5 147}
212380e3 148
f5cb68d5
VY
149/* mo_undline()
150 *
151 * parv[1] = dline to remove
152 */
3c7d6fcc 153static void
428ca87b 154mo_undline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
f5cb68d5
VY
155{
156 const char *cidr;
157 const char *target_server = NULL;
158
159 if(!IsOperK(source_p))
160 {
8bbeb278 161 sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "unkline");
3c7d6fcc 162 return;
8bbeb278
AC
163 }
164
f5cb68d5
VY
165 cidr = parv[1];
166
167 if(parc >= 4 && !irccmp(parv[2], "ON"))
212380e3 168 {
2cfb7214
JT
169 if(!IsOperRemoteBan(source_p))
170 {
171 sendto_one(source_p, form_str(ERR_NOPRIVS),
8bbeb278 172 me.name, source_p->name, "remoteban");
3c7d6fcc 173 return;
2cfb7214
JT
174 }
175
f5cb68d5
VY
176 target_server = parv[3];
177 sendto_match_servs(source_p, target_server,
8bbeb278 178 CAP_ENCAP, NOCAPS, "ENCAP %s UNDLINE %s", target_server, cidr);
212380e3 179
f5cb68d5 180 if(!match(target_server, me.name))
3c7d6fcc 181 return;
212380e3
AC
182 }
183
f5cb68d5 184 apply_undline(source_p, cidr);
f5cb68d5
VY
185}
186
3c7d6fcc 187static void
428ca87b 188me_dline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char **parv)
5f7a6a3d
JT
189{
190 int tdline_time = atoi(parv[1]);
191 /* Since this is coming over a server link, assume that the originating
192 * server did the relevant permission/sanity checks...
193 */
194
195 if(!IsPerson(source_p))
3c7d6fcc 196 return;
5f7a6a3d 197
5f7a6a3d
JT
198 apply_dline(source_p, parv[2], tdline_time, LOCAL_COPY(parv[3]));
199
200 check_dlines();
5f7a6a3d
JT
201}
202
3c7d6fcc 203static void
428ca87b 204me_undline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char **parv)
5f7a6a3d
JT
205{
206 if(!IsPerson(source_p))
3c7d6fcc 207 return;
5f7a6a3d 208
5f7a6a3d 209 apply_undline(source_p, parv[1]);
f5cb68d5
VY
210}
211
3c7d6fcc 212static void
f5cb68d5
VY
213apply_dline(struct Client *source_p, const char *dlhost, int tdline_time, char *reason)
214{
215 struct ConfItem *aconf;
216 char *oper_reason;
f5cb68d5
VY
217 struct rb_sockaddr_storage daddr;
218 int t = AF_INET, ty, b;
219 const char *creason;
220
7d9e8e9d
EK
221 ty = parse_netmask_strict(dlhost, &daddr, &b);
222 if(ty != HM_IPV4 && ty != HM_IPV6)
f5cb68d5 223 {
8bbeb278 224 sendto_one(source_p, ":%s NOTICE %s :Invalid D-Line", me.name, source_p->name);
3c7d6fcc 225 return;
f5cb68d5 226 }
f5cb68d5
VY
227 if(ty == HM_IPV6)
228 t = AF_INET6;
229 else
f5cb68d5
VY
230 t = AF_INET;
231
232 /* This means dlines wider than /16 cannot be set remotely */
212380e3
AC
233 if(IsOperAdmin(source_p))
234 {
f5cb68d5 235 if(b < 8)
212380e3 236 {
f5cb68d5 237 sendto_one_notice(source_p,
8bbeb278 238 ":For safety, bitmasks less than 8 require conf access.");
3c7d6fcc 239 return;
212380e3
AC
240 }
241 }
242 else
243 {
f5cb68d5 244 if(b < 16)
212380e3 245 {
f5cb68d5 246 sendto_one_notice(source_p,
8bbeb278 247 ":Dline bitmasks less than 16 are for admins only.");
3c7d6fcc 248 return;
212380e3
AC
249 }
250 }
251
54ac8b60
VY
252 if(ConfigFileEntry.non_redundant_klines)
253 {
8bbeb278 254 if((aconf = find_dline((struct sockaddr *) &daddr, t)) != NULL)
54ac8b60
VY
255 {
256 int bx;
7d9e8e9d
EK
257 int masktype = parse_netmask_strict(aconf->host, NULL, &bx);
258
259 if (masktype != HM_ERROR && b >= bx)
54ac8b60
VY
260 {
261 creason = aconf->passwd ? aconf->passwd : "<No Reason>";
262 if(IsConfExemptKline(aconf))
263 sendto_one(source_p,
264 ":%s NOTICE %s :[%s] is (E)d-lined by [%s] - %s",
8bbeb278
AC
265 me.name, source_p->name, dlhost, aconf->host,
266 creason);
54ac8b60
VY
267 else
268 sendto_one(source_p,
269 ":%s NOTICE %s :[%s] already D-lined by [%s] - %s",
8bbeb278
AC
270 me.name, source_p->name, dlhost, aconf->host,
271 creason);
3c7d6fcc 272 return;
54ac8b60
VY
273 }
274 }
212380e3
AC
275 }
276
7df5fcfb 277 rb_set_time();
212380e3
AC
278
279 aconf = make_conf();
280 aconf->status = CONF_DLINE;
b52c2949 281 aconf->created = rb_current_time();
47a03750 282 aconf->host = rb_strdup(dlhost);
a12ad044 283 aconf->passwd = rb_strdup(reason);
27f616dd 284 aconf->info.oper = operhash_add(get_oper_name(source_p));
212380e3 285
9319a2e2
KB
286 if(strlen(reason) > BANREASONLEN)
287 reason[BANREASONLEN] = '\0';
288
08e8aa7a
VY
289 /* Look for an oper reason */
290 if((oper_reason = strchr(reason, '|')) != NULL)
291 {
292 *oper_reason = '\0';
293 oper_reason++;
294
295 if(!EmptyString(oper_reason))
296 aconf->spasswd = rb_strdup(oper_reason);
297 }
298
212380e3
AC
299 if(tdline_time > 0)
300 {
e3354945 301 aconf->hold = rb_current_time() + tdline_time;
212380e3
AC
302 add_temp_dline(aconf);
303
304 if(EmptyString(oper_reason))
305 {
a9227555 306 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
8bbeb278
AC
307 "%s added temporary %d min. D-Line for [%s] [%s]",
308 get_oper_name(source_p), tdline_time / 60,
309 aconf->host, reason);
212380e3 310 ilog(L_KLINE, "D %s %d %s %s",
8bbeb278 311 get_oper_name(source_p), tdline_time / 60, aconf->host, reason);
212380e3
AC
312 }
313 else
314 {
a9227555 315 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
8bbeb278
AC
316 "%s added temporary %d min. D-Line for [%s] [%s|%s]",
317 get_oper_name(source_p), tdline_time / 60,
318 aconf->host, reason, oper_reason);
212380e3 319 ilog(L_KLINE, "D %s %d %s %s|%s",
8bbeb278
AC
320 get_oper_name(source_p), tdline_time / 60,
321 aconf->host, reason, oper_reason);
212380e3
AC
322 }
323
324 sendto_one(source_p, ":%s NOTICE %s :Added temporary %d min. D-Line for [%s]",
325 me.name, source_p->name, tdline_time / 60, aconf->host);
326 }
327 else
328 {
40c1fd47 329 add_conf_by_address(aconf->host, CONF_DLINE, NULL, NULL, aconf);
8bbeb278
AC
330
331 bandb_add(BANDB_DLINE, source_p, aconf->host, NULL,
332 reason, EmptyString(aconf->spasswd) ? NULL : aconf->spasswd, 0);
9964e935
AC
333
334 if(EmptyString(oper_reason))
335 {
a9227555 336 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
9964e935
AC
337 "%s added D-Line for [%s] [%s]",
338 get_oper_name(source_p), aconf->host, reason);
339 ilog(L_KLINE, "D %s 0 %s %s",
340 get_oper_name(source_p), aconf->host, reason);
341 }
342 else
343 {
a9227555 344 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
9964e935
AC
345 "%s added D-Line for [%s] [%s|%s]",
346 get_oper_name(source_p), aconf->host, reason, oper_reason);
347 ilog(L_KLINE, "D %s 0 %s %s|%s",
348 get_oper_name(source_p),
349 aconf->host, reason, oper_reason);
350 }
212380e3 351 }
212380e3
AC
352}
353
3c7d6fcc 354static void
f5cb68d5 355apply_undline(struct Client *source_p, const char *cidr)
212380e3 356{
8bbeb278 357 char buf[BUFSIZE];
f5cb68d5 358 struct ConfItem *aconf;
212380e3 359
cf0aa421 360 int masktype = parse_netmask(cidr, NULL, NULL);
7d9e8e9d
EK
361
362 if(masktype != HM_IPV4 && masktype != HM_IPV6)
212380e3 363 {
72464c6a 364 sendto_one_notice(source_p, ":Invalid D-Line [%s] - doesn't look like IP[/cidr]", cidr);
3c7d6fcc 365 return;
212380e3
AC
366 }
367
6f3a09ff
JT
368 aconf = find_exact_conf_by_address(cidr, CONF_DLINE, NULL);
369 if(aconf == NULL)
370 {
371 sendto_one_notice(source_p, ":No D-Line for %s", cidr);
3c7d6fcc 372 return;
6f3a09ff
JT
373 }
374
f427c8b0 375 rb_strlcpy(buf, aconf->host, sizeof buf);
6f3a09ff 376 if(remove_temp_dline(aconf))
212380e3
AC
377 {
378 sendto_one(source_p,
379 ":%s NOTICE %s :Un-dlined [%s] from temporary D-lines",
f5cb68d5 380 me.name, source_p->name, buf);
a9227555 381 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
8bbeb278
AC
382 "%s has removed the temporary D-Line for: [%s]",
383 get_oper_name(source_p), buf);
6f3a09ff 384 ilog(L_KLINE, "UD %s %s", get_oper_name(source_p), buf);
3c7d6fcc 385 return;
212380e3
AC
386 }
387
8bbeb278 388 bandb_del(BANDB_DLINE, aconf->host, NULL);
212380e3 389
8bbeb278
AC
390 sendto_one(source_p, ":%s NOTICE %s :D-Line for [%s] is removed", me.name, source_p->name,
391 aconf->host);
a9227555 392 sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "%s has removed the D-Line for: [%s]",
8bbeb278 393 get_oper_name(source_p), aconf->host);
37f6cc05
JT
394 ilog(L_KLINE, "UD %s %s", get_oper_name(source_p), aconf->host);
395 delete_one_address_conf(aconf->host, aconf);
212380e3
AC
396}
397
212380e3
AC
398/* remove_temp_dline()
399 *
6f3a09ff 400 * inputs - confitem to undline
3c7d6fcc 401 * outputs - true if removed, false otherwise.
212380e3
AC
402 * side effects - tries to undline anything that matches
403 */
3c7d6fcc 404static bool
6f3a09ff 405remove_temp_dline(struct ConfItem *aconf)
212380e3 406{
5b96d9a6 407 rb_dlink_node *ptr;
212380e3
AC
408 int i;
409
8bbeb278 410 for(i = 0; i < LAST_TEMP_TYPE; i++)
212380e3 411 {
5b96d9a6 412 RB_DLINK_FOREACH(ptr, temp_dlines[i].head)
212380e3 413 {
8bbeb278 414 if(aconf == ptr->data)
212380e3 415 {
555ac41f 416 rb_dlinkDestroy(ptr, &temp_dlines[i]);
212380e3 417 delete_one_address_conf(aconf->host, aconf);
3c7d6fcc 418 return true;
212380e3
AC
419 }
420 }
421 }
422
3c7d6fcc 423 return false;
212380e3 424}