]>
Commit | Line | Data |
---|---|---|
212380e3 AC |
1 | /* |
2 | * ircd-ratbox: A slightly useful ircd. | |
3 | * m_dline.c: Bans/unbans a user. | |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
7 | * Copyright (C) 2002-2005 ircd-ratbox development team | |
8 | * | |
9 | * This program is free software; you can redistribute it and/or modify | |
10 | * it under the terms of the GNU General Public License as published by | |
11 | * the Free Software Foundation; either version 2 of the License, or | |
12 | * (at your option) any later version. | |
13 | * | |
14 | * This program is distributed in the hope that it will be useful, | |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
17 | * GNU General Public License for more details. | |
18 | * | |
19 | * You should have received a copy of the GNU General Public License | |
20 | * along with this program; if not, write to the Free Software | |
21 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
22 | * USA | |
212380e3 AC |
23 | */ |
24 | ||
25 | #include "stdinc.h" | |
212380e3 AC |
26 | #include "channel.h" |
27 | #include "class.h" | |
28 | #include "client.h" | |
4562c604 | 29 | #include "match.h" |
212380e3 AC |
30 | #include "ircd.h" |
31 | #include "hostmask.h" | |
32 | #include "numeric.h" | |
212380e3 AC |
33 | #include "s_conf.h" |
34 | #include "s_newconf.h" | |
4016731b | 35 | #include "logger.h" |
212380e3 AC |
36 | #include "send.h" |
37 | #include "hash.h" | |
38 | #include "s_serv.h" | |
39 | #include "msg.h" | |
40 | #include "parse.h" | |
41 | #include "modules.h" | |
8bbeb278 | 42 | #include "bandbi.h" |
27f616dd | 43 | #include "operhash.h" |
212380e3 | 44 | |
eeabf33a EM |
45 | static const char dline_desc[] = "Provides the DLINE facility to ban users via IP address"; |
46 | ||
3c7d6fcc EM |
47 | static void mo_dline(struct MsgBuf *, struct Client *, struct Client *, int, const char **); |
48 | static void me_dline(struct MsgBuf *, struct Client *, struct Client *, int, const char **); | |
49 | static void mo_undline(struct MsgBuf *, struct Client *, struct Client *, int, const char **); | |
50 | static void me_undline(struct MsgBuf *, struct Client *, struct Client *, int, const char **); | |
212380e3 AC |
51 | |
52 | struct Message dline_msgtab = { | |
7baa37a9 | 53 | "DLINE", 0, 0, 0, 0, |
b647efa0 | 54 | {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, {me_dline, 4}, {mo_dline, 2}} |
212380e3 | 55 | }; |
8bbeb278 | 56 | |
212380e3 | 57 | struct Message undline_msgtab = { |
7baa37a9 | 58 | "UNDLINE", 0, 0, 0, 0, |
b647efa0 | 59 | {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, {me_undline, 2}, {mo_undline, 2}} |
212380e3 AC |
60 | }; |
61 | ||
62 | mapi_clist_av1 dline_clist[] = { &dline_msgtab, &undline_msgtab, NULL }; | |
8bbeb278 | 63 | |
9fd8e7cb | 64 | DECLARE_MODULE_AV2(dline, NULL, NULL, dline_clist, NULL, NULL, NULL, NULL, dline_desc); |
212380e3 | 65 | |
3c7d6fcc EM |
66 | static bool remove_temp_dline(struct ConfItem *); |
67 | static void apply_dline(struct Client *, const char *, int, char *); | |
68 | static void apply_undline(struct Client *, const char *); | |
212380e3 AC |
69 | |
70 | /* mo_dline() | |
55abcbb2 | 71 | * |
212380e3 AC |
72 | * parv[1] - dline to add |
73 | * parv[2] - reason | |
74 | */ | |
3c7d6fcc | 75 | static void |
428ca87b | 76 | mo_dline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
212380e3 AC |
77 | { |
78 | char def[] = "No Reason"; | |
79 | const char *dlhost; | |
212380e3 | 80 | char *reason = def; |
212380e3 | 81 | char cidr_form_host[HOSTLEN + 1]; |
212380e3 | 82 | int tdline_time = 0; |
f5cb68d5 | 83 | const char *target_server = NULL; |
212380e3 AC |
84 | int loc = 1; |
85 | ||
86 | if(!IsOperK(source_p)) | |
87 | { | |
8bbeb278 | 88 | sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "kline"); |
3c7d6fcc | 89 | return; |
212380e3 AC |
90 | } |
91 | ||
92 | if((tdline_time = valid_temp_time(parv[loc])) >= 0) | |
93 | loc++; | |
94 | ||
212380e3 | 95 | dlhost = parv[loc]; |
f427c8b0 | 96 | rb_strlcpy(cidr_form_host, dlhost, sizeof(cidr_form_host)); |
f5cb68d5 VY |
97 | loc++; |
98 | ||
2b843a5b JT |
99 | /* would break the protocol */ |
100 | if (*dlhost == ':') | |
101 | { | |
102 | sendto_one_notice(source_p, ":Invalid D-Line"); | |
3c7d6fcc | 103 | return; |
2b843a5b JT |
104 | } |
105 | ||
bf493a34 EK |
106 | int ty = parse_netmask_strict(dlhost, NULL, NULL); |
107 | if (ty != HM_IPV4 && ty != HM_IPV6) | |
108 | { | |
109 | sendto_one_notice(source_p, ":Invalid D-Line"); | |
110 | return; | |
111 | } | |
112 | ||
8bbeb278 AC |
113 | if(parc >= loc + 2 && !irccmp(parv[loc], "ON")) |
114 | { | |
2cfb7214 JT |
115 | if(!IsOperRemoteBan(source_p)) |
116 | { | |
117 | sendto_one(source_p, form_str(ERR_NOPRIVS), | |
8bbeb278 | 118 | me.name, source_p->name, "remoteban"); |
3c7d6fcc | 119 | return; |
2cfb7214 JT |
120 | } |
121 | ||
8bbeb278 | 122 | target_server = parv[loc + 1]; |
f5cb68d5 VY |
123 | loc += 2; |
124 | } | |
125 | ||
126 | if(parc >= loc + 1 && !EmptyString(parv[loc])) | |
127 | reason = LOCAL_COPY(parv[loc]); | |
128 | ||
129 | if(target_server != NULL) | |
212380e3 | 130 | { |
f5cb68d5 | 131 | sendto_match_servs(source_p, target_server, |
8bbeb278 AC |
132 | CAP_ENCAP, NOCAPS, |
133 | "ENCAP %s DLINE %d %s :%s", | |
134 | target_server, tdline_time, dlhost, reason); | |
f5cb68d5 VY |
135 | |
136 | if(!match(target_server, me.name)) | |
3c7d6fcc | 137 | return; |
212380e3 AC |
138 | } |
139 | ||
f5cb68d5 VY |
140 | apply_dline(source_p, dlhost, tdline_time, reason); |
141 | ||
142 | check_dlines(); | |
f5cb68d5 | 143 | } |
212380e3 | 144 | |
f5cb68d5 VY |
145 | /* mo_undline() |
146 | * | |
147 | * parv[1] = dline to remove | |
148 | */ | |
3c7d6fcc | 149 | static void |
428ca87b | 150 | mo_undline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
f5cb68d5 VY |
151 | { |
152 | const char *cidr; | |
153 | const char *target_server = NULL; | |
154 | ||
155 | if(!IsOperK(source_p)) | |
156 | { | |
8bbeb278 | 157 | sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "unkline"); |
3c7d6fcc | 158 | return; |
8bbeb278 AC |
159 | } |
160 | ||
f5cb68d5 VY |
161 | cidr = parv[1]; |
162 | ||
163 | if(parc >= 4 && !irccmp(parv[2], "ON")) | |
212380e3 | 164 | { |
2cfb7214 JT |
165 | if(!IsOperRemoteBan(source_p)) |
166 | { | |
167 | sendto_one(source_p, form_str(ERR_NOPRIVS), | |
8bbeb278 | 168 | me.name, source_p->name, "remoteban"); |
3c7d6fcc | 169 | return; |
2cfb7214 JT |
170 | } |
171 | ||
f5cb68d5 VY |
172 | target_server = parv[3]; |
173 | sendto_match_servs(source_p, target_server, | |
8bbeb278 | 174 | CAP_ENCAP, NOCAPS, "ENCAP %s UNDLINE %s", target_server, cidr); |
212380e3 | 175 | |
f5cb68d5 | 176 | if(!match(target_server, me.name)) |
3c7d6fcc | 177 | return; |
212380e3 AC |
178 | } |
179 | ||
f5cb68d5 | 180 | apply_undline(source_p, cidr); |
f5cb68d5 VY |
181 | } |
182 | ||
3c7d6fcc | 183 | static void |
428ca87b | 184 | me_dline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char **parv) |
5f7a6a3d JT |
185 | { |
186 | int tdline_time = atoi(parv[1]); | |
187 | /* Since this is coming over a server link, assume that the originating | |
188 | * server did the relevant permission/sanity checks... | |
189 | */ | |
190 | ||
191 | if(!IsPerson(source_p)) | |
3c7d6fcc | 192 | return; |
5f7a6a3d JT |
193 | |
194 | if(!find_shared_conf(source_p->username, source_p->host, | |
8bbeb278 AC |
195 | source_p->servptr->name, |
196 | tdline_time > 0 ? SHARED_TDLINE : SHARED_PDLINE)) | |
3c7d6fcc | 197 | return; |
5f7a6a3d JT |
198 | |
199 | apply_dline(source_p, parv[2], tdline_time, LOCAL_COPY(parv[3])); | |
200 | ||
201 | check_dlines(); | |
5f7a6a3d JT |
202 | } |
203 | ||
3c7d6fcc | 204 | static void |
428ca87b | 205 | me_undline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char **parv) |
5f7a6a3d JT |
206 | { |
207 | if(!IsPerson(source_p)) | |
3c7d6fcc | 208 | return; |
5f7a6a3d JT |
209 | |
210 | if(!find_shared_conf(source_p->username, source_p->host, | |
8bbeb278 | 211 | source_p->servptr->name, SHARED_UNDLINE)) |
3c7d6fcc | 212 | return; |
5f7a6a3d JT |
213 | |
214 | apply_undline(source_p, parv[1]); | |
f5cb68d5 VY |
215 | } |
216 | ||
3c7d6fcc | 217 | static void |
f5cb68d5 VY |
218 | apply_dline(struct Client *source_p, const char *dlhost, int tdline_time, char *reason) |
219 | { | |
220 | struct ConfItem *aconf; | |
221 | char *oper_reason; | |
f5cb68d5 VY |
222 | struct rb_sockaddr_storage daddr; |
223 | int t = AF_INET, ty, b; | |
224 | const char *creason; | |
225 | ||
7d9e8e9d EK |
226 | ty = parse_netmask_strict(dlhost, &daddr, &b); |
227 | if(ty != HM_IPV4 && ty != HM_IPV6) | |
f5cb68d5 | 228 | { |
8bbeb278 | 229 | sendto_one(source_p, ":%s NOTICE %s :Invalid D-Line", me.name, source_p->name); |
3c7d6fcc | 230 | return; |
f5cb68d5 | 231 | } |
f5cb68d5 VY |
232 | if(ty == HM_IPV6) |
233 | t = AF_INET6; | |
234 | else | |
f5cb68d5 VY |
235 | t = AF_INET; |
236 | ||
237 | /* This means dlines wider than /16 cannot be set remotely */ | |
212380e3 AC |
238 | if(IsOperAdmin(source_p)) |
239 | { | |
f5cb68d5 | 240 | if(b < 8) |
212380e3 | 241 | { |
f5cb68d5 | 242 | sendto_one_notice(source_p, |
8bbeb278 | 243 | ":For safety, bitmasks less than 8 require conf access."); |
3c7d6fcc | 244 | return; |
212380e3 AC |
245 | } |
246 | } | |
247 | else | |
248 | { | |
f5cb68d5 | 249 | if(b < 16) |
212380e3 | 250 | { |
f5cb68d5 | 251 | sendto_one_notice(source_p, |
8bbeb278 | 252 | ":Dline bitmasks less than 16 are for admins only."); |
3c7d6fcc | 253 | return; |
212380e3 AC |
254 | } |
255 | } | |
256 | ||
54ac8b60 VY |
257 | if(ConfigFileEntry.non_redundant_klines) |
258 | { | |
8bbeb278 | 259 | if((aconf = find_dline((struct sockaddr *) &daddr, t)) != NULL) |
54ac8b60 VY |
260 | { |
261 | int bx; | |
7d9e8e9d EK |
262 | int masktype = parse_netmask_strict(aconf->host, NULL, &bx); |
263 | ||
264 | if (masktype != HM_ERROR && b >= bx) | |
54ac8b60 VY |
265 | { |
266 | creason = aconf->passwd ? aconf->passwd : "<No Reason>"; | |
267 | if(IsConfExemptKline(aconf)) | |
268 | sendto_one(source_p, | |
269 | ":%s NOTICE %s :[%s] is (E)d-lined by [%s] - %s", | |
8bbeb278 AC |
270 | me.name, source_p->name, dlhost, aconf->host, |
271 | creason); | |
54ac8b60 VY |
272 | else |
273 | sendto_one(source_p, | |
274 | ":%s NOTICE %s :[%s] already D-lined by [%s] - %s", | |
8bbeb278 AC |
275 | me.name, source_p->name, dlhost, aconf->host, |
276 | creason); | |
3c7d6fcc | 277 | return; |
54ac8b60 VY |
278 | } |
279 | } | |
212380e3 AC |
280 | } |
281 | ||
7df5fcfb | 282 | rb_set_time(); |
212380e3 AC |
283 | |
284 | aconf = make_conf(); | |
285 | aconf->status = CONF_DLINE; | |
b52c2949 | 286 | aconf->created = rb_current_time(); |
47a03750 | 287 | aconf->host = rb_strdup(dlhost); |
a12ad044 | 288 | aconf->passwd = rb_strdup(reason); |
27f616dd | 289 | aconf->info.oper = operhash_add(get_oper_name(source_p)); |
212380e3 | 290 | |
9319a2e2 KB |
291 | if(strlen(reason) > BANREASONLEN) |
292 | reason[BANREASONLEN] = '\0'; | |
293 | ||
08e8aa7a VY |
294 | /* Look for an oper reason */ |
295 | if((oper_reason = strchr(reason, '|')) != NULL) | |
296 | { | |
297 | *oper_reason = '\0'; | |
298 | oper_reason++; | |
299 | ||
300 | if(!EmptyString(oper_reason)) | |
301 | aconf->spasswd = rb_strdup(oper_reason); | |
302 | } | |
303 | ||
212380e3 AC |
304 | if(tdline_time > 0) |
305 | { | |
e3354945 | 306 | aconf->hold = rb_current_time() + tdline_time; |
212380e3 AC |
307 | add_temp_dline(aconf); |
308 | ||
309 | if(EmptyString(oper_reason)) | |
310 | { | |
61c096aa | 311 | sendto_realops_snomask(SNO_GENERAL, L_ALL, |
8bbeb278 AC |
312 | "%s added temporary %d min. D-Line for [%s] [%s]", |
313 | get_oper_name(source_p), tdline_time / 60, | |
314 | aconf->host, reason); | |
212380e3 | 315 | ilog(L_KLINE, "D %s %d %s %s", |
8bbeb278 | 316 | get_oper_name(source_p), tdline_time / 60, aconf->host, reason); |
212380e3 AC |
317 | } |
318 | else | |
319 | { | |
61c096aa | 320 | sendto_realops_snomask(SNO_GENERAL, L_ALL, |
8bbeb278 AC |
321 | "%s added temporary %d min. D-Line for [%s] [%s|%s]", |
322 | get_oper_name(source_p), tdline_time / 60, | |
323 | aconf->host, reason, oper_reason); | |
212380e3 | 324 | ilog(L_KLINE, "D %s %d %s %s|%s", |
8bbeb278 AC |
325 | get_oper_name(source_p), tdline_time / 60, |
326 | aconf->host, reason, oper_reason); | |
212380e3 AC |
327 | } |
328 | ||
329 | sendto_one(source_p, ":%s NOTICE %s :Added temporary %d min. D-Line for [%s]", | |
330 | me.name, source_p->name, tdline_time / 60, aconf->host); | |
331 | } | |
332 | else | |
333 | { | |
40c1fd47 | 334 | add_conf_by_address(aconf->host, CONF_DLINE, NULL, NULL, aconf); |
8bbeb278 AC |
335 | |
336 | bandb_add(BANDB_DLINE, source_p, aconf->host, NULL, | |
337 | reason, EmptyString(aconf->spasswd) ? NULL : aconf->spasswd, 0); | |
9964e935 AC |
338 | |
339 | if(EmptyString(oper_reason)) | |
340 | { | |
341 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
342 | "%s added D-Line for [%s] [%s]", | |
343 | get_oper_name(source_p), aconf->host, reason); | |
344 | ilog(L_KLINE, "D %s 0 %s %s", | |
345 | get_oper_name(source_p), aconf->host, reason); | |
346 | } | |
347 | else | |
348 | { | |
349 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
350 | "%s added D-Line for [%s] [%s|%s]", | |
351 | get_oper_name(source_p), aconf->host, reason, oper_reason); | |
352 | ilog(L_KLINE, "D %s 0 %s %s|%s", | |
353 | get_oper_name(source_p), | |
354 | aconf->host, reason, oper_reason); | |
355 | } | |
212380e3 | 356 | } |
212380e3 AC |
357 | } |
358 | ||
3c7d6fcc | 359 | static void |
f5cb68d5 | 360 | apply_undline(struct Client *source_p, const char *cidr) |
212380e3 | 361 | { |
8bbeb278 | 362 | char buf[BUFSIZE]; |
f5cb68d5 | 363 | struct ConfItem *aconf; |
212380e3 | 364 | |
7d9e8e9d EK |
365 | int masktype = parse_netmask_strict(cidr, NULL, NULL); |
366 | ||
367 | if(masktype != HM_IPV4 && masktype != HM_IPV6) | |
212380e3 | 368 | { |
5366977b | 369 | sendto_one_notice(source_p, ":Invalid D-Line"); |
3c7d6fcc | 370 | return; |
212380e3 AC |
371 | } |
372 | ||
6f3a09ff JT |
373 | aconf = find_exact_conf_by_address(cidr, CONF_DLINE, NULL); |
374 | if(aconf == NULL) | |
375 | { | |
376 | sendto_one_notice(source_p, ":No D-Line for %s", cidr); | |
3c7d6fcc | 377 | return; |
6f3a09ff JT |
378 | } |
379 | ||
f427c8b0 | 380 | rb_strlcpy(buf, aconf->host, sizeof buf); |
6f3a09ff | 381 | if(remove_temp_dline(aconf)) |
212380e3 AC |
382 | { |
383 | sendto_one(source_p, | |
384 | ":%s NOTICE %s :Un-dlined [%s] from temporary D-lines", | |
f5cb68d5 | 385 | me.name, source_p->name, buf); |
212380e3 | 386 | sendto_realops_snomask(SNO_GENERAL, L_ALL, |
8bbeb278 AC |
387 | "%s has removed the temporary D-Line for: [%s]", |
388 | get_oper_name(source_p), buf); | |
6f3a09ff | 389 | ilog(L_KLINE, "UD %s %s", get_oper_name(source_p), buf); |
3c7d6fcc | 390 | return; |
212380e3 AC |
391 | } |
392 | ||
8bbeb278 | 393 | bandb_del(BANDB_DLINE, aconf->host, NULL); |
212380e3 | 394 | |
8bbeb278 AC |
395 | sendto_one(source_p, ":%s NOTICE %s :D-Line for [%s] is removed", me.name, source_p->name, |
396 | aconf->host); | |
397 | sendto_realops_snomask(SNO_GENERAL, L_ALL, "%s has removed the D-Line for: [%s]", | |
398 | get_oper_name(source_p), aconf->host); | |
37f6cc05 JT |
399 | ilog(L_KLINE, "UD %s %s", get_oper_name(source_p), aconf->host); |
400 | delete_one_address_conf(aconf->host, aconf); | |
212380e3 AC |
401 | } |
402 | ||
212380e3 AC |
403 | /* remove_temp_dline() |
404 | * | |
6f3a09ff | 405 | * inputs - confitem to undline |
3c7d6fcc | 406 | * outputs - true if removed, false otherwise. |
212380e3 AC |
407 | * side effects - tries to undline anything that matches |
408 | */ | |
3c7d6fcc | 409 | static bool |
6f3a09ff | 410 | remove_temp_dline(struct ConfItem *aconf) |
212380e3 | 411 | { |
5b96d9a6 | 412 | rb_dlink_node *ptr; |
212380e3 AC |
413 | int i; |
414 | ||
8bbeb278 | 415 | for(i = 0; i < LAST_TEMP_TYPE; i++) |
212380e3 | 416 | { |
5b96d9a6 | 417 | RB_DLINK_FOREACH(ptr, temp_dlines[i].head) |
212380e3 | 418 | { |
8bbeb278 | 419 | if(aconf == ptr->data) |
212380e3 | 420 | { |
555ac41f | 421 | rb_dlinkDestroy(ptr, &temp_dlines[i]); |
212380e3 | 422 | delete_one_address_conf(aconf->host, aconf); |
3c7d6fcc | 423 | return true; |
212380e3 AC |
424 | } |
425 | } | |
426 | } | |
427 | ||
3c7d6fcc | 428 | return false; |
212380e3 | 429 | } |