]> jfr.im git - solanum.git/blame - modules/m_dline.c
m_dline: Abort early if host isn't an IP address
[solanum.git] / modules / m_dline.c
CommitLineData
212380e3
AC
1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * m_dline.c: Bans/unbans a user.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
212380e3
AC
23 */
24
25#include "stdinc.h"
212380e3
AC
26#include "channel.h"
27#include "class.h"
28#include "client.h"
4562c604 29#include "match.h"
212380e3
AC
30#include "ircd.h"
31#include "hostmask.h"
32#include "numeric.h"
212380e3
AC
33#include "s_conf.h"
34#include "s_newconf.h"
4016731b 35#include "logger.h"
212380e3
AC
36#include "send.h"
37#include "hash.h"
38#include "s_serv.h"
39#include "msg.h"
40#include "parse.h"
41#include "modules.h"
8bbeb278 42#include "bandbi.h"
27f616dd 43#include "operhash.h"
212380e3 44
eeabf33a
EM
45static const char dline_desc[] = "Provides the DLINE facility to ban users via IP address";
46
3c7d6fcc
EM
47static void mo_dline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
48static void me_dline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
49static void mo_undline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
50static void me_undline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
212380e3
AC
51
52struct Message dline_msgtab = {
7baa37a9 53 "DLINE", 0, 0, 0, 0,
b647efa0 54 {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, {me_dline, 4}, {mo_dline, 2}}
212380e3 55};
8bbeb278 56
212380e3 57struct Message undline_msgtab = {
7baa37a9 58 "UNDLINE", 0, 0, 0, 0,
b647efa0 59 {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, {me_undline, 2}, {mo_undline, 2}}
212380e3
AC
60};
61
62mapi_clist_av1 dline_clist[] = { &dline_msgtab, &undline_msgtab, NULL };
8bbeb278 63
9fd8e7cb 64DECLARE_MODULE_AV2(dline, NULL, NULL, dline_clist, NULL, NULL, NULL, NULL, dline_desc);
212380e3 65
3c7d6fcc
EM
66static bool remove_temp_dline(struct ConfItem *);
67static void apply_dline(struct Client *, const char *, int, char *);
68static void apply_undline(struct Client *, const char *);
212380e3
AC
69
70/* mo_dline()
55abcbb2 71 *
212380e3
AC
72 * parv[1] - dline to add
73 * parv[2] - reason
74 */
3c7d6fcc 75static void
428ca87b 76mo_dline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
77{
78 char def[] = "No Reason";
79 const char *dlhost;
212380e3 80 char *reason = def;
212380e3 81 char cidr_form_host[HOSTLEN + 1];
212380e3 82 int tdline_time = 0;
f5cb68d5 83 const char *target_server = NULL;
212380e3
AC
84 int loc = 1;
85
86 if(!IsOperK(source_p))
87 {
8bbeb278 88 sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "kline");
3c7d6fcc 89 return;
212380e3
AC
90 }
91
92 if((tdline_time = valid_temp_time(parv[loc])) >= 0)
93 loc++;
94
212380e3 95 dlhost = parv[loc];
f427c8b0 96 rb_strlcpy(cidr_form_host, dlhost, sizeof(cidr_form_host));
f5cb68d5
VY
97 loc++;
98
2b843a5b
JT
99 /* would break the protocol */
100 if (*dlhost == ':')
101 {
102 sendto_one_notice(source_p, ":Invalid D-Line");
3c7d6fcc 103 return;
2b843a5b
JT
104 }
105
bf493a34
EK
106 int ty = parse_netmask_strict(dlhost, NULL, NULL);
107 if (ty != HM_IPV4 && ty != HM_IPV6)
108 {
109 sendto_one_notice(source_p, ":Invalid D-Line");
110 return;
111 }
112
8bbeb278
AC
113 if(parc >= loc + 2 && !irccmp(parv[loc], "ON"))
114 {
2cfb7214
JT
115 if(!IsOperRemoteBan(source_p))
116 {
117 sendto_one(source_p, form_str(ERR_NOPRIVS),
8bbeb278 118 me.name, source_p->name, "remoteban");
3c7d6fcc 119 return;
2cfb7214
JT
120 }
121
8bbeb278 122 target_server = parv[loc + 1];
f5cb68d5
VY
123 loc += 2;
124 }
125
126 if(parc >= loc + 1 && !EmptyString(parv[loc]))
127 reason = LOCAL_COPY(parv[loc]);
128
129 if(target_server != NULL)
212380e3 130 {
f5cb68d5 131 sendto_match_servs(source_p, target_server,
8bbeb278
AC
132 CAP_ENCAP, NOCAPS,
133 "ENCAP %s DLINE %d %s :%s",
134 target_server, tdline_time, dlhost, reason);
f5cb68d5
VY
135
136 if(!match(target_server, me.name))
3c7d6fcc 137 return;
212380e3
AC
138 }
139
f5cb68d5
VY
140 apply_dline(source_p, dlhost, tdline_time, reason);
141
142 check_dlines();
f5cb68d5 143}
212380e3 144
f5cb68d5
VY
145/* mo_undline()
146 *
147 * parv[1] = dline to remove
148 */
3c7d6fcc 149static void
428ca87b 150mo_undline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
f5cb68d5
VY
151{
152 const char *cidr;
153 const char *target_server = NULL;
154
155 if(!IsOperK(source_p))
156 {
8bbeb278 157 sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "unkline");
3c7d6fcc 158 return;
8bbeb278
AC
159 }
160
f5cb68d5
VY
161 cidr = parv[1];
162
163 if(parc >= 4 && !irccmp(parv[2], "ON"))
212380e3 164 {
2cfb7214
JT
165 if(!IsOperRemoteBan(source_p))
166 {
167 sendto_one(source_p, form_str(ERR_NOPRIVS),
8bbeb278 168 me.name, source_p->name, "remoteban");
3c7d6fcc 169 return;
2cfb7214
JT
170 }
171
f5cb68d5
VY
172 target_server = parv[3];
173 sendto_match_servs(source_p, target_server,
8bbeb278 174 CAP_ENCAP, NOCAPS, "ENCAP %s UNDLINE %s", target_server, cidr);
212380e3 175
f5cb68d5 176 if(!match(target_server, me.name))
3c7d6fcc 177 return;
212380e3
AC
178 }
179
f5cb68d5 180 apply_undline(source_p, cidr);
f5cb68d5
VY
181}
182
3c7d6fcc 183static void
428ca87b 184me_dline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char **parv)
5f7a6a3d
JT
185{
186 int tdline_time = atoi(parv[1]);
187 /* Since this is coming over a server link, assume that the originating
188 * server did the relevant permission/sanity checks...
189 */
190
191 if(!IsPerson(source_p))
3c7d6fcc 192 return;
5f7a6a3d
JT
193
194 if(!find_shared_conf(source_p->username, source_p->host,
8bbeb278
AC
195 source_p->servptr->name,
196 tdline_time > 0 ? SHARED_TDLINE : SHARED_PDLINE))
3c7d6fcc 197 return;
5f7a6a3d
JT
198
199 apply_dline(source_p, parv[2], tdline_time, LOCAL_COPY(parv[3]));
200
201 check_dlines();
5f7a6a3d
JT
202}
203
3c7d6fcc 204static void
428ca87b 205me_undline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char **parv)
5f7a6a3d
JT
206{
207 if(!IsPerson(source_p))
3c7d6fcc 208 return;
5f7a6a3d
JT
209
210 if(!find_shared_conf(source_p->username, source_p->host,
8bbeb278 211 source_p->servptr->name, SHARED_UNDLINE))
3c7d6fcc 212 return;
5f7a6a3d
JT
213
214 apply_undline(source_p, parv[1]);
f5cb68d5
VY
215}
216
3c7d6fcc 217static void
f5cb68d5
VY
218apply_dline(struct Client *source_p, const char *dlhost, int tdline_time, char *reason)
219{
220 struct ConfItem *aconf;
221 char *oper_reason;
f5cb68d5
VY
222 struct rb_sockaddr_storage daddr;
223 int t = AF_INET, ty, b;
224 const char *creason;
225
7d9e8e9d
EK
226 ty = parse_netmask_strict(dlhost, &daddr, &b);
227 if(ty != HM_IPV4 && ty != HM_IPV6)
f5cb68d5 228 {
8bbeb278 229 sendto_one(source_p, ":%s NOTICE %s :Invalid D-Line", me.name, source_p->name);
3c7d6fcc 230 return;
f5cb68d5 231 }
f5cb68d5
VY
232 if(ty == HM_IPV6)
233 t = AF_INET6;
234 else
f5cb68d5
VY
235 t = AF_INET;
236
237 /* This means dlines wider than /16 cannot be set remotely */
212380e3
AC
238 if(IsOperAdmin(source_p))
239 {
f5cb68d5 240 if(b < 8)
212380e3 241 {
f5cb68d5 242 sendto_one_notice(source_p,
8bbeb278 243 ":For safety, bitmasks less than 8 require conf access.");
3c7d6fcc 244 return;
212380e3
AC
245 }
246 }
247 else
248 {
f5cb68d5 249 if(b < 16)
212380e3 250 {
f5cb68d5 251 sendto_one_notice(source_p,
8bbeb278 252 ":Dline bitmasks less than 16 are for admins only.");
3c7d6fcc 253 return;
212380e3
AC
254 }
255 }
256
54ac8b60
VY
257 if(ConfigFileEntry.non_redundant_klines)
258 {
8bbeb278 259 if((aconf = find_dline((struct sockaddr *) &daddr, t)) != NULL)
54ac8b60
VY
260 {
261 int bx;
7d9e8e9d
EK
262 int masktype = parse_netmask_strict(aconf->host, NULL, &bx);
263
264 if (masktype != HM_ERROR && b >= bx)
54ac8b60
VY
265 {
266 creason = aconf->passwd ? aconf->passwd : "<No Reason>";
267 if(IsConfExemptKline(aconf))
268 sendto_one(source_p,
269 ":%s NOTICE %s :[%s] is (E)d-lined by [%s] - %s",
8bbeb278
AC
270 me.name, source_p->name, dlhost, aconf->host,
271 creason);
54ac8b60
VY
272 else
273 sendto_one(source_p,
274 ":%s NOTICE %s :[%s] already D-lined by [%s] - %s",
8bbeb278
AC
275 me.name, source_p->name, dlhost, aconf->host,
276 creason);
3c7d6fcc 277 return;
54ac8b60
VY
278 }
279 }
212380e3
AC
280 }
281
7df5fcfb 282 rb_set_time();
212380e3
AC
283
284 aconf = make_conf();
285 aconf->status = CONF_DLINE;
b52c2949 286 aconf->created = rb_current_time();
47a03750 287 aconf->host = rb_strdup(dlhost);
a12ad044 288 aconf->passwd = rb_strdup(reason);
27f616dd 289 aconf->info.oper = operhash_add(get_oper_name(source_p));
212380e3 290
9319a2e2
KB
291 if(strlen(reason) > BANREASONLEN)
292 reason[BANREASONLEN] = '\0';
293
08e8aa7a
VY
294 /* Look for an oper reason */
295 if((oper_reason = strchr(reason, '|')) != NULL)
296 {
297 *oper_reason = '\0';
298 oper_reason++;
299
300 if(!EmptyString(oper_reason))
301 aconf->spasswd = rb_strdup(oper_reason);
302 }
303
212380e3
AC
304 if(tdline_time > 0)
305 {
e3354945 306 aconf->hold = rb_current_time() + tdline_time;
212380e3
AC
307 add_temp_dline(aconf);
308
309 if(EmptyString(oper_reason))
310 {
61c096aa 311 sendto_realops_snomask(SNO_GENERAL, L_ALL,
8bbeb278
AC
312 "%s added temporary %d min. D-Line for [%s] [%s]",
313 get_oper_name(source_p), tdline_time / 60,
314 aconf->host, reason);
212380e3 315 ilog(L_KLINE, "D %s %d %s %s",
8bbeb278 316 get_oper_name(source_p), tdline_time / 60, aconf->host, reason);
212380e3
AC
317 }
318 else
319 {
61c096aa 320 sendto_realops_snomask(SNO_GENERAL, L_ALL,
8bbeb278
AC
321 "%s added temporary %d min. D-Line for [%s] [%s|%s]",
322 get_oper_name(source_p), tdline_time / 60,
323 aconf->host, reason, oper_reason);
212380e3 324 ilog(L_KLINE, "D %s %d %s %s|%s",
8bbeb278
AC
325 get_oper_name(source_p), tdline_time / 60,
326 aconf->host, reason, oper_reason);
212380e3
AC
327 }
328
329 sendto_one(source_p, ":%s NOTICE %s :Added temporary %d min. D-Line for [%s]",
330 me.name, source_p->name, tdline_time / 60, aconf->host);
331 }
332 else
333 {
40c1fd47 334 add_conf_by_address(aconf->host, CONF_DLINE, NULL, NULL, aconf);
8bbeb278
AC
335
336 bandb_add(BANDB_DLINE, source_p, aconf->host, NULL,
337 reason, EmptyString(aconf->spasswd) ? NULL : aconf->spasswd, 0);
9964e935
AC
338
339 if(EmptyString(oper_reason))
340 {
341 sendto_realops_snomask(SNO_GENERAL, L_ALL,
342 "%s added D-Line for [%s] [%s]",
343 get_oper_name(source_p), aconf->host, reason);
344 ilog(L_KLINE, "D %s 0 %s %s",
345 get_oper_name(source_p), aconf->host, reason);
346 }
347 else
348 {
349 sendto_realops_snomask(SNO_GENERAL, L_ALL,
350 "%s added D-Line for [%s] [%s|%s]",
351 get_oper_name(source_p), aconf->host, reason, oper_reason);
352 ilog(L_KLINE, "D %s 0 %s %s|%s",
353 get_oper_name(source_p),
354 aconf->host, reason, oper_reason);
355 }
212380e3 356 }
212380e3
AC
357}
358
3c7d6fcc 359static void
f5cb68d5 360apply_undline(struct Client *source_p, const char *cidr)
212380e3 361{
8bbeb278 362 char buf[BUFSIZE];
f5cb68d5 363 struct ConfItem *aconf;
212380e3 364
7d9e8e9d
EK
365 int masktype = parse_netmask_strict(cidr, NULL, NULL);
366
367 if(masktype != HM_IPV4 && masktype != HM_IPV6)
212380e3 368 {
5366977b 369 sendto_one_notice(source_p, ":Invalid D-Line");
3c7d6fcc 370 return;
212380e3
AC
371 }
372
6f3a09ff
JT
373 aconf = find_exact_conf_by_address(cidr, CONF_DLINE, NULL);
374 if(aconf == NULL)
375 {
376 sendto_one_notice(source_p, ":No D-Line for %s", cidr);
3c7d6fcc 377 return;
6f3a09ff
JT
378 }
379
f427c8b0 380 rb_strlcpy(buf, aconf->host, sizeof buf);
6f3a09ff 381 if(remove_temp_dline(aconf))
212380e3
AC
382 {
383 sendto_one(source_p,
384 ":%s NOTICE %s :Un-dlined [%s] from temporary D-lines",
f5cb68d5 385 me.name, source_p->name, buf);
212380e3 386 sendto_realops_snomask(SNO_GENERAL, L_ALL,
8bbeb278
AC
387 "%s has removed the temporary D-Line for: [%s]",
388 get_oper_name(source_p), buf);
6f3a09ff 389 ilog(L_KLINE, "UD %s %s", get_oper_name(source_p), buf);
3c7d6fcc 390 return;
212380e3
AC
391 }
392
8bbeb278 393 bandb_del(BANDB_DLINE, aconf->host, NULL);
212380e3 394
8bbeb278
AC
395 sendto_one(source_p, ":%s NOTICE %s :D-Line for [%s] is removed", me.name, source_p->name,
396 aconf->host);
397 sendto_realops_snomask(SNO_GENERAL, L_ALL, "%s has removed the D-Line for: [%s]",
398 get_oper_name(source_p), aconf->host);
37f6cc05
JT
399 ilog(L_KLINE, "UD %s %s", get_oper_name(source_p), aconf->host);
400 delete_one_address_conf(aconf->host, aconf);
212380e3
AC
401}
402
212380e3
AC
403/* remove_temp_dline()
404 *
6f3a09ff 405 * inputs - confitem to undline
3c7d6fcc 406 * outputs - true if removed, false otherwise.
212380e3
AC
407 * side effects - tries to undline anything that matches
408 */
3c7d6fcc 409static bool
6f3a09ff 410remove_temp_dline(struct ConfItem *aconf)
212380e3 411{
5b96d9a6 412 rb_dlink_node *ptr;
212380e3
AC
413 int i;
414
8bbeb278 415 for(i = 0; i < LAST_TEMP_TYPE; i++)
212380e3 416 {
5b96d9a6 417 RB_DLINK_FOREACH(ptr, temp_dlines[i].head)
212380e3 418 {
8bbeb278 419 if(aconf == ptr->data)
212380e3 420 {
555ac41f 421 rb_dlinkDestroy(ptr, &temp_dlines[i]);
212380e3 422 delete_one_address_conf(aconf->host, aconf);
3c7d6fcc 423 return true;
212380e3
AC
424 }
425 }
426 }
427
3c7d6fcc 428 return false;
212380e3 429}