]>
Commit | Line | Data |
---|---|---|
212380e3 AC |
1 | /* |
2 | * ircd-ratbox: A slightly useful ircd. | |
3 | * m_dline.c: Bans/unbans a user. | |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
7 | * Copyright (C) 2002-2005 ircd-ratbox development team | |
8 | * | |
9 | * This program is free software; you can redistribute it and/or modify | |
10 | * it under the terms of the GNU General Public License as published by | |
11 | * the Free Software Foundation; either version 2 of the License, or | |
12 | * (at your option) any later version. | |
13 | * | |
14 | * This program is distributed in the hope that it will be useful, | |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
17 | * GNU General Public License for more details. | |
18 | * | |
19 | * You should have received a copy of the GNU General Public License | |
20 | * along with this program; if not, write to the Free Software | |
21 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
22 | * USA | |
212380e3 AC |
23 | */ |
24 | ||
25 | #include "stdinc.h" | |
212380e3 AC |
26 | #include "channel.h" |
27 | #include "class.h" | |
28 | #include "client.h" | |
4562c604 | 29 | #include "match.h" |
212380e3 AC |
30 | #include "ircd.h" |
31 | #include "hostmask.h" | |
32 | #include "numeric.h" | |
212380e3 AC |
33 | #include "s_conf.h" |
34 | #include "s_newconf.h" | |
4016731b | 35 | #include "logger.h" |
212380e3 AC |
36 | #include "send.h" |
37 | #include "hash.h" | |
38 | #include "s_serv.h" | |
39 | #include "msg.h" | |
40 | #include "parse.h" | |
41 | #include "modules.h" | |
8bbeb278 | 42 | #include "bandbi.h" |
27f616dd | 43 | #include "operhash.h" |
212380e3 | 44 | |
eeabf33a EM |
45 | static const char dline_desc[] = "Provides the DLINE facility to ban users via IP address"; |
46 | ||
3c7d6fcc EM |
47 | static void mo_dline(struct MsgBuf *, struct Client *, struct Client *, int, const char **); |
48 | static void me_dline(struct MsgBuf *, struct Client *, struct Client *, int, const char **); | |
49 | static void mo_undline(struct MsgBuf *, struct Client *, struct Client *, int, const char **); | |
50 | static void me_undline(struct MsgBuf *, struct Client *, struct Client *, int, const char **); | |
212380e3 AC |
51 | |
52 | struct Message dline_msgtab = { | |
7baa37a9 | 53 | "DLINE", 0, 0, 0, 0, |
b647efa0 | 54 | {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, {me_dline, 4}, {mo_dline, 2}} |
212380e3 | 55 | }; |
8bbeb278 | 56 | |
212380e3 | 57 | struct Message undline_msgtab = { |
7baa37a9 | 58 | "UNDLINE", 0, 0, 0, 0, |
b647efa0 | 59 | {mg_unreg, mg_not_oper, mg_ignore, mg_ignore, {me_undline, 2}, {mo_undline, 2}} |
212380e3 AC |
60 | }; |
61 | ||
62 | mapi_clist_av1 dline_clist[] = { &dline_msgtab, &undline_msgtab, NULL }; | |
8bbeb278 | 63 | |
9fd8e7cb | 64 | DECLARE_MODULE_AV2(dline, NULL, NULL, dline_clist, NULL, NULL, NULL, NULL, dline_desc); |
212380e3 | 65 | |
3c7d6fcc EM |
66 | static bool remove_temp_dline(struct ConfItem *); |
67 | static void apply_dline(struct Client *, const char *, int, char *); | |
68 | static void apply_undline(struct Client *, const char *); | |
212380e3 AC |
69 | |
70 | /* mo_dline() | |
55abcbb2 | 71 | * |
212380e3 AC |
72 | * parv[1] - dline to add |
73 | * parv[2] - reason | |
74 | */ | |
3c7d6fcc | 75 | static void |
428ca87b | 76 | mo_dline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
212380e3 AC |
77 | { |
78 | char def[] = "No Reason"; | |
79 | const char *dlhost; | |
212380e3 | 80 | char *reason = def; |
212380e3 | 81 | int tdline_time = 0; |
f5cb68d5 | 82 | const char *target_server = NULL; |
212380e3 AC |
83 | int loc = 1; |
84 | ||
85 | if(!IsOperK(source_p)) | |
86 | { | |
8bbeb278 | 87 | sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "kline"); |
3c7d6fcc | 88 | return; |
212380e3 AC |
89 | } |
90 | ||
91 | if((tdline_time = valid_temp_time(parv[loc])) >= 0) | |
92 | loc++; | |
93 | ||
a77ebe1e EK |
94 | if (loc >= parc) |
95 | { | |
96 | sendto_one_notice(source_p, ":Need an IP to D-Line"); | |
97 | return; | |
98 | } | |
99 | ||
212380e3 | 100 | dlhost = parv[loc]; |
f5cb68d5 VY |
101 | loc++; |
102 | ||
2b843a5b JT |
103 | /* would break the protocol */ |
104 | if (*dlhost == ':') | |
105 | { | |
72464c6a | 106 | sendto_one_notice(source_p, ":Invalid D-Line [%s] - IP cannot start with :", dlhost); |
3c7d6fcc | 107 | return; |
2b843a5b JT |
108 | } |
109 | ||
bf493a34 EK |
110 | int ty = parse_netmask_strict(dlhost, NULL, NULL); |
111 | if (ty != HM_IPV4 && ty != HM_IPV6) | |
112 | { | |
72464c6a | 113 | sendto_one_notice(source_p, ":Invalid D-Line [%s] - doesn't look like IP[/cidr]", dlhost); |
bf493a34 EK |
114 | return; |
115 | } | |
116 | ||
8bbeb278 AC |
117 | if(parc >= loc + 2 && !irccmp(parv[loc], "ON")) |
118 | { | |
2cfb7214 JT |
119 | if(!IsOperRemoteBan(source_p)) |
120 | { | |
121 | sendto_one(source_p, form_str(ERR_NOPRIVS), | |
8bbeb278 | 122 | me.name, source_p->name, "remoteban"); |
3c7d6fcc | 123 | return; |
2cfb7214 JT |
124 | } |
125 | ||
8bbeb278 | 126 | target_server = parv[loc + 1]; |
f5cb68d5 VY |
127 | loc += 2; |
128 | } | |
129 | ||
130 | if(parc >= loc + 1 && !EmptyString(parv[loc])) | |
131 | reason = LOCAL_COPY(parv[loc]); | |
132 | ||
133 | if(target_server != NULL) | |
212380e3 | 134 | { |
f5cb68d5 | 135 | sendto_match_servs(source_p, target_server, |
8bbeb278 AC |
136 | CAP_ENCAP, NOCAPS, |
137 | "ENCAP %s DLINE %d %s :%s", | |
138 | target_server, tdline_time, dlhost, reason); | |
f5cb68d5 VY |
139 | |
140 | if(!match(target_server, me.name)) | |
3c7d6fcc | 141 | return; |
212380e3 AC |
142 | } |
143 | ||
f5cb68d5 VY |
144 | apply_dline(source_p, dlhost, tdline_time, reason); |
145 | ||
146 | check_dlines(); | |
f5cb68d5 | 147 | } |
212380e3 | 148 | |
f5cb68d5 VY |
149 | /* mo_undline() |
150 | * | |
151 | * parv[1] = dline to remove | |
152 | */ | |
3c7d6fcc | 153 | static void |
428ca87b | 154 | mo_undline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
f5cb68d5 VY |
155 | { |
156 | const char *cidr; | |
157 | const char *target_server = NULL; | |
158 | ||
159 | if(!IsOperK(source_p)) | |
160 | { | |
8bbeb278 | 161 | sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "unkline"); |
3c7d6fcc | 162 | return; |
8bbeb278 AC |
163 | } |
164 | ||
f5cb68d5 VY |
165 | cidr = parv[1]; |
166 | ||
167 | if(parc >= 4 && !irccmp(parv[2], "ON")) | |
212380e3 | 168 | { |
2cfb7214 JT |
169 | if(!IsOperRemoteBan(source_p)) |
170 | { | |
171 | sendto_one(source_p, form_str(ERR_NOPRIVS), | |
8bbeb278 | 172 | me.name, source_p->name, "remoteban"); |
3c7d6fcc | 173 | return; |
2cfb7214 JT |
174 | } |
175 | ||
f5cb68d5 VY |
176 | target_server = parv[3]; |
177 | sendto_match_servs(source_p, target_server, | |
8bbeb278 | 178 | CAP_ENCAP, NOCAPS, "ENCAP %s UNDLINE %s", target_server, cidr); |
212380e3 | 179 | |
f5cb68d5 | 180 | if(!match(target_server, me.name)) |
3c7d6fcc | 181 | return; |
212380e3 AC |
182 | } |
183 | ||
f5cb68d5 | 184 | apply_undline(source_p, cidr); |
f5cb68d5 VY |
185 | } |
186 | ||
3c7d6fcc | 187 | static void |
428ca87b | 188 | me_dline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char **parv) |
5f7a6a3d JT |
189 | { |
190 | int tdline_time = atoi(parv[1]); | |
191 | /* Since this is coming over a server link, assume that the originating | |
192 | * server did the relevant permission/sanity checks... | |
193 | */ | |
194 | ||
195 | if(!IsPerson(source_p)) | |
3c7d6fcc | 196 | return; |
5f7a6a3d | 197 | |
5f7a6a3d JT |
198 | apply_dline(source_p, parv[2], tdline_time, LOCAL_COPY(parv[3])); |
199 | ||
200 | check_dlines(); | |
5f7a6a3d JT |
201 | } |
202 | ||
3c7d6fcc | 203 | static void |
428ca87b | 204 | me_undline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char **parv) |
5f7a6a3d JT |
205 | { |
206 | if(!IsPerson(source_p)) | |
3c7d6fcc | 207 | return; |
5f7a6a3d | 208 | |
5f7a6a3d | 209 | apply_undline(source_p, parv[1]); |
f5cb68d5 VY |
210 | } |
211 | ||
3c7d6fcc | 212 | static void |
f5cb68d5 VY |
213 | apply_dline(struct Client *source_p, const char *dlhost, int tdline_time, char *reason) |
214 | { | |
215 | struct ConfItem *aconf; | |
216 | char *oper_reason; | |
f5cb68d5 VY |
217 | struct rb_sockaddr_storage daddr; |
218 | int t = AF_INET, ty, b; | |
219 | const char *creason; | |
220 | ||
7d9e8e9d EK |
221 | ty = parse_netmask_strict(dlhost, &daddr, &b); |
222 | if(ty != HM_IPV4 && ty != HM_IPV6) | |
f5cb68d5 | 223 | { |
8bbeb278 | 224 | sendto_one(source_p, ":%s NOTICE %s :Invalid D-Line", me.name, source_p->name); |
3c7d6fcc | 225 | return; |
f5cb68d5 | 226 | } |
f5cb68d5 VY |
227 | if(ty == HM_IPV6) |
228 | t = AF_INET6; | |
229 | else | |
f5cb68d5 VY |
230 | t = AF_INET; |
231 | ||
232 | /* This means dlines wider than /16 cannot be set remotely */ | |
212380e3 AC |
233 | if(IsOperAdmin(source_p)) |
234 | { | |
f5cb68d5 | 235 | if(b < 8) |
212380e3 | 236 | { |
f5cb68d5 | 237 | sendto_one_notice(source_p, |
8bbeb278 | 238 | ":For safety, bitmasks less than 8 require conf access."); |
3c7d6fcc | 239 | return; |
212380e3 AC |
240 | } |
241 | } | |
242 | else | |
243 | { | |
f5cb68d5 | 244 | if(b < 16) |
212380e3 | 245 | { |
f5cb68d5 | 246 | sendto_one_notice(source_p, |
8bbeb278 | 247 | ":Dline bitmasks less than 16 are for admins only."); |
3c7d6fcc | 248 | return; |
212380e3 AC |
249 | } |
250 | } | |
251 | ||
54ac8b60 VY |
252 | if(ConfigFileEntry.non_redundant_klines) |
253 | { | |
8bbeb278 | 254 | if((aconf = find_dline((struct sockaddr *) &daddr, t)) != NULL) |
54ac8b60 VY |
255 | { |
256 | int bx; | |
7d9e8e9d EK |
257 | int masktype = parse_netmask_strict(aconf->host, NULL, &bx); |
258 | ||
259 | if (masktype != HM_ERROR && b >= bx) | |
54ac8b60 VY |
260 | { |
261 | creason = aconf->passwd ? aconf->passwd : "<No Reason>"; | |
262 | if(IsConfExemptKline(aconf)) | |
263 | sendto_one(source_p, | |
264 | ":%s NOTICE %s :[%s] is (E)d-lined by [%s] - %s", | |
8bbeb278 AC |
265 | me.name, source_p->name, dlhost, aconf->host, |
266 | creason); | |
54ac8b60 VY |
267 | else |
268 | sendto_one(source_p, | |
269 | ":%s NOTICE %s :[%s] already D-lined by [%s] - %s", | |
8bbeb278 AC |
270 | me.name, source_p->name, dlhost, aconf->host, |
271 | creason); | |
3c7d6fcc | 272 | return; |
54ac8b60 VY |
273 | } |
274 | } | |
212380e3 AC |
275 | } |
276 | ||
7df5fcfb | 277 | rb_set_time(); |
212380e3 AC |
278 | |
279 | aconf = make_conf(); | |
280 | aconf->status = CONF_DLINE; | |
b52c2949 | 281 | aconf->created = rb_current_time(); |
47a03750 | 282 | aconf->host = rb_strdup(dlhost); |
a12ad044 | 283 | aconf->passwd = rb_strdup(reason); |
27f616dd | 284 | aconf->info.oper = operhash_add(get_oper_name(source_p)); |
212380e3 | 285 | |
9319a2e2 KB |
286 | if(strlen(reason) > BANREASONLEN) |
287 | reason[BANREASONLEN] = '\0'; | |
288 | ||
08e8aa7a VY |
289 | /* Look for an oper reason */ |
290 | if((oper_reason = strchr(reason, '|')) != NULL) | |
291 | { | |
292 | *oper_reason = '\0'; | |
293 | oper_reason++; | |
294 | ||
295 | if(!EmptyString(oper_reason)) | |
296 | aconf->spasswd = rb_strdup(oper_reason); | |
297 | } | |
298 | ||
212380e3 AC |
299 | if(tdline_time > 0) |
300 | { | |
e3354945 | 301 | aconf->hold = rb_current_time() + tdline_time; |
212380e3 AC |
302 | add_temp_dline(aconf); |
303 | ||
304 | if(EmptyString(oper_reason)) | |
305 | { | |
61c096aa | 306 | sendto_realops_snomask(SNO_GENERAL, L_ALL, |
8bbeb278 AC |
307 | "%s added temporary %d min. D-Line for [%s] [%s]", |
308 | get_oper_name(source_p), tdline_time / 60, | |
309 | aconf->host, reason); | |
212380e3 | 310 | ilog(L_KLINE, "D %s %d %s %s", |
8bbeb278 | 311 | get_oper_name(source_p), tdline_time / 60, aconf->host, reason); |
212380e3 AC |
312 | } |
313 | else | |
314 | { | |
61c096aa | 315 | sendto_realops_snomask(SNO_GENERAL, L_ALL, |
8bbeb278 AC |
316 | "%s added temporary %d min. D-Line for [%s] [%s|%s]", |
317 | get_oper_name(source_p), tdline_time / 60, | |
318 | aconf->host, reason, oper_reason); | |
212380e3 | 319 | ilog(L_KLINE, "D %s %d %s %s|%s", |
8bbeb278 AC |
320 | get_oper_name(source_p), tdline_time / 60, |
321 | aconf->host, reason, oper_reason); | |
212380e3 AC |
322 | } |
323 | ||
324 | sendto_one(source_p, ":%s NOTICE %s :Added temporary %d min. D-Line for [%s]", | |
325 | me.name, source_p->name, tdline_time / 60, aconf->host); | |
326 | } | |
327 | else | |
328 | { | |
40c1fd47 | 329 | add_conf_by_address(aconf->host, CONF_DLINE, NULL, NULL, aconf); |
8bbeb278 AC |
330 | |
331 | bandb_add(BANDB_DLINE, source_p, aconf->host, NULL, | |
332 | reason, EmptyString(aconf->spasswd) ? NULL : aconf->spasswd, 0); | |
9964e935 AC |
333 | |
334 | if(EmptyString(oper_reason)) | |
335 | { | |
336 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
337 | "%s added D-Line for [%s] [%s]", | |
338 | get_oper_name(source_p), aconf->host, reason); | |
339 | ilog(L_KLINE, "D %s 0 %s %s", | |
340 | get_oper_name(source_p), aconf->host, reason); | |
341 | } | |
342 | else | |
343 | { | |
344 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
345 | "%s added D-Line for [%s] [%s|%s]", | |
346 | get_oper_name(source_p), aconf->host, reason, oper_reason); | |
347 | ilog(L_KLINE, "D %s 0 %s %s|%s", | |
348 | get_oper_name(source_p), | |
349 | aconf->host, reason, oper_reason); | |
350 | } | |
212380e3 | 351 | } |
212380e3 AC |
352 | } |
353 | ||
3c7d6fcc | 354 | static void |
f5cb68d5 | 355 | apply_undline(struct Client *source_p, const char *cidr) |
212380e3 | 356 | { |
8bbeb278 | 357 | char buf[BUFSIZE]; |
f5cb68d5 | 358 | struct ConfItem *aconf; |
212380e3 | 359 | |
cf0aa421 | 360 | int masktype = parse_netmask(cidr, NULL, NULL); |
7d9e8e9d EK |
361 | |
362 | if(masktype != HM_IPV4 && masktype != HM_IPV6) | |
212380e3 | 363 | { |
72464c6a | 364 | sendto_one_notice(source_p, ":Invalid D-Line [%s] - doesn't look like IP[/cidr]", cidr); |
3c7d6fcc | 365 | return; |
212380e3 AC |
366 | } |
367 | ||
6f3a09ff JT |
368 | aconf = find_exact_conf_by_address(cidr, CONF_DLINE, NULL); |
369 | if(aconf == NULL) | |
370 | { | |
371 | sendto_one_notice(source_p, ":No D-Line for %s", cidr); | |
3c7d6fcc | 372 | return; |
6f3a09ff JT |
373 | } |
374 | ||
f427c8b0 | 375 | rb_strlcpy(buf, aconf->host, sizeof buf); |
6f3a09ff | 376 | if(remove_temp_dline(aconf)) |
212380e3 AC |
377 | { |
378 | sendto_one(source_p, | |
379 | ":%s NOTICE %s :Un-dlined [%s] from temporary D-lines", | |
f5cb68d5 | 380 | me.name, source_p->name, buf); |
212380e3 | 381 | sendto_realops_snomask(SNO_GENERAL, L_ALL, |
8bbeb278 AC |
382 | "%s has removed the temporary D-Line for: [%s]", |
383 | get_oper_name(source_p), buf); | |
6f3a09ff | 384 | ilog(L_KLINE, "UD %s %s", get_oper_name(source_p), buf); |
3c7d6fcc | 385 | return; |
212380e3 AC |
386 | } |
387 | ||
8bbeb278 | 388 | bandb_del(BANDB_DLINE, aconf->host, NULL); |
212380e3 | 389 | |
8bbeb278 AC |
390 | sendto_one(source_p, ":%s NOTICE %s :D-Line for [%s] is removed", me.name, source_p->name, |
391 | aconf->host); | |
392 | sendto_realops_snomask(SNO_GENERAL, L_ALL, "%s has removed the D-Line for: [%s]", | |
393 | get_oper_name(source_p), aconf->host); | |
37f6cc05 JT |
394 | ilog(L_KLINE, "UD %s %s", get_oper_name(source_p), aconf->host); |
395 | delete_one_address_conf(aconf->host, aconf); | |
212380e3 AC |
396 | } |
397 | ||
212380e3 AC |
398 | /* remove_temp_dline() |
399 | * | |
6f3a09ff | 400 | * inputs - confitem to undline |
3c7d6fcc | 401 | * outputs - true if removed, false otherwise. |
212380e3 AC |
402 | * side effects - tries to undline anything that matches |
403 | */ | |
3c7d6fcc | 404 | static bool |
6f3a09ff | 405 | remove_temp_dline(struct ConfItem *aconf) |
212380e3 | 406 | { |
5b96d9a6 | 407 | rb_dlink_node *ptr; |
212380e3 AC |
408 | int i; |
409 | ||
8bbeb278 | 410 | for(i = 0; i < LAST_TEMP_TYPE; i++) |
212380e3 | 411 | { |
5b96d9a6 | 412 | RB_DLINK_FOREACH(ptr, temp_dlines[i].head) |
212380e3 | 413 | { |
8bbeb278 | 414 | if(aconf == ptr->data) |
212380e3 | 415 | { |
555ac41f | 416 | rb_dlinkDestroy(ptr, &temp_dlines[i]); |
212380e3 | 417 | delete_one_address_conf(aconf->host, aconf); |
3c7d6fcc | 418 | return true; |
212380e3 AC |
419 | } |
420 | } | |
421 | } | |
422 | ||
3c7d6fcc | 423 | return false; |
212380e3 | 424 | } |