]> jfr.im git - solanum.git/blame - modules/m_whois.c
m_cap: Try to append caps even if one is too long
[solanum.git] / modules / m_whois.c
CommitLineData
212380e3
AC
1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * m_whois.c: Shows who a user is.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
212380e3
AC
23 */
24
25#include "stdinc.h"
212380e3
AC
26#include "client.h"
27#include "hash.h"
28#include "channel.h"
29#include "hash.h"
30#include "ircd.h"
31#include "numeric.h"
32#include "s_conf.h"
33#include "s_serv.h"
34#include "send.h"
4562c604 35#include "match.h"
212380e3 36#include "s_conf.h"
4016731b 37#include "logger.h"
212380e3
AC
38#include "msg.h"
39#include "parse.h"
40#include "modules.h"
41#include "hook.h"
42#include "s_newconf.h"
7e132ff0 43#include "ratelimit.h"
77d3d2db 44#include "s_assert.h"
212380e3 45
eeabf33a
EM
46static const char whois_desc[] =
47 "Provides the WHOIS command to display information about a user";
48
212380e3
AC
49static void do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]);
50static void single_whois(struct Client *source_p, struct Client *target_p, int operspy);
51
3c7d6fcc
EM
52static void m_whois(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
53static void ms_whois(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
212380e3
AC
54
55struct Message whois_msgtab = {
7baa37a9 56 "WHOIS", 0, 0, 0, 0,
212380e3
AC
57 {mg_unreg, {m_whois, 2}, {ms_whois, 2}, mg_ignore, mg_ignore, {m_whois, 2}}
58};
59
60int doing_whois_hook;
61int doing_whois_global_hook;
9e07c8f7 62int doing_whois_channel_visibility_hook;
212380e3
AC
63
64mapi_clist_av1 whois_clist[] = { &whois_msgtab, NULL };
65mapi_hlist_av1 whois_hlist[] = {
9e07c8f7
AC
66 { "doing_whois", &doing_whois_hook },
67 { "doing_whois_global", &doing_whois_global_hook },
68 { "doing_whois_channel_visibility", &doing_whois_channel_visibility_hook },
212380e3
AC
69 { NULL, NULL }
70};
71
3bf449fe 72DECLARE_MODULE_AV2(whois, NULL, NULL, whois_clist, whois_hlist, NULL, NULL, NULL, whois_desc);
212380e3
AC
73
74/*
75 * m_whois
212380e3
AC
76 * parv[1] = nickname masklist
77 */
3c7d6fcc 78static void
428ca87b 79m_whois(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
80{
81 static time_t last_used = 0;
82
83 if(parc > 2)
84 {
85 if(EmptyString(parv[2]))
86 {
87 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
88 me.name, source_p->name);
3c7d6fcc 89 return;
212380e3
AC
90 }
91
d4f7eb4c 92 if(!IsOperGeneral(source_p))
212380e3
AC
93 {
94 /* seeing as this is going across servers, we should limit it */
7e132ff0 95 if((last_used + ConfigFileEntry.pace_wait_simple) > rb_current_time() || !ratelimit_client(source_p, 2))
212380e3
AC
96 {
97 sendto_one(source_p, form_str(RPL_LOAD2HI),
98 me.name, source_p->name, "WHOIS");
55abcbb2 99 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
f7eac53d 100 form_str(RPL_ENDOFWHOIS), parv[2]);
3c7d6fcc 101 return;
212380e3
AC
102 }
103 else
e3354945 104 last_used = rb_current_time();
212380e3
AC
105 }
106
107 if(hunt_server(client_p, source_p, ":%s WHOIS %s :%s", 1, parc, parv) !=
108 HUNTED_ISME)
3c7d6fcc 109 return;
212380e3
AC
110
111 parv[1] = parv[2];
112
113 }
114 do_whois(client_p, source_p, parc, parv);
212380e3
AC
115}
116
117/*
118 * ms_whois
212380e3
AC
119 * parv[1] = server to reply
120 * parv[2] = nickname to whois
121 */
3c7d6fcc 122static void
428ca87b 123ms_whois(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
212380e3
AC
124{
125 struct Client *target_p;
126
127 /* note: early versions of ratbox allowed users to issue a remote
128 * whois with a blank parv[2], so we cannot treat it as a protocol
129 * violation. --anfl
130 */
131 if(parc < 3 || EmptyString(parv[2]))
132 {
133 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
134 me.name, source_p->name);
3c7d6fcc 135 return;
212380e3
AC
136 }
137
138 /* check if parv[1] exists */
139 if((target_p = find_client(parv[1])) == NULL)
140 {
141 sendto_one_numeric(source_p, ERR_NOSUCHSERVER,
55abcbb2 142 form_str(ERR_NOSUCHSERVER),
212380e3 143 IsDigit(parv[1][0]) ? "*" : parv[1]);
3c7d6fcc 144 return;
212380e3
AC
145 }
146
147 /* if parv[1] isnt my client, or me, someone else is supposed
55abcbb2 148 * to be handling the request.. so send it to them
212380e3
AC
149 */
150 if(!MyClient(target_p) && !IsMe(target_p))
151 {
55abcbb2
KB
152 sendto_one(target_p, ":%s WHOIS %s :%s",
153 get_id(source_p, target_p),
212380e3 154 get_id(target_p, target_p), parv[2]);
3c7d6fcc 155 return;
212380e3
AC
156 }
157
158 /* ok, the target is either us, or a client on our server, so perform the whois
159 * but first, parv[1] == server to perform the whois on, parv[2] == person
160 * to whois, so make parv[1] = parv[2] so do_whois is ok -- fl_
161 */
162 parv[1] = parv[2];
163 do_whois(client_p, source_p, parc, parv);
212380e3
AC
164}
165
166/* do_whois
167 *
55abcbb2
KB
168 * inputs - pointer to
169 * output -
212380e3
AC
170 * side effects -
171 */
172static void
173do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
174{
175 struct Client *target_p;
176 char *nick;
177 char *p = NULL;
178 int operspy = 0;
179
180 nick = LOCAL_COPY(parv[1]);
181 if((p = strchr(nick, ',')))
182 *p = '\0';
183
184 if(IsOperSpy(source_p) && *nick == '!')
185 {
186 operspy = 1;
187 nick++;
188 }
189
2ebef8d9 190 target_p = find_named_person(nick);
212380e3
AC
191 if(target_p != NULL)
192 {
193 if(operspy)
194 {
195 char buffer[BUFSIZE];
196
5203cba5 197 snprintf(buffer, sizeof(buffer), "%s!%s@%s %s",
212380e3 198 target_p->name, target_p->username,
c88cdb00 199 target_p->host, target_p->servptr->name);
212380e3
AC
200 report_operspy(source_p, "WHOIS", buffer);
201 }
202
203 single_whois(source_p, target_p, operspy);
204 }
205 else
206 sendto_one_numeric(source_p, ERR_NOSUCHNICK,
55abcbb2 207 form_str(ERR_NOSUCHNICK),
8a1e143f 208 nick);
212380e3 209
55abcbb2 210 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
212380e3 211 form_str(RPL_ENDOFWHOIS), parv[1]);
212380e3
AC
212}
213
214/*
215 * single_whois()
216 *
217 * Inputs - source_p client to report to
218 * - target_p client to report on
219 * Output - if found return 1
220 * Side Effects - do a single whois on given client
221 * writing results to source_p
222 */
223static void
224single_whois(struct Client *source_p, struct Client *target_p, int operspy)
225{
226 char buf[BUFSIZE];
212380e3
AC
227 int cur_len = 0;
228 int mlen;
229 char *t;
230 int tlen;
231 hook_data_client hdata;
212380e3 232 int extra_space = 0;
ae52fe0f 233 struct sockaddr_in ip4;
212380e3 234
212380e3
AC
235 if(target_p->user == NULL)
236 {
237 s_assert(0);
238 return;
239 }
240
212380e3 241 sendto_one_numeric(source_p, RPL_WHOISUSER, form_str(RPL_WHOISUSER),
55abcbb2 242 target_p->name, target_p->username,
212380e3
AC
243 target_p->host, target_p->info);
244
5203cba5 245 cur_len = mlen = sprintf(buf, form_str(RPL_WHOISCHANNELS),
55abcbb2 246 get_id(&me, source_p), get_id(source_p, source_p),
212380e3
AC
247 target_p->name);
248
249 /* Make sure it won't overflow when sending it to the client
250 * in full names; note that serverhiding may require more space
251 * for a different server name (not done here) -- jilles
252 */
253 if (!MyConnect(source_p))
254 {
255 extra_space = strlen(source_p->name) - 9;
256 if (extra_space < 0)
257 extra_space = 0;
258 extra_space += strlen(me.name) - 2; /* make sure >= 0 */
259 cur_len += extra_space;
260 }
261
262 t = buf + mlen;
263
9e07c8f7
AC
264 hdata.client = source_p;
265 hdata.target = target_p;
266
04513cff 267 if (!IsService(target_p))
212380e3 268 {
5e413b13 269 hook_data_channel_visibility hdata_vis;
e8a8d7a4
EK
270 rb_dlink_node *ps, *pt;
271 struct Channel *chptr;
272 struct membership *ms, *mt;
5e413b13
EK
273
274 hdata_vis.client = source_p;
e8a8d7a4 275 hdata_vis.target = target_p;
212380e3 276
e8a8d7a4 277 ITER_COMM_CHANNELS(ps, pt, source_p->user->channel.head, target_p->user->channel.head, ms, mt, chptr)
5e413b13 278 {
e8a8d7a4 279 if (mt == NULL)
5e413b13 280 continue;
e8a8d7a4
EK
281
282 hdata_vis.chptr = chptr;
283 hdata_vis.clientms = ms;
284 hdata_vis.targetms = mt;
285 hdata_vis.approved = ms != NULL || PubChannel(chptr);
9e07c8f7 286
5e413b13 287 call_hook(doing_whois_channel_visibility_hook, &hdata_vis);
212380e3 288
5e413b13 289 if(hdata_vis.approved || operspy)
212380e3 290 {
e8a8d7a4 291 if((cur_len + strlen(chptr->chname) + strlen("!@+ ")) > (BUFSIZE - strlen("\r\n")))
04513cff
JT
292 {
293 sendto_one(source_p, "%s", buf);
294 cur_len = mlen + extra_space;
295 t = buf + mlen;
296 }
297
5203cba5 298 tlen = sprintf(t, "%s%s%s ",
5e413b13
EK
299 hdata_vis.approved ? "" : "!",
300 find_channel_status(mt, 1),
e8a8d7a4 301 chptr->chname);
04513cff
JT
302 t += tlen;
303 cur_len += tlen;
212380e3 304 }
212380e3
AC
305 }
306 }
307
308 if(cur_len > mlen + extra_space)
309 sendto_one(source_p, "%s", buf);
310
311 sendto_one_numeric(source_p, RPL_WHOISSERVER, form_str(RPL_WHOISSERVER),
c88cdb00 312 target_p->name, target_p->servptr->name,
8170176a 313 target_p->servptr->info);
212380e3 314
c127b45b 315 if(target_p->user->away)
212380e3 316 sendto_one_numeric(source_p, RPL_AWAY, form_str(RPL_AWAY),
c127b45b 317 target_p->name, target_p->user->away);
212380e3 318
1123eefc 319 if((!ConfigFileEntry.hide_opers_in_whois || IsOper(source_p)) && SeesOper(target_p, source_p))
212380e3
AC
320 {
321 sendto_one_numeric(source_p, RPL_WHOISOPERATOR, form_str(RPL_WHOISOPERATOR),
322 target_p->name,
323 IsService(target_p) ? ConfigFileEntry.servicestring :
324 (IsAdmin(target_p) ? GlobalSetOptions.adminstring :
325 GlobalSetOptions.operstring));
326 }
327
6d5be11f 328 if(!EmptyString(target_p->user->opername) && IsOper(target_p) && (target_p == source_p || HasPrivilege(source_p, "oper:privs")))
72ad5c04
AC
329 {
330 char buf[512];
ed3ca2ff
EK
331 const char *privset = "(missing)";
332 if (target_p->user->privset != NULL)
333 privset = target_p->user->privset->name;
5203cba5 334 snprintf(buf, sizeof(buf), "is opered as %s, privset %s",
ed3ca2ff 335 target_p->user->opername, privset);
72ad5c04
AC
336 sendto_one_numeric(source_p, RPL_WHOISSPECIAL, form_str(RPL_WHOISSPECIAL),
337 target_p->name, buf);
338 }
339
af7aaa84 340 if(IsSSLClient(target_p))
427a8d5d
AC
341 {
342 char cbuf[256] = "is using a secure connection";
343
fff4f763
EK
344 if (MyClient(target_p) && target_p->localClient->cipher_string != NULL &&
345 (!ConfigFileEntry.tls_ciphers_oper_only || source_p == target_p || IsOper(source_p)))
427a8d5d
AC
346 rb_snprintf_append(cbuf, sizeof(cbuf), " [%s]", target_p->localClient->cipher_string);
347
af7aaa84 348 sendto_one_numeric(source_p, RPL_WHOISSECURE, form_str(RPL_WHOISSECURE),
427a8d5d 349 target_p->name, cbuf);
d4f7eb4c 350 if((source_p == target_p || IsOperGeneral(source_p)) &&
427a8d5d
AC
351 target_p->certfp != NULL)
352 sendto_one_numeric(source_p, RPL_WHOISCERTFP,
353 form_str(RPL_WHOISCERTFP),
354 target_p->name, target_p->certfp);
355 }
af7aaa84 356
212380e3
AC
357 if(MyClient(target_p))
358 {
458c8538 359 if (IsDynSpoof(target_p) && (HasPrivilege(source_p, "auspex:hostname") || source_p == target_p))
212380e3
AC
360 {
361 /* trick here: show a nonoper their own IP if
362 * dynamic spoofed but not if auth{} spoofed
363 * -- jilles */
364 ClearDynSpoof(target_p);
365 sendto_one_numeric(source_p, RPL_WHOISHOST,
366 form_str(RPL_WHOISHOST),
367 target_p->name, target_p->orighost,
368 show_ip(source_p, target_p) ? target_p->sockhost : "255.255.255.255");
369 SetDynSpoof(target_p);
370 }
371 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p))
372 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
373 form_str(RPL_WHOISACTUALLY),
374 target_p->name, target_p->sockhost);
375
032ef5ef 376 if (GET_SS_FAMILY(&target_p->localClient->ip) == AF_INET6 &&
ae52fe0f
JT
377 (show_ip(source_p, target_p) ||
378 (source_p == target_p && !IsIPSpoof(target_p))) &&
4eafa9e6 379 rb_ipv4_from_ipv6((struct sockaddr_in6 *)&target_p->localClient->ip, &ip4))
ae52fe0f
JT
380 {
381 rb_inet_ntop_sock((struct sockaddr *)&ip4,
382 buf, sizeof buf);
383 sendto_one_numeric(source_p, RPL_WHOISTEXT,
384 "%s :Underlying IPv4 is %s",
385 target_p->name, buf);
386 }
ae52fe0f 387
212380e3 388 sendto_one_numeric(source_p, RPL_WHOISIDLE, form_str(RPL_WHOISIDLE),
55abcbb2
KB
389 target_p->name,
390 (long)(rb_current_time() - target_p->localClient->last),
77910830 391 (unsigned long)target_p->localClient->firsttime);
212380e3
AC
392 }
393 else
394 {
458c8538 395 if (IsDynSpoof(target_p) && (HasPrivilege(source_p, "auspex:hostname") || source_p == target_p))
212380e3
AC
396 {
397 ClearDynSpoof(target_p);
398 sendto_one_numeric(source_p, RPL_WHOISHOST,
399 form_str(RPL_WHOISHOST),
400 target_p->name, target_p->orighost,
401 show_ip(source_p, target_p) && !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0")? target_p->sockhost : "255.255.255.255");
402 SetDynSpoof(target_p);
403 }
404 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p) &&
405 !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0"))
406 {
407 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
408 form_str(RPL_WHOISACTUALLY),
409 target_p->name, target_p->sockhost);
55abcbb2 410
212380e3 411 }
212380e3
AC
412 }
413
212380e3
AC
414 /* doing_whois_hook must only be called for local clients,
415 * doing_whois_global_hook must only be called for local targets
416 */
417 /* it is important that these are called *before* RPL_ENDOFWHOIS is
418 * sent, services compatibility code depends on it. --anfl
419 */
420 if(MyClient(source_p))
421 call_hook(doing_whois_hook, &hdata);
422 else
423 call_hook(doing_whois_global_hook, &hdata);
212380e3 424}