2 * charybdis: A slightly useful ircd.
3 * blacklist.c: Manages DNS blacklist entries and lookups
5 * Copyright (C) 2006-2011 charybdis development team
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions are
11 * 1. Redistributions of source code must retain the above copyright notice,
12 * this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
18 * 3. The name of the author may not be used to endorse or promote products
19 * derived from this software without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
22 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
23 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
24 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
25 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
26 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
27 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
29 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
30 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31 * POSSIBILITY OF SUCH DAMAGE.
42 #include "blacklist.h"
45 rb_dlink_list blacklist_list
= { NULL
, NULL
, 0 };
47 /* private interfaces */
48 static struct Blacklist
*find_blacklist(char *name
)
52 RB_DLINK_FOREACH(nptr
, blacklist_list
.head
)
54 struct Blacklist
*blptr
= (struct Blacklist
*) nptr
->data
;
56 if (!irccmp(blptr
->host
, name
))
63 static inline int blacklist_check_reply(struct BlacklistClient
*blcptr
, struct rb_sockaddr_storage
*addr
)
65 struct Blacklist
*blptr
= blcptr
->blacklist
;
66 char ipaddr
[HOSTIPLEN
];
70 /* XXX the below two checks might want to change at some point
71 * e.g. if IPv6 blacklists don't use 127.x.y.z or A records anymore
74 if (addr
->ss_family
!= AF_INET
||
75 memcmp(&((struct sockaddr_in
*)addr
)->sin_addr
, "\177", 1))
78 /* No filters and entry found - thus positive match */
79 if (!rb_dlink_list_length(&blptr
->filters
))
82 rb_inet_ntop_sock((struct sockaddr
*)addr
, ipaddr
, sizeof(ipaddr
));
84 /* Below will prolly have to change too if the above changes */
85 if ((lastoctet
= strrchr(ipaddr
, '.')) == NULL
|| *(++lastoctet
) == '\0')
88 RB_DLINK_FOREACH(ptr
, blcptr
->blacklist
->filters
.head
)
90 struct BlacklistFilter
*filter
= ptr
->data
;
93 if (filter
->type
== BLACKLIST_FILTER_ALL
)
95 else if (filter
->type
== BLACKLIST_FILTER_LAST
)
99 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
100 "blacklist_check_reply(): Unknown filtertype (BUG!)");
104 if (strcmp(cmpstr
, filter
->filterstr
) == 0)
111 if (blcptr
->blacklist
->lastwarning
+ 3600 < rb_current_time())
113 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
114 "Garbage reply from blacklist %s",
115 blcptr
->blacklist
->host
);
116 blcptr
->blacklist
->lastwarning
= rb_current_time();
121 static void blacklist_dns_callback(void *vptr
, struct DNSReply
*reply
)
123 struct BlacklistClient
*blcptr
= (struct BlacklistClient
*) vptr
;
126 if (blcptr
== NULL
|| blcptr
->client_p
== NULL
)
129 if (blcptr
->client_p
->preClient
== NULL
)
131 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
132 "blacklist_dns_callback(): blcptr->client_p->preClient (%s) is NULL", get_client_name(blcptr
->client_p
, HIDE_IP
));
139 if (blacklist_check_reply(blcptr
, &reply
->addr
))
143 /* they have a blacklist entry for this client */
144 if (listed
&& blcptr
->client_p
->preClient
->dnsbl_listed
== NULL
)
146 blcptr
->client_p
->preClient
->dnsbl_listed
= blcptr
->blacklist
;
147 /* reference to blacklist moves from blcptr to client_p->preClient... */
150 unref_blacklist(blcptr
->blacklist
);
152 rb_dlinkDelete(&blcptr
->node
, &blcptr
->client_p
->preClient
->dnsbl_queries
);
154 /* yes, it can probably happen... */
155 if (rb_dlink_list_length(&blcptr
->client_p
->preClient
->dnsbl_queries
) == 0 && blcptr
->client_p
->flags
& FLAGS_SENTUSER
&& !EmptyString(blcptr
->client_p
->name
))
156 register_local_user(blcptr
->client_p
, blcptr
->client_p
);
161 static void initiate_blacklist_dnsquery(struct Blacklist
*blptr
, struct Client
*client_p
)
163 struct BlacklistClient
*blcptr
= rb_malloc(sizeof(struct BlacklistClient
));
164 char buf
[IRCD_RES_HOSTLEN
+ 1];
167 blcptr
->blacklist
= blptr
;
168 blcptr
->client_p
= client_p
;
170 blcptr
->dns_query
.ptr
= blcptr
;
171 blcptr
->dns_query
.callback
= blacklist_dns_callback
;
173 if ((client_p
->localClient
->ip
.ss_family
== AF_INET
) && blptr
->ipv4
)
175 ip
= (uint8_t *)&((struct sockaddr_in
*)&client_p
->localClient
->ip
)->sin_addr
.s_addr
;
177 /* becomes 2.0.0.127.torbl.ahbl.org or whatever */
178 rb_snprintf(buf
, sizeof buf
, "%d.%d.%d.%d.%s",
179 (unsigned int) ip
[3],
180 (unsigned int) ip
[2],
181 (unsigned int) ip
[1],
182 (unsigned int) ip
[0],
185 /* IPv6 is supported now. --Elizabeth */
186 else if ((client_p
->localClient
->ip
.ss_family
== AF_INET6
) && blptr
->ipv6
)
188 /* Breaks it into ip[0] = 0x00, ip[1] = 0x00... ip[16] = 0x01 for localhost
189 * I wish there was a uint4_t for C, this would make the below cleaner, but... */
190 ip
= (uint8_t *)&((struct sockaddr_in6
*)&client_p
->localClient
->ip
)->sin6_addr
.s6_addr
;
194 /* The below will give us something like
195 * 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.foobl.invalid
198 /* Going backwards */
199 for (i
= 15; i
>= 0; i
--)
201 /* Get upper and lower nibbles (yes this works fine on
202 * both big and little endian) */
203 uint8_t hi
= (ip
[i
] >> 4) & 0x0F;
204 uint8_t lo
= ip
[i
] & 0x0F;
206 /* One part... (why 5? rb_snprintf adds \0) */
207 rb_snprintf(bufptr
, 5, "%1x.%1x.",
208 (unsigned int) lo
, /* Remember, backwards */
211 /* Lurch forward to next position */
216 strcpy(bufptr
, blptr
->host
);
218 /* This shouldn't happen... */
222 gethost_byname_type(buf
, &blcptr
->dns_query
, T_A
);
224 rb_dlinkAdd(blcptr
, &blcptr
->node
, &client_p
->preClient
->dnsbl_queries
);
228 /* public interfaces */
229 struct Blacklist
*new_blacklist(char *name
, char *reject_reason
, int ipv4
, int ipv6
, rb_dlink_list
*filters
)
231 struct Blacklist
*blptr
;
233 if (name
== NULL
|| reject_reason
== NULL
)
236 blptr
= find_blacklist(name
);
239 blptr
= rb_malloc(sizeof(struct Blacklist
));
240 rb_dlinkAddAlloc(blptr
, &blacklist_list
);
243 blptr
->status
&= ~CONF_ILLEGAL
;
245 rb_strlcpy(blptr
->host
, name
, IRCD_RES_HOSTLEN
+ 1);
246 rb_strlcpy(blptr
->reject_reason
, reject_reason
, IRCD_BUFSIZE
);
250 rb_dlinkMoveList(filters
, &blptr
->filters
);
252 blptr
->lastwarning
= 0;
257 void unref_blacklist(struct Blacklist
*blptr
)
259 rb_dlink_node
*ptr
, *next_ptr
;
262 if (blptr
->status
& CONF_ILLEGAL
&& blptr
->refcount
<= 0)
264 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, blptr
->filters
.head
)
266 rb_dlinkDelete(ptr
, &blptr
->filters
);
270 rb_dlinkFindDestroy(blptr
, &blacklist_list
);
275 void lookup_blacklists(struct Client
*client_p
)
279 RB_DLINK_FOREACH(nptr
, blacklist_list
.head
)
281 struct Blacklist
*blptr
= (struct Blacklist
*) nptr
->data
;
283 if (!(blptr
->status
& CONF_ILLEGAL
))
284 initiate_blacklist_dnsquery(blptr
, client_p
);
288 void abort_blacklist_queries(struct Client
*client_p
)
290 rb_dlink_node
*ptr
, *next_ptr
;
291 struct BlacklistClient
*blcptr
;
293 if (client_p
->preClient
== NULL
)
295 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, client_p
->preClient
->dnsbl_queries
.head
)
298 rb_dlinkDelete(&blcptr
->node
, &client_p
->preClient
->dnsbl_queries
);
299 unref_blacklist(blcptr
->blacklist
);
300 delete_resolver_queries(&blcptr
->dns_query
);
305 void destroy_blacklists(void)
307 rb_dlink_node
*ptr
, *next_ptr
;
308 struct Blacklist
*blptr
;
310 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, blacklist_list
.head
)
313 blptr
->hits
= 0; /* keep it simple and consistent */
314 if (blptr
->refcount
> 0)
315 blptr
->status
|= CONF_ILLEGAL
;
319 rb_dlinkDestroy(ptr
, &blacklist_list
);