]> jfr.im git - solanum.git/blob - modules/m_whois.c
ircd: add general::hide_opers_in_whois to simulate ircd-seven operhide
[solanum.git] / modules / m_whois.c
1 /*
2 * ircd-ratbox: A slightly useful ircd.
3 * m_whois.c: Shows who a user is.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
23 *
24 * $Id: m_whois.c 3536 2007-07-14 21:50:21Z jilles $
25 */
26
27 #include "stdinc.h"
28 #include "common.h"
29 #include "client.h"
30 #include "hash.h"
31 #include "channel.h"
32 #include "hash.h"
33 #include "ircd.h"
34 #include "numeric.h"
35 #include "s_conf.h"
36 #include "s_serv.h"
37 #include "send.h"
38 #include "match.h"
39 #include "s_conf.h"
40 #include "logger.h"
41 #include "msg.h"
42 #include "parse.h"
43 #include "modules.h"
44 #include "hook.h"
45 #include "s_newconf.h"
46 #include "ipv4_from_ipv6.h"
47 #include "ratelimit.h"
48 #include "s_assert.h"
49
50 static void do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]);
51 static void single_whois(struct Client *source_p, struct Client *target_p, int operspy);
52
53 static int m_whois(struct Client *, struct Client *, int, const char **);
54 static int ms_whois(struct Client *, struct Client *, int, const char **);
55
56 struct Message whois_msgtab = {
57 "WHOIS", 0, 0, 0, MFLG_SLOW,
58 {mg_unreg, {m_whois, 2}, {ms_whois, 2}, mg_ignore, mg_ignore, {m_whois, 2}}
59 };
60
61 int doing_whois_hook;
62 int doing_whois_global_hook;
63 int doing_whois_channel_visibility_hook;
64
65 mapi_clist_av1 whois_clist[] = { &whois_msgtab, NULL };
66 mapi_hlist_av1 whois_hlist[] = {
67 { "doing_whois", &doing_whois_hook },
68 { "doing_whois_global", &doing_whois_global_hook },
69 { "doing_whois_channel_visibility", &doing_whois_channel_visibility_hook },
70 { NULL, NULL }
71 };
72
73 DECLARE_MODULE_AV1(whois, NULL, NULL, whois_clist, whois_hlist, NULL, "$Revision: 3536 $");
74
75 /*
76 * m_whois
77 * parv[1] = nickname masklist
78 */
79 static int
80 m_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
81 {
82 static time_t last_used = 0;
83
84 if(parc > 2)
85 {
86 if(EmptyString(parv[2]))
87 {
88 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
89 me.name, source_p->name);
90 return 0;
91 }
92
93 if(!IsOper(source_p))
94 {
95 /* seeing as this is going across servers, we should limit it */
96 if((last_used + ConfigFileEntry.pace_wait_simple) > rb_current_time() || !ratelimit_client(source_p, 2))
97 {
98 sendto_one(source_p, form_str(RPL_LOAD2HI),
99 me.name, source_p->name, "WHOIS");
100 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
101 form_str(RPL_ENDOFWHOIS), parv[2]);
102 return 0;
103 }
104 else
105 last_used = rb_current_time();
106 }
107
108 if(hunt_server(client_p, source_p, ":%s WHOIS %s :%s", 1, parc, parv) !=
109 HUNTED_ISME)
110 return 0;
111
112 parv[1] = parv[2];
113
114 }
115 do_whois(client_p, source_p, parc, parv);
116
117 return 0;
118 }
119
120 /*
121 * ms_whois
122 * parv[1] = server to reply
123 * parv[2] = nickname to whois
124 */
125 static int
126 ms_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
127 {
128 struct Client *target_p;
129
130 /* note: early versions of ratbox allowed users to issue a remote
131 * whois with a blank parv[2], so we cannot treat it as a protocol
132 * violation. --anfl
133 */
134 if(parc < 3 || EmptyString(parv[2]))
135 {
136 sendto_one(source_p, form_str(ERR_NONICKNAMEGIVEN),
137 me.name, source_p->name);
138 return 0;
139 }
140
141 /* check if parv[1] exists */
142 if((target_p = find_client(parv[1])) == NULL)
143 {
144 sendto_one_numeric(source_p, ERR_NOSUCHSERVER,
145 form_str(ERR_NOSUCHSERVER),
146 IsDigit(parv[1][0]) ? "*" : parv[1]);
147 return 0;
148 }
149
150 /* if parv[1] isnt my client, or me, someone else is supposed
151 * to be handling the request.. so send it to them
152 */
153 if(!MyClient(target_p) && !IsMe(target_p))
154 {
155 sendto_one(target_p, ":%s WHOIS %s :%s",
156 get_id(source_p, target_p),
157 get_id(target_p, target_p), parv[2]);
158 return 0;
159 }
160
161 /* ok, the target is either us, or a client on our server, so perform the whois
162 * but first, parv[1] == server to perform the whois on, parv[2] == person
163 * to whois, so make parv[1] = parv[2] so do_whois is ok -- fl_
164 */
165 parv[1] = parv[2];
166 do_whois(client_p, source_p, parc, parv);
167
168 return 0;
169 }
170
171 /* do_whois
172 *
173 * inputs - pointer to
174 * output -
175 * side effects -
176 */
177 static void
178 do_whois(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
179 {
180 struct Client *target_p;
181 char *nick;
182 char *p = NULL;
183 int operspy = 0;
184
185 nick = LOCAL_COPY(parv[1]);
186 if((p = strchr(nick, ',')))
187 *p = '\0';
188
189 if(IsOperSpy(source_p) && *nick == '!')
190 {
191 operspy = 1;
192 nick++;
193 }
194
195 target_p = find_named_person(nick);
196 if(target_p != NULL)
197 {
198 if(operspy)
199 {
200 char buffer[BUFSIZE];
201
202 rb_snprintf(buffer, sizeof(buffer), "%s!%s@%s %s",
203 target_p->name, target_p->username,
204 target_p->host, target_p->servptr->name);
205 report_operspy(source_p, "WHOIS", buffer);
206 }
207
208 single_whois(source_p, target_p, operspy);
209 }
210 else
211 sendto_one_numeric(source_p, ERR_NOSUCHNICK,
212 form_str(ERR_NOSUCHNICK),
213 nick);
214
215 sendto_one_numeric(source_p, RPL_ENDOFWHOIS,
216 form_str(RPL_ENDOFWHOIS), parv[1]);
217 return;
218 }
219
220 /*
221 * single_whois()
222 *
223 * Inputs - source_p client to report to
224 * - target_p client to report on
225 * Output - if found return 1
226 * Side Effects - do a single whois on given client
227 * writing results to source_p
228 */
229 static void
230 single_whois(struct Client *source_p, struct Client *target_p, int operspy)
231 {
232 char buf[BUFSIZE];
233 rb_dlink_node *ptr;
234 struct membership *msptr;
235 struct Channel *chptr;
236 int cur_len = 0;
237 int mlen;
238 char *t;
239 int tlen;
240 hook_data_client hdata;
241 int extra_space = 0;
242 #ifdef RB_IPV6
243 struct sockaddr_in ip4;
244 #endif
245
246 if(target_p->user == NULL)
247 {
248 s_assert(0);
249 return;
250 }
251
252 sendto_one_numeric(source_p, RPL_WHOISUSER, form_str(RPL_WHOISUSER),
253 target_p->name, target_p->username,
254 target_p->host, target_p->info);
255
256 cur_len = mlen = rb_sprintf(buf, form_str(RPL_WHOISCHANNELS),
257 get_id(&me, source_p), get_id(source_p, source_p),
258 target_p->name);
259
260 /* Make sure it won't overflow when sending it to the client
261 * in full names; note that serverhiding may require more space
262 * for a different server name (not done here) -- jilles
263 */
264 if (!MyConnect(source_p))
265 {
266 extra_space = strlen(source_p->name) - 9;
267 if (extra_space < 0)
268 extra_space = 0;
269 extra_space += strlen(me.name) - 2; /* make sure >= 0 */
270 cur_len += extra_space;
271 }
272
273 t = buf + mlen;
274
275 hdata.client = source_p;
276 hdata.target = target_p;
277
278 if (!IsService(target_p))
279 {
280 RB_DLINK_FOREACH(ptr, target_p->user->channel.head)
281 {
282 msptr = ptr->data;
283 chptr = msptr->chptr;
284
285 hdata.chptr = chptr;
286
287 hdata.approved = ShowChannel(source_p, chptr);
288 call_hook(doing_whois_channel_visibility_hook, &hdata);
289
290 if(hdata.approved || operspy)
291 {
292 if((cur_len + strlen(chptr->chname) + 3) > (BUFSIZE - 5))
293 {
294 sendto_one(source_p, "%s", buf);
295 cur_len = mlen + extra_space;
296 t = buf + mlen;
297 }
298
299 tlen = rb_sprintf(t, "%s%s%s ",
300 hdata.approved ? "" : "!",
301 find_channel_status(msptr, 1),
302 chptr->chname);
303 t += tlen;
304 cur_len += tlen;
305 }
306 }
307 }
308
309 if(cur_len > mlen + extra_space)
310 sendto_one(source_p, "%s", buf);
311
312 sendto_one_numeric(source_p, RPL_WHOISSERVER, form_str(RPL_WHOISSERVER),
313 target_p->name, target_p->servptr->name,
314 target_p->servptr->info);
315
316 if(target_p->user->away)
317 sendto_one_numeric(source_p, RPL_AWAY, form_str(RPL_AWAY),
318 target_p->name, target_p->user->away);
319
320 if(IsOper(target_p) && (!ConfigFileEntry.hide_opers_in_whois || source_p == target_p))
321 {
322 sendto_one_numeric(source_p, RPL_WHOISOPERATOR, form_str(RPL_WHOISOPERATOR),
323 target_p->name,
324 IsService(target_p) ? ConfigFileEntry.servicestring :
325 (IsAdmin(target_p) ? GlobalSetOptions.adminstring :
326 GlobalSetOptions.operstring));
327 }
328
329 if(MyClient(target_p) && !EmptyString(target_p->localClient->opername) && IsOper(source_p))
330 {
331 char buf[512];
332 rb_snprintf(buf, sizeof(buf), "is opered as %s, privset %s",
333 target_p->localClient->opername, target_p->localClient->privset->name);
334 sendto_one_numeric(source_p, RPL_WHOISSPECIAL, form_str(RPL_WHOISSPECIAL),
335 target_p->name, buf);
336 }
337
338 if(IsSSLClient(target_p))
339 {
340 char cbuf[256] = "is using a secure connection";
341
342 if (MyClient(target_p) && target_p->localClient->cipher_string != NULL)
343 rb_snprintf_append(cbuf, sizeof(cbuf), " [%s]", target_p->localClient->cipher_string);
344
345 sendto_one_numeric(source_p, RPL_WHOISSECURE, form_str(RPL_WHOISSECURE),
346 target_p->name, cbuf);
347 if((source_p == target_p || IsOper(source_p)) &&
348 target_p->certfp != NULL)
349 sendto_one_numeric(source_p, RPL_WHOISCERTFP,
350 form_str(RPL_WHOISCERTFP),
351 target_p->name, target_p->certfp);
352 }
353
354 if(MyClient(target_p))
355 {
356 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
357 {
358 /* trick here: show a nonoper their own IP if
359 * dynamic spoofed but not if auth{} spoofed
360 * -- jilles */
361 ClearDynSpoof(target_p);
362 sendto_one_numeric(source_p, RPL_WHOISHOST,
363 form_str(RPL_WHOISHOST),
364 target_p->name, target_p->orighost,
365 show_ip(source_p, target_p) ? target_p->sockhost : "255.255.255.255");
366 SetDynSpoof(target_p);
367 }
368 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p))
369 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
370 form_str(RPL_WHOISACTUALLY),
371 target_p->name, target_p->sockhost);
372
373 #ifdef RB_IPV6
374 if (target_p->localClient->ip.ss_family == AF_INET6 &&
375 (show_ip(source_p, target_p) ||
376 (source_p == target_p && !IsIPSpoof(target_p))) &&
377 ipv4_from_ipv6((struct sockaddr_in6 *)&target_p->localClient->ip, &ip4))
378 {
379 rb_inet_ntop_sock((struct sockaddr *)&ip4,
380 buf, sizeof buf);
381 sendto_one_numeric(source_p, RPL_WHOISTEXT,
382 "%s :Underlying IPv4 is %s",
383 target_p->name, buf);
384 }
385 #endif /* RB_IPV6 */
386
387 sendto_one_numeric(source_p, RPL_WHOISIDLE, form_str(RPL_WHOISIDLE),
388 target_p->name,
389 (long)(rb_current_time() - target_p->localClient->last),
390 (unsigned long)target_p->localClient->firsttime);
391 }
392 else
393 {
394 if (IsDynSpoof(target_p) && (IsOper(source_p) || source_p == target_p))
395 {
396 ClearDynSpoof(target_p);
397 sendto_one_numeric(source_p, RPL_WHOISHOST,
398 form_str(RPL_WHOISHOST),
399 target_p->name, target_p->orighost,
400 show_ip(source_p, target_p) && !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0")? target_p->sockhost : "255.255.255.255");
401 SetDynSpoof(target_p);
402 }
403 else if(ConfigFileEntry.use_whois_actually && show_ip(source_p, target_p) &&
404 !EmptyString(target_p->sockhost) && strcmp(target_p->sockhost, "0"))
405 {
406 sendto_one_numeric(source_p, RPL_WHOISACTUALLY,
407 form_str(RPL_WHOISACTUALLY),
408 target_p->name, target_p->sockhost);
409
410 }
411 }
412
413 /* doing_whois_hook must only be called for local clients,
414 * doing_whois_global_hook must only be called for local targets
415 */
416 /* it is important that these are called *before* RPL_ENDOFWHOIS is
417 * sent, services compatibility code depends on it. --anfl
418 */
419 if(MyClient(source_p))
420 call_hook(doing_whois_hook, &hdata);
421 else
422 call_hook(doing_whois_global_hook, &hdata);
423
424 return;
425 }
426