2 * charybdis: A slightly useful ircd.
3 * blacklist.c: Manages DNS blacklist entries and lookups
5 * Copyright (C) 2006-2011 charybdis development team
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions are
11 * 1. Redistributions of source code must retain the above copyright notice,
12 * this list of conditions and the following disclaimer.
14 * 2. Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
18 * 3. The name of the author may not be used to endorse or promote products
19 * derived from this software without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
22 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
23 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
24 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
25 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
26 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
27 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
29 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
30 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31 * POSSIBILITY OF SUCH DAMAGE.
41 #include "blacklist.h"
44 rb_dlink_list blacklist_list
= { NULL
, NULL
, 0 };
46 /* private interfaces */
47 static struct Blacklist
*find_blacklist(char *name
)
51 RB_DLINK_FOREACH(nptr
, blacklist_list
.head
)
53 struct Blacklist
*blptr
= (struct Blacklist
*) nptr
->data
;
55 if (!irccmp(blptr
->host
, name
))
62 static inline int blacklist_check_reply(struct BlacklistClient
*blcptr
, const char *ipaddr
)
64 struct Blacklist
*blptr
= blcptr
->blacklist
;
65 const char *lastoctet
;
68 /* No filters and entry found - thus positive match */
69 if (!rb_dlink_list_length(&blptr
->filters
))
72 /* Below will prolly have to change too if the above changes */
73 if ((lastoctet
= strrchr(ipaddr
, '.')) == NULL
|| *(++lastoctet
) == '\0')
76 RB_DLINK_FOREACH(ptr
, blcptr
->blacklist
->filters
.head
)
78 struct BlacklistFilter
*filter
= ptr
->data
;
81 if (filter
->type
== BLACKLIST_FILTER_ALL
)
83 else if (filter
->type
== BLACKLIST_FILTER_LAST
)
87 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
88 "blacklist_check_reply(): Unknown filtertype (BUG!)");
92 if (strcmp(cmpstr
, filter
->filterstr
) == 0)
99 if (blcptr
->blacklist
->lastwarning
+ 3600 < rb_current_time())
101 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
102 "Garbage reply from blacklist %s",
103 blcptr
->blacklist
->host
);
104 blcptr
->blacklist
->lastwarning
= rb_current_time();
109 static void blacklist_dns_callback(const char *result
, int status
, int aftype
, void *vptr
)
111 struct BlacklistClient
*blcptr
= (struct BlacklistClient
*) vptr
;
114 if (blcptr
== NULL
|| blcptr
->client_p
== NULL
)
117 if (blcptr
->client_p
->preClient
== NULL
)
119 sendto_realops_snomask(SNO_GENERAL
, L_ALL
,
120 "blacklist_dns_callback(): blcptr->client_p->preClient (%s) is NULL", get_client_name(blcptr
->client_p
, HIDE_IP
));
125 if (result
!= NULL
&& status
)
127 if (blacklist_check_reply(blcptr
, result
))
131 /* they have a blacklist entry for this client */
132 if (listed
&& blcptr
->client_p
->preClient
->dnsbl_listed
== NULL
)
134 blcptr
->client_p
->preClient
->dnsbl_listed
= blcptr
->blacklist
;
135 /* reference to blacklist moves from blcptr to client_p->preClient... */
138 unref_blacklist(blcptr
->blacklist
);
140 rb_dlinkDelete(&blcptr
->node
, &blcptr
->client_p
->preClient
->dnsbl_queries
);
142 /* yes, it can probably happen... */
143 if (rb_dlink_list_length(&blcptr
->client_p
->preClient
->dnsbl_queries
) == 0 && blcptr
->client_p
->flags
& FLAGS_SENTUSER
&& !EmptyString(blcptr
->client_p
->name
))
144 register_local_user(blcptr
->client_p
, blcptr
->client_p
);
149 static void initiate_blacklist_dnsquery(struct Blacklist
*blptr
, struct Client
*client_p
)
151 struct BlacklistClient
*blcptr
= rb_malloc(sizeof(struct BlacklistClient
));
152 char buf
[IRCD_RES_HOSTLEN
+ 1];
155 blcptr
->blacklist
= blptr
;
156 blcptr
->client_p
= client_p
;
159 if ((GET_SS_FAMILY(&client_p
->localClient
->ip
) == AF_INET
) && blptr
->ipv4
)
161 ip
= (uint8_t *)&((struct sockaddr_in
*)&client_p
->localClient
->ip
)->sin_addr
.s_addr
;
163 /* becomes 2.0.0.127.torbl.ahbl.org or whatever */
164 snprintf(buf
, sizeof buf
, "%d.%d.%d.%d.%s",
165 (unsigned int) ip
[3],
166 (unsigned int) ip
[2],
167 (unsigned int) ip
[1],
168 (unsigned int) ip
[0],
173 else if ((GET_SS_FAMILY(&client_p
->localClient
->ip
) == AF_INET6
) && blptr
->ipv6
)
175 /* Split up for rDNS lookup
176 * ex: ip[0] = 0x00, ip[1] = 0x00... ip[16] = 0x01 for localhost
178 * 1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.foobl.invalid
179 * or something like that.
181 ip
= (uint8_t *)&((struct sockaddr_in6
*)&client_p
->localClient
->ip
)->sin6_addr
.s6_addr
;
185 /* Going backwards */
186 for (i
= 15; i
>= 0; i
--, bufptr
+= 4)
188 /* Get upper and lower nibbles */
189 uint8_t hi
= (ip
[i
] >> 4) & 0x0F;
190 uint8_t lo
= ip
[i
] & 0x0F;
192 /* One part... 4 chars + terminator */
193 snprintf(bufptr
, 5, "%1x.%1x.",
194 (unsigned int) lo
, /* Remember, backwards */
199 strcpy(bufptr
, blptr
->host
);
202 /* This shouldn't happen... */
206 blcptr
->dns_id
= lookup_hostname(buf
, AF_INET
, blacklist_dns_callback
, blcptr
);
208 rb_dlinkAdd(blcptr
, &blcptr
->node
, &client_p
->preClient
->dnsbl_queries
);
212 /* public interfaces */
213 struct Blacklist
*new_blacklist(char *name
, char *reject_reason
, int ipv4
, int ipv6
, rb_dlink_list
*filters
)
215 struct Blacklist
*blptr
;
217 if (name
== NULL
|| reject_reason
== NULL
)
220 blptr
= find_blacklist(name
);
223 blptr
= rb_malloc(sizeof(struct Blacklist
));
224 rb_dlinkAddAlloc(blptr
, &blacklist_list
);
227 blptr
->status
&= ~CONF_ILLEGAL
;
229 rb_strlcpy(blptr
->host
, name
, IRCD_RES_HOSTLEN
+ 1);
230 rb_strlcpy(blptr
->reject_reason
, reject_reason
, IRCD_BUFSIZE
);
234 rb_dlinkMoveList(filters
, &blptr
->filters
);
236 blptr
->lastwarning
= 0;
241 void unref_blacklist(struct Blacklist
*blptr
)
243 rb_dlink_node
*ptr
, *next_ptr
;
246 if (blptr
->status
& CONF_ILLEGAL
&& blptr
->refcount
<= 0)
248 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, blptr
->filters
.head
)
250 rb_dlinkDelete(ptr
, &blptr
->filters
);
254 rb_dlinkFindDestroy(blptr
, &blacklist_list
);
259 void lookup_blacklists(struct Client
*client_p
)
263 RB_DLINK_FOREACH(nptr
, blacklist_list
.head
)
265 struct Blacklist
*blptr
= (struct Blacklist
*) nptr
->data
;
267 if (!(blptr
->status
& CONF_ILLEGAL
))
268 initiate_blacklist_dnsquery(blptr
, client_p
);
272 void abort_blacklist_queries(struct Client
*client_p
)
274 rb_dlink_node
*ptr
, *next_ptr
;
275 struct BlacklistClient
*blcptr
;
277 if (client_p
->preClient
== NULL
)
279 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, client_p
->preClient
->dnsbl_queries
.head
)
282 rb_dlinkDelete(&blcptr
->node
, &client_p
->preClient
->dnsbl_queries
);
283 unref_blacklist(blcptr
->blacklist
);
284 cancel_lookup(blcptr
->dns_id
);
289 void destroy_blacklists(void)
291 rb_dlink_node
*ptr
, *next_ptr
;
292 struct Blacklist
*blptr
;
294 RB_DLINK_FOREACH_SAFE(ptr
, next_ptr
, blacklist_list
.head
)
297 blptr
->hits
= 0; /* keep it simple and consistent */
298 if (blptr
->refcount
> 0)
299 blptr
->status
|= CONF_ILLEGAL
;
303 rb_dlinkDestroy(ptr
, &blacklist_list
);