]>
jfr.im git - solanum.git/blob - ircd/hostmask.c
2 * charybdis: an advanced internet relay chat daemon (ircd).
3 * hostmask.c: Code to efficiently find IP & hostmask based configs.
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 * Copyright (C) 2005-2008 charybdis development team
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 2 of the License, or
13 * (at your option) any later version.
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
27 #include "ircd_defs.h"
33 #include "ipv4_from_ipv6.h"
36 static unsigned long hash_ipv6(struct sockaddr
*, int);
38 static unsigned long hash_ipv4(struct sockaddr
*, int);
41 /* int parse_netmask(const char *, struct rb_sockaddr_storage *, int *);
42 * Input: A hostmask, or an IPV4/6 address.
43 * Output: An integer describing whether it is an IPV4, IPV6 address or a
44 * hostmask, an address(if it is an IP mask),
45 * a bitlength(if it is IP mask).
49 parse_netmask(const char *text
, struct rb_sockaddr_storage
*naddr
, int *nb
)
51 char *ip
= LOCAL_COPY(text
);
53 struct rb_sockaddr_storage
*addr
, xaddr
;
65 if(strpbrk(ip
, "*?") != NULL
)
72 if((ptr
= strchr(ip
, '/')))
83 if(rb_inet_pton_sock(ip
, (struct sockaddr
*)addr
) > 0)
91 if((ptr
= strchr(ip
, '/')))
102 if(rb_inet_pton_sock(ip
, (struct sockaddr
*)addr
) > 0)
110 /* Hashtable stuff...now external as its used in m_stats.c */
111 struct AddressRec
*atable
[ATABLE_SIZE
];
116 memset(&atable
, 0, sizeof(atable
));
119 /* unsigned long hash_ipv4(struct rb_sockaddr_storage*)
120 * Input: An IP address.
121 * Output: A hash value of the IP address.
125 hash_ipv4(struct sockaddr
*saddr
, int bits
)
127 struct sockaddr_in
*addr
= (struct sockaddr_in
*)(void *)saddr
;
131 unsigned long av
= ntohl(addr
->sin_addr
.s_addr
) & ~((1 << (32 - bits
)) - 1);
132 return (av
^ (av
>> 12) ^ (av
>> 24)) & (ATABLE_SIZE
- 1);
138 /* unsigned long hash_ipv6(struct rb_sockaddr_storage*)
139 * Input: An IP address.
140 * Output: A hash value of the IP address.
145 hash_ipv6(struct sockaddr
*saddr
, int bits
)
147 struct sockaddr_in6
*addr
= (struct sockaddr_in6
*)(void *)saddr
;
148 unsigned long v
= 0, n
;
149 for (n
= 0; n
< 16; n
++)
153 v
^= addr
->sin6_addr
.s6_addr
[n
];
158 v
^= addr
->sin6_addr
.s6_addr
[n
] & ~((1 << (8 - bits
)) - 1);
159 return v
& (ATABLE_SIZE
- 1);
162 return v
& (ATABLE_SIZE
- 1);
164 return v
& (ATABLE_SIZE
- 1);
168 /* int hash_text(const char *start)
169 * Input: The start of the text to hash.
170 * Output: The hash of the string between 1 and (TH_MAX-1)
171 * Side-effects: None.
174 hash_text(const char *start
)
176 const char *p
= start
;
181 h
= (h
<< 4) - (h
+ (unsigned char) irctolower(*p
++));
184 return (h
& (ATABLE_SIZE
- 1));
187 /* unsigned long get_hash_mask(const char *)
188 * Input: The text to hash.
189 * Output: The hash of the string right of the first '.' past the last
190 * wildcard in the string.
191 * Side-effects: None.
194 get_mask_hash(const char *text
)
196 const char *hp
= "", *p
;
198 for (p
= text
+ strlen(text
) - 1; p
>= text
; p
--)
199 if(*p
== '*' || *p
== '?')
200 return hash_text(hp
);
203 return hash_text(text
);
206 /* struct ConfItem* find_conf_by_address(const char*, struct rb_sockaddr_storage*,
207 * int type, int fam, const char *username)
208 * Input: The hostname, the address, the type of mask to find, the address
209 * family, the username.
210 * Output: The matching value with the highest precedence.
212 * Note: Setting bit 0 of the type means that the username is ignored.
215 find_conf_by_address(const char *name
, const char *sockhost
,
216 const char *orighost
,
217 struct sockaddr
*addr
, int type
, int fam
,
218 const char *username
, const char *auth_user
)
220 unsigned long hprecv
= 0;
221 struct ConfItem
*hprec
= NULL
;
222 struct AddressRec
*arec
;
230 /* Check for IPV6 matches... */
235 for (b
= 128; b
>= 0; b
-= 16)
237 for (arec
= atable
[hash_ipv6(addr
, b
)]; arec
; arec
= arec
->next
)
238 if(arec
->type
== (type
& ~0x1) &&
239 arec
->masktype
== HM_IPV6
&&
240 comp_with_mask_sock(addr
, (struct sockaddr
*)&arec
->Mask
.ipa
.addr
,
241 arec
->Mask
.ipa
.bits
) &&
242 (type
& 0x1 || match(arec
-> username
, username
)) &&
243 (type
!= CONF_CLIENT
|| !arec
->auth_user
||
244 (auth_user
&& match(arec
->auth_user
, auth_user
))) &&
245 arec
->precedence
> hprecv
)
247 hprecv
= arec
->precedence
;
256 for (b
= 32; b
>= 0; b
-= 8)
258 for (arec
= atable
[hash_ipv4(addr
, b
)]; arec
; arec
= arec
->next
)
259 if(arec
->type
== (type
& ~0x1) &&
260 arec
->masktype
== HM_IPV4
&&
261 comp_with_mask_sock(addr
, (struct sockaddr
*)&arec
->Mask
.ipa
.addr
,
262 arec
->Mask
.ipa
.bits
) &&
263 (type
& 0x1 || match(arec
->username
, username
)) &&
264 (type
!= CONF_CLIENT
|| !arec
->auth_user
||
265 (auth_user
&& match(arec
->auth_user
, auth_user
))) &&
266 arec
->precedence
> hprecv
)
268 hprecv
= arec
->precedence
;
279 for (p
= orighost
; p
!= NULL
;)
281 for (arec
= atable
[hash_text(p
)]; arec
; arec
= arec
->next
)
283 if((arec
->type
== (type
& ~0x1)) &&
284 (arec
->masktype
== HM_HOST
) &&
285 arec
->precedence
> hprecv
&&
286 match(arec
->Mask
.hostname
, orighost
) &&
287 (type
!= CONF_CLIENT
|| !arec
->auth_user
||
288 (auth_user
&& match(arec
->auth_user
, auth_user
))) &&
289 (type
& 0x1 || match(arec
->username
, username
)))
291 hprecv
= arec
->precedence
;
300 for (arec
= atable
[0]; arec
; arec
= arec
->next
)
302 if(arec
->type
== (type
& ~0x1) &&
303 arec
->masktype
== HM_HOST
&&
304 arec
->precedence
> hprecv
&&
305 (match(arec
->Mask
.hostname
, orighost
) ||
306 (sockhost
&& match(arec
->Mask
.hostname
, sockhost
))) &&
307 (type
!= CONF_CLIENT
|| !arec
->auth_user
||
308 (auth_user
&& match(arec
->auth_user
, auth_user
))) &&
309 (type
& 0x1 || match(arec
->username
, username
)))
311 hprecv
= arec
->precedence
;
320 /* And yes - we have to check p after strchr and p after increment for
322 for (p
= name
; p
!= NULL
;)
324 for (arec
= atable
[hash_text(p
)]; arec
; arec
= arec
->next
)
325 if((arec
->type
== (type
& ~0x1)) &&
326 (arec
->masktype
== HM_HOST
) &&
327 arec
->precedence
> hprecv
&&
328 match(arec
->Mask
.hostname
, name
) &&
329 (type
!= CONF_CLIENT
|| !arec
->auth_user
||
330 (auth_user
&& match(arec
->auth_user
, auth_user
))) &&
331 (type
& 0x1 || match(arec
->username
, username
)))
333 hprecv
= arec
->precedence
;
342 for (arec
= atable
[0]; arec
; arec
= arec
->next
)
344 if(arec
->type
== (type
& ~0x1) &&
345 arec
->masktype
== HM_HOST
&&
346 arec
->precedence
> hprecv
&&
347 (match(arec
->Mask
.hostname
, name
) ||
348 (sockhost
&& match(arec
->Mask
.hostname
, sockhost
))) &&
349 (type
!= CONF_CLIENT
|| !arec
->auth_user
||
350 (auth_user
&& match(arec
->auth_user
, auth_user
))) &&
351 (type
& 0x1 || match(arec
->username
, username
)))
353 hprecv
= arec
->precedence
;
361 /* struct ConfItem* find_address_conf(const char*, const char*,
362 * struct rb_sockaddr_storage*, int);
363 * Input: The hostname, username, address, address family.
364 * Output: The applicable ConfItem.
368 find_address_conf(const char *host
, const char *sockhost
, const char *user
,
369 const char *notildeuser
, struct sockaddr
*ip
, int aftype
, char *auth_user
)
371 struct ConfItem
*iconf
, *kconf
;
374 struct sockaddr_in ip4
;
377 /* Find the best I-line... If none, return NULL -A1kmm */
378 if(!(iconf
= find_conf_by_address(host
, sockhost
, NULL
, ip
, CONF_CLIENT
, aftype
, user
, auth_user
)))
380 /* Find what their visible username will be.
381 * Note that the username without tilde may contain one char more.
383 vuser
= IsNoTilde(iconf
) ? notildeuser
: user
;
385 /* If they are exempt from K-lines, return the best I-line. -A1kmm */
386 if(IsConfExemptKline(iconf
))
389 /* Find the best K-line... -A1kmm */
390 kconf
= find_conf_by_address(host
, sockhost
, NULL
, ip
, CONF_KILL
, aftype
, user
, NULL
);
392 /* If they are K-lined, return the K-line */
396 /* if theres a spoof, check it against klines.. */
397 if(IsConfDoSpoofIp(iconf
))
399 char *p
= strchr(iconf
->info
.name
, '@');
401 /* note, we dont need to pass sockhost here, as its
402 * guaranteed to not match by whats above.. --anfl
407 kconf
= find_conf_by_address(p
+1, NULL
, NULL
, ip
, CONF_KILL
, aftype
, iconf
->info
.name
, NULL
);
411 kconf
= find_conf_by_address(iconf
->info
.name
, NULL
, NULL
, ip
, CONF_KILL
, aftype
, vuser
, NULL
);
417 /* if no_tilde, check the username without tilde against klines too
421 kconf
= find_conf_by_address(host
, sockhost
, NULL
, ip
, CONF_KILL
, aftype
, vuser
, NULL
);
427 if(ip
!= NULL
&& ip
->sa_family
== AF_INET6
&&
428 ipv4_from_ipv6((const struct sockaddr_in6
*)(const void *)ip
, &ip4
))
430 kconf
= find_conf_by_address(NULL
, NULL
, NULL
, (struct sockaddr
*)&ip4
, CONF_KILL
, AF_INET
, vuser
, NULL
);
439 /* struct ConfItem* find_dline(struct rb_sockaddr_storage*, int)
440 * Input: An address, an address family.
441 * Output: The best matching D-line or exempt line.
442 * Side effects: None.
445 find_dline(struct sockaddr
*addr
, int aftype
)
447 struct ConfItem
*aconf
;
449 struct sockaddr_in addr2
;
452 aconf
= find_conf_by_address(NULL
, NULL
, NULL
, addr
, CONF_EXEMPTDLINE
| 1, aftype
, NULL
, NULL
);
455 aconf
= find_conf_by_address(NULL
, NULL
, NULL
, addr
, CONF_DLINE
| 1, aftype
, NULL
, NULL
);
459 if(addr
->sa_family
== AF_INET6
&&
460 ipv4_from_ipv6((const struct sockaddr_in6
*)(const void *)addr
, &addr2
))
462 aconf
= find_conf_by_address(NULL
, NULL
, NULL
, (struct sockaddr
*)&addr2
, CONF_DLINE
| 1, AF_INET
, NULL
, NULL
);
470 /* void find_exact_conf_by_address(const char*, int, const char *)
472 * Output: ConfItem if found
476 find_exact_conf_by_address(const char *address
, int type
, const char *username
)
480 struct AddressRec
*arec
;
481 struct rb_sockaddr_storage addr
;
484 address
= "/NOMATCH!/";
485 masktype
= parse_netmask(address
, &addr
, &bits
);
487 if(masktype
== HM_IPV6
)
489 /* We have to do this, since we do not re-hash for every bit -A1kmm. */
490 hv
= hash_ipv6((struct sockaddr
*)&addr
, bits
- bits
% 16);
494 if(masktype
== HM_IPV4
)
496 /* We have to do this, since we do not re-hash for every bit -A1kmm. */
497 hv
= hash_ipv4((struct sockaddr
*)&addr
, bits
- bits
% 8);
501 hv
= get_mask_hash(address
);
503 for (arec
= atable
[hv
]; arec
; arec
= arec
->next
)
505 if (arec
->type
== type
&&
506 arec
->masktype
== masktype
&&
507 (arec
->username
== NULL
|| username
== NULL
? arec
->username
== username
: !irccmp(arec
->username
, username
)))
509 if (masktype
== HM_HOST
)
511 if (!irccmp(arec
->Mask
.hostname
, address
))
516 if (arec
->Mask
.ipa
.bits
== bits
&&
517 comp_with_mask_sock((struct sockaddr
*)&arec
->Mask
.ipa
.addr
, (struct sockaddr
*)&addr
, bits
))
525 /* void add_conf_by_address(const char*, int, const char *,
526 * struct ConfItem *aconf)
529 * Side-effects: Adds this entry to the hash table.
532 add_conf_by_address(const char *address
, int type
, const char *username
, const char *auth_user
, struct ConfItem
*aconf
)
534 static unsigned long prec_value
= 0xFFFFFFFF;
537 struct AddressRec
*arec
;
540 address
= "/NOMATCH!/";
541 arec
= rb_malloc(sizeof(struct AddressRec
));
542 masktype
= parse_netmask(address
, &arec
->Mask
.ipa
.addr
, &bits
);
543 arec
->Mask
.ipa
.bits
= bits
;
544 arec
->masktype
= masktype
;
546 if(masktype
== HM_IPV6
)
548 /* We have to do this, since we do not re-hash for every bit -A1kmm. */
550 arec
->next
= atable
[(hv
= hash_ipv6((struct sockaddr
*)&arec
->Mask
.ipa
.addr
, bits
))];
555 if(masktype
== HM_IPV4
)
557 /* We have to do this, since we do not re-hash for every bit -A1kmm. */
559 arec
->next
= atable
[(hv
= hash_ipv4((struct sockaddr
*)&arec
->Mask
.ipa
.addr
, bits
))];
564 arec
->Mask
.hostname
= address
;
565 arec
->next
= atable
[(hv
= get_mask_hash(address
))];
568 arec
->username
= username
;
569 arec
->auth_user
= auth_user
;
571 arec
->precedence
= prec_value
--;
575 /* void delete_one_address(const char*, struct ConfItem*)
576 * Input: An address string, the associated ConfItem.
578 * Side effects: Deletes an address record. Frees the ConfItem if there
579 * is nothing referencing it, sets it as illegal otherwise.
582 delete_one_address_conf(const char *address
, struct ConfItem
*aconf
)
586 struct AddressRec
*arec
, *arecl
= NULL
;
587 struct rb_sockaddr_storage addr
;
588 masktype
= parse_netmask(address
, &addr
, &bits
);
590 if(masktype
== HM_IPV6
)
592 /* We have to do this, since we do not re-hash for every bit -A1kmm. */
594 hv
= hash_ipv6((struct sockaddr
*)&addr
, bits
);
598 if(masktype
== HM_IPV4
)
600 /* We have to do this, since we do not re-hash for every bit -A1kmm. */
602 hv
= hash_ipv4((struct sockaddr
*)&addr
, bits
);
605 hv
= get_mask_hash(address
);
606 for (arec
= atable
[hv
]; arec
; arec
= arec
->next
)
608 if(arec
->aconf
== aconf
)
611 arecl
->next
= arec
->next
;
613 atable
[hv
] = arec
->next
;
614 aconf
->status
|= CONF_ILLEGAL
;
624 /* void clear_out_address_conf(void)
627 * Side effects: Clears out all address records in the hash table,
628 * frees them, and frees the ConfItems if nothing references
629 * them, otherwise sets them as illegal.
632 clear_out_address_conf(void)
635 struct AddressRec
**store_next
;
636 struct AddressRec
*arec
, *arecn
;
638 for (i
= 0; i
< ATABLE_SIZE
; i
++)
640 store_next
= &atable
[i
];
641 for (arec
= atable
[i
]; arec
; arec
= arecn
)
644 /* We keep the temporary K-lines and destroy the
645 * permanent ones, just to be confusing :) -A1kmm */
646 if(arec
->aconf
->flags
& CONF_FLAGS_TEMPORARY
||
647 (arec
->type
!= CONF_CLIENT
&& arec
->type
!= CONF_EXEMPTDLINE
))
650 store_next
= &arec
->next
;
654 arec
->aconf
->status
|= CONF_ILLEGAL
;
655 if(!arec
->aconf
->clients
)
656 free_conf(arec
->aconf
);
665 clear_out_address_conf_bans(void)
668 struct AddressRec
**store_next
;
669 struct AddressRec
*arec
, *arecn
;
671 for (i
= 0; i
< ATABLE_SIZE
; i
++)
673 store_next
= &atable
[i
];
674 for (arec
= atable
[i
]; arec
; arec
= arecn
)
677 /* We keep the temporary K-lines and destroy the
678 * permanent ones, just to be confusing :) -A1kmm */
679 if(arec
->aconf
->flags
& CONF_FLAGS_TEMPORARY
||
680 (arec
->type
== CONF_CLIENT
|| arec
->type
== CONF_EXEMPTDLINE
))
683 store_next
= &arec
->next
;
687 arec
->aconf
->status
|= CONF_ILLEGAL
;
688 if(!arec
->aconf
->clients
)
689 free_conf(arec
->aconf
);
699 * show_iline_prefix()
701 * inputs - pointer to struct Client requesting output
702 * - pointer to struct ConfItem
703 * - name to which iline prefix will be prefixed to
704 * output - pointer to static string with prefixes listed in ascii form
705 * side effects - NONE
708 show_iline_prefix(struct Client
*sptr
, struct ConfItem
*aconf
, char *name
)
710 static char prefix_of_host
[USERLEN
+ 15];
713 prefix_ptr
= prefix_of_host
;
716 if(IsNeedIdentd(aconf
))
718 if(IsConfDoSpoofIp(aconf
))
720 if(IsOper(sptr
) && IsConfExemptFlood(aconf
))
722 if(IsOper(sptr
) && IsConfExemptDNSBL(aconf
) && !IsConfExemptKline(aconf
))
724 if(IsOper(sptr
) && IsConfExemptKline(aconf
))
726 if(IsOper(sptr
) && IsConfExemptLimits(aconf
))
729 strncpy(prefix_ptr
, name
, USERLEN
);
730 return (prefix_of_host
);
735 * Inputs: pointer to client to report to
737 * Side effects: Reports configured auth{} blocks to client_p
740 report_auth(struct Client
*client_p
)
742 char *name
, *host
, *user
, *classname
;
744 struct AddressRec
*arec
;
745 struct ConfItem
*aconf
;
748 for (i
= 0; i
< ATABLE_SIZE
; i
++)
749 for (arec
= atable
[i
]; arec
; arec
= arec
->next
)
750 if(arec
->type
== CONF_CLIENT
)
754 if(!IsOper(client_p
) && IsConfDoSpoofIp(aconf
))
757 get_printable_conf(aconf
, &name
, &host
, &pass
, &user
, &port
,
760 if(!EmptyString(aconf
->spasswd
))
761 pass
= aconf
->spasswd
;
763 sendto_one_numeric(client_p
, RPL_STATSILINE
,
764 form_str(RPL_STATSILINE
),
765 name
, pass
, show_iline_prefix(client_p
, aconf
, user
),
766 show_ip_conf(aconf
, client_p
) ? host
: "255.255.255.255",