#include "s_newconf.h"
#include "s_stats.h"
#include "send.h"
-#include "authd.h"
+#include "authproc.h"
#include "reject.h"
-#include "s_conf.h"
#include "hostmask.h"
#include "sslproc.h"
+#include "wsproc.h"
#include "hash.h"
#include "s_assert.h"
#include "logger.h"
-#ifndef INADDR_NONE
-#define INADDR_NONE ((unsigned int) 0xffffffff)
-#endif
-
-#if defined(NO_IN6ADDR_ANY) && defined(RB_IPV6)
-static const struct in6_addr in6addr_any =
-{ { { 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 } } };
-#endif
-
static struct Listener *ListenerPollList = NULL;
static int accept_precallback(rb_fde_t *F, struct sockaddr *addr, rb_socklen_t addrlen, void *data);
static void accept_callback(rb_fde_t *F, int status, struct sockaddr *addr, rb_socklen_t addrlen, void *data);
+static SSL_OPEN_CB accept_sslcallback;
static struct Listener *
make_listener(struct rb_sockaddr_storage *addr)
listener->name = me.name;
listener->F = NULL;
- memcpy(&listener->addr, addr, sizeof(struct rb_sockaddr_storage));
+ memcpy(&listener->addr, addr, sizeof(listener->addr));
listener->next = NULL;
return listener;
}
static uint16_t
get_listener_port(const struct Listener *listener)
{
-#ifdef RB_IPV6
- if(GET_SS_FAMILY(&listener->addr) == AF_INET6)
- return ntohs(((const struct sockaddr_in6 *)&listener->addr)->sin6_port);
- else
-#endif
- return ntohs(((const struct sockaddr_in *)&listener->addr)->sin_port);
+ return ntohs(GET_SS_PORT(&listener->addr[0]));
}
/*
* get_listener_name - return displayable listener name and port
- * returns "host.foo.org:6667" for a given listener
*/
const char *
get_listener_name(const struct Listener *listener)
{
- static char buf[HOSTLEN + HOSTLEN + PORTNAMELEN + 4];
-
- s_assert(NULL != listener);
- if(listener == NULL)
- return NULL;
+ static char buf[BUFSIZE];
snprintf(buf, sizeof(buf), "%s[%s/%u]",
me.name, listener->name, get_listener_port(listener));
get_listener_port(listener),
IsOperAdmin(source_p) ? listener->name : me.name,
listener->ref_count, (listener->active) ? "active" : "disabled",
+ listener->sctp ? " sctp" : " tcp",
listener->ssl ? " ssl" : "");
}
}
* inetport - create a listener socket in the AF_INET or AF_INET6 domain,
* bind it to the port given in 'port' and listen to it
* returns true (1) if successful false (0) on error.
- *
- * If the operating system has a define for SOMAXCONN, use it, otherwise
- * use CHARYBDIS_SOMAXCONN
*/
-#ifdef SOMAXCONN
-#undef CHARYBDIS_SOMAXCONN
-#define CHARYBDIS_SOMAXCONN SOMAXCONN
-#endif
static int
inetport(struct Listener *listener)
{
rb_fde_t *F;
- int opt = 1;
const char *errstr;
+ int ret;
+
+ if (listener->sctp) {
+#ifdef HAVE_LIBSCTP
+ /* only AF_INET6 sockets can have both AF_INET and AF_INET6 addresses */
+ F = rb_socket(AF_INET6, SOCK_STREAM, IPPROTO_SCTP, "Listener socket");
+#else
+ F = NULL;
+#endif
+ } else {
+ F = rb_socket(GET_SS_FAMILY(&listener->addr[0]), SOCK_STREAM, IPPROTO_TCP, "Listener socket");
+ }
- /*
- * At first, open a new socket
- */
+ memset(listener->vhost, 0, sizeof(listener->vhost));
- F = rb_socket(GET_SS_FAMILY(&listener->addr), SOCK_STREAM, 0, "Listener socket");
+ if (GET_SS_FAMILY(&listener->addr[0]) == AF_INET6) {
+ struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)&listener->addr[0];
+ rb_inet_ntop(AF_INET6, &in6->sin6_addr, listener->vhost, sizeof(listener->vhost));
+ } else if (GET_SS_FAMILY(&listener->addr[0]) == AF_INET) {
+ struct sockaddr_in *in = (struct sockaddr_in *)&listener->addr[0];
+ rb_inet_ntop(AF_INET, &in->sin_addr, listener->vhost, sizeof(listener->vhost));
+ }
-#ifdef RB_IPV6
- if(GET_SS_FAMILY(&listener->addr) == AF_INET6)
- {
- struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)&listener->addr;
- if(!IN6_ARE_ADDR_EQUAL(&in6->sin6_addr, &in6addr_any))
- {
- rb_inet_ntop(AF_INET6, &in6->sin6_addr, listener->vhost, sizeof(listener->vhost));
- listener->name = listener->vhost;
- }
- } else
-#endif
- {
- struct sockaddr_in *in = (struct sockaddr_in *)&listener->addr;
- if(in->sin_addr.s_addr != INADDR_ANY)
- {
- rb_inet_ntop(AF_INET, &in->sin_addr, listener->vhost, sizeof(listener->vhost));
- listener->name = listener->vhost;
- }
+ if (GET_SS_FAMILY(&listener->addr[1]) == AF_INET6) {
+ struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)&listener->addr[1];
+ strncat(listener->vhost, "&", sizeof(listener->vhost));
+ rb_inet_ntop(AF_INET6, &in6->sin6_addr, &listener->vhost[strlen(listener->vhost)], sizeof(listener->vhost) - strlen(listener->vhost));
+ } else if (GET_SS_FAMILY(&listener->addr[1]) == AF_INET) {
+ struct sockaddr_in *in = (struct sockaddr_in *)&listener->addr[1];
+ strncat(listener->vhost, "&", sizeof(listener->vhost));
+ rb_inet_ntop(AF_INET, &in->sin_addr, &listener->vhost[strlen(listener->vhost)], sizeof(listener->vhost) - strlen(listener->vhost));
}
- if(F == NULL)
- {
- sendto_realops_snomask(SNO_GENERAL, L_ALL,
- "Cannot open socket for listener on port %d",
- get_listener_port(listener));
- ilog(L_MAIN, "Cannot open socket for listener %s",
- get_listener_name(listener));
- return 0;
+ if (listener->vhost[0] != '\0') {
+ listener->name = listener->vhost;
}
- else if((maxconnections - 10) < rb_get_fd(F)) /* XXX this is kinda bogus*/
- {
- ilog_error("no more connections left for listener");
+
+ if (F == NULL) {
sendto_realops_snomask(SNO_GENERAL, L_ALL,
- "No more connections left for listener on port %d",
+ "Cannot open socket for listener on %s port %d",
+ listener->sctp ? "SCTP" : "TCP",
get_listener_port(listener));
- ilog(L_MAIN, "No more connections left for listener %s",
+ ilog(L_MAIN, "Cannot open socket for %s listener %s",
+ listener->sctp ? "SCTP" : "TCP",
get_listener_name(listener));
- rb_close(F);
return 0;
}
- /*
- * XXX - we don't want to do all this crap for a listener
- * set_sock_opts(listener);
- */
- if(setsockopt(rb_get_fd(F), SOL_SOCKET, SO_REUSEADDR, (char *) &opt, sizeof(opt)))
- {
- errstr = strerror(rb_get_sockerr(F));
- sendto_realops_snomask(SNO_GENERAL, L_ALL,
- "Cannot set SO_REUSEADDR for listener on port %d: %s",
- get_listener_port(listener), errstr);
- ilog(L_MAIN, "Cannot set SO_REUSEADDR for listener %s: %s",
- get_listener_name(listener), errstr);
- rb_close(F);
- return 0;
+ if (listener->sctp) {
+ ret = rb_sctp_bindx(F, listener->addr, ARRAY_SIZE(listener->addr));
+ } else {
+ ret = rb_bind(F, (struct sockaddr *)&listener->addr[0]);
}
- /*
- * Bind a port to listen for new connections if port is non-null,
- * else assume it is already open and try get something from it.
- */
-
- if(bind(rb_get_fd(F), (struct sockaddr *) &listener->addr, GET_SS_LEN(&listener->addr)))
- {
+ if (ret) {
errstr = strerror(rb_get_sockerr(F));
sendto_realops_snomask(SNO_GENERAL, L_ALL,
- "Cannot bind for listener on port %d: %s",
+ "Cannot bind for listener on %s port %d: %s",
+ listener->sctp ? "SCTP" : "TCP",
get_listener_port(listener), errstr);
- ilog(L_MAIN, "Cannot bind for listener %s: %s",
+ ilog(L_MAIN, "Cannot bind for %s listener %s: %s",
+ listener->sctp ? "SCTP" : "TCP",
get_listener_name(listener), errstr);
rb_close(F);
return 0;
}
- if(rb_listen(F, CHARYBDIS_SOMAXCONN, listener->defer_accept))
+ if(rb_listen(F, SOMAXCONN, listener->defer_accept))
{
errstr = strerror(rb_get_sockerr(F));
sendto_realops_snomask(SNO_GENERAL, L_ALL,
- "Cannot listen() for listener on port %d: %s",
+ "Cannot listen() for listener on %s port %d: %s",
+ listener->sctp ? "SCTP" : "TCP",
get_listener_port(listener), errstr);
- ilog(L_MAIN, "Cannot listen() for listener %s: %s",
+ ilog(L_MAIN, "Cannot listen() for %s listener %s: %s",
+ listener->sctp ? "SCTP" : "TCP",
get_listener_name(listener), errstr);
rb_close(F);
return 0;
}
static struct Listener *
-find_listener(struct rb_sockaddr_storage *addr)
+find_listener(struct rb_sockaddr_storage *addr, int sctp)
{
struct Listener *listener = NULL;
struct Listener *last_closed = NULL;
- for (listener = ListenerPollList; listener; listener = listener->next)
- {
- if(GET_SS_FAMILY(addr) != GET_SS_FAMILY(&listener->addr))
+ for (listener = ListenerPollList; listener; listener = listener->next) {
+ if (listener->sctp != sctp)
continue;
- switch(GET_SS_FAMILY(addr))
- {
- case AF_INET:
- {
- struct sockaddr_in *in4 = (struct sockaddr_in *)addr;
- struct sockaddr_in *lin4 = (struct sockaddr_in *)&listener->addr;
- if(in4->sin_addr.s_addr == lin4->sin_addr.s_addr &&
- in4->sin_port == lin4->sin_port )
+ for (int i = 0; i < ARRAY_SIZE(listener->addr); i++) {
+ if (GET_SS_FAMILY(&addr[i]) != GET_SS_FAMILY(&listener->addr[i]))
+ goto next;
+
+ switch (GET_SS_FAMILY(&addr[i])) {
+ case AF_INET:
{
- if(listener->F == NULL)
- last_closed = listener;
- else
- return(listener);
+ struct sockaddr_in *in4 = (struct sockaddr_in *)&addr[i];
+ struct sockaddr_in *lin4 = (struct sockaddr_in *)&listener->addr[i];
+ if(in4->sin_addr.s_addr != lin4->sin_addr.s_addr ||
+ in4->sin_port != lin4->sin_port)
+ {
+ goto next;
+ }
+ break;
}
- break;
- }
-#ifdef RB_IPV6
- case AF_INET6:
- {
- struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)addr;
- struct sockaddr_in6 *lin6 =(struct sockaddr_in6 *)&listener->addr;
- if(IN6_ARE_ADDR_EQUAL(&in6->sin6_addr, &lin6->sin6_addr) &&
- in6->sin6_port == lin6->sin6_port)
+
+ case AF_INET6:
{
- if(listener->F == NULL)
- last_closed = listener;
- else
- return(listener);
+ struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)&addr[i];
+ struct sockaddr_in6 *lin6 =(struct sockaddr_in6 *)&listener->addr[i];
+ if (!IN6_ARE_ADDR_EQUAL(&in6->sin6_addr, &lin6->sin6_addr) ||
+ in6->sin6_port != lin6->sin6_port)
+ {
+ goto next;
+ }
+ break;
}
- break;
+ default:
+ break;
}
-#endif
+ }
- default:
- break;
+ if (listener->F == NULL) {
+ last_closed = listener;
+ } else {
+ return listener;
}
+
+next:
+ continue;
}
return last_closed;
}
/*
- * add_listener- create a new listener
+ * add_tcp_listener- create a new listener
* port - the port number to listen on
* vhost_ip - if non-null must contain a valid IP address string in
* the format "255.255.255.255"
*/
void
-add_listener(int port, const char *vhost_ip, int family, int ssl, int defer_accept)
+add_tcp_listener(int port, const char *vhost_ip, int family, int ssl, int defer_accept, int wsock)
{
struct Listener *listener;
- struct rb_sockaddr_storage vaddr;
+ struct rb_sockaddr_storage vaddr[ARRAY_SIZE(listener->addr)];
/*
* if no port in conf line, don't bother
*/
- if(port == 0)
+ if (port == 0)
return;
memset(&vaddr, 0, sizeof(vaddr));
- SET_SS_FAMILY(&vaddr, family);
-
- if(vhost_ip != NULL)
- {
- if(family == AF_INET)
- {
- if(rb_inet_pton(family, vhost_ip, &((struct sockaddr_in *)&vaddr)->sin_addr) <= 0)
+ SET_SS_FAMILY(&vaddr[0], AF_UNSPEC);
+ SET_SS_LEN(&vaddr[0], sizeof(struct sockaddr_storage));
+ SET_SS_FAMILY(&vaddr[1], AF_UNSPEC);
+ SET_SS_LEN(&vaddr[1], sizeof(struct sockaddr_storage));
+
+ if (vhost_ip != NULL) {
+ if (family == AF_INET) {
+ if (rb_inet_pton(family, vhost_ip, &((struct sockaddr_in *)&vaddr[0])->sin_addr) <= 0)
return;
- }
-#ifdef RB_IPV6
- else
- {
- if(rb_inet_pton(family, vhost_ip, &((struct sockaddr_in6 *)&vaddr)->sin6_addr) <= 0)
+ } else {
+ if (rb_inet_pton(family, vhost_ip, &((struct sockaddr_in6 *)&vaddr[0])->sin6_addr) <= 0)
return;
-
}
-#endif
- } else
- {
- switch(family)
- {
+ } else {
+ switch(family) {
case AF_INET:
- ((struct sockaddr_in *)&vaddr)->sin_addr.s_addr = INADDR_ANY;
+ ((struct sockaddr_in *)&vaddr[0])->sin_addr.s_addr = INADDR_ANY;
break;
-#ifdef RB_IPV6
case AF_INET6:
- memcpy(&((struct sockaddr_in6 *)&vaddr)->sin6_addr, &in6addr_any, sizeof(struct in6_addr));
+ memcpy(&((struct sockaddr_in6 *)&vaddr[0])->sin6_addr, &in6addr_any, sizeof(struct in6_addr));
break;
default:
return;
-#endif
}
}
- switch(family)
- {
+ switch(family) {
case AF_INET:
- SET_SS_LEN(&vaddr, sizeof(struct sockaddr_in));
- ((struct sockaddr_in *)&vaddr)->sin_port = htons(port);
+ SET_SS_LEN(&vaddr[0], sizeof(struct sockaddr_in));
+ SET_SS_FAMILY(&vaddr[0], AF_INET);
+ SET_SS_PORT(&vaddr[0], htons(port));
break;
-#ifdef RB_IPV6
case AF_INET6:
- SET_SS_LEN(&vaddr, sizeof(struct sockaddr_in6));
- ((struct sockaddr_in6 *)&vaddr)->sin6_port = htons(port);
+ SET_SS_LEN(&vaddr[0], sizeof(struct sockaddr_in6));
+ SET_SS_FAMILY(&vaddr[0], AF_INET6);
+ SET_SS_PORT(&vaddr[0], htons(port));
break;
-#endif
default:
break;
}
- if((listener = find_listener(&vaddr)))
- {
- if(listener->F != NULL)
+ if ((listener = find_listener(vaddr, 0))) {
+ if (listener->F != NULL)
return;
- }
- else
- {
- listener = make_listener(&vaddr);
+ } else {
+ listener = make_listener(vaddr);
listener->next = ListenerPollList;
ListenerPollList = listener;
}
listener->F = NULL;
listener->ssl = ssl;
listener->defer_accept = defer_accept;
+ listener->sctp = 0;
+ listener->wsock = wsock;
- if(inetport(listener))
+ if (inetport(listener)) {
listener->active = 1;
- else
+ } else {
close_listener(listener);
+ }
+}
+
+/*
+ * add_sctp_listener- create a new listener
+ * port - the port number to listen on
+ * vhost_ip1/2 - if non-null must contain a valid IP address string
+ */
+void
+add_sctp_listener(int port, const char *vhost_ip1, const char *vhost_ip2, int ssl, int wsock)
+{
+ struct Listener *listener;
+ struct rb_sockaddr_storage vaddr[ARRAY_SIZE(listener->addr)];
+
+ /*
+ * if no port in conf line, don't bother
+ */
+ if (port == 0)
+ return;
+ memset(&vaddr, 0, sizeof(vaddr));
+
+ if (vhost_ip1 != NULL) {
+ if (rb_inet_pton_sock(vhost_ip1, &vaddr[0]) <= 0)
+ return;
+
+ if (vhost_ip2 != NULL) {
+ if (rb_inet_pton_sock(vhost_ip2, &vaddr[1]) <= 0)
+ return;
+ } else {
+ SET_SS_FAMILY(&vaddr[1], AF_UNSPEC);
+ SET_SS_LEN(&vaddr[1], sizeof(struct sockaddr_storage));
+ }
+
+ if (GET_SS_FAMILY(&vaddr[0]) == AF_INET && GET_SS_FAMILY(&vaddr[1]) == AF_INET6) {
+ /* always put INET6 first */
+ struct rb_sockaddr_storage tmp;
+ tmp = vaddr[0];
+ vaddr[0] = vaddr[1];
+ vaddr[1] = tmp;
+ }
+ } else {
+ memcpy(&((struct sockaddr_in6 *)&vaddr[0])->sin6_addr, &in6addr_any, sizeof(struct in6_addr));
+ SET_SS_FAMILY(&vaddr[0], AF_INET6);
+ SET_SS_LEN(&vaddr[0], sizeof(struct sockaddr_in6));
+
+ SET_SS_FAMILY(&vaddr[1], AF_UNSPEC);
+ SET_SS_LEN(&vaddr[1], sizeof(struct sockaddr_storage));
+ }
+
+ SET_SS_PORT(&vaddr[0], htons(port));
+ SET_SS_PORT(&vaddr[1], htons(port));
+
+ if ((listener = find_listener(vaddr, 1))) {
+ if(listener->F != NULL)
+ return;
+ } else {
+ listener = make_listener(vaddr);
+ listener->next = ListenerPollList;
+ ListenerPollList = listener;
+ }
+
+ listener->F = NULL;
+ listener->ssl = ssl;
+ listener->defer_accept = 0;
+ listener->sctp = 1;
+ listener->wsock = wsock;
+
+ if (inetport(listener)) {
+ listener->active = 1;
+ } else {
+ close_listener(listener);
+ }
}
/*
}
}
-#define DLINE_WARNING "ERROR :You have been D-lined.\r\n"
-
/*
* add_connection - creates a client which has just connected to us on
* the given fd. The sockhost field is initialized with the ip# of the host.
add_connection(struct Listener *listener, rb_fde_t *F, struct sockaddr *sai, struct sockaddr *lai)
{
struct Client *new_client;
+ bool defer = false;
s_assert(NULL != listener);
/*
* the client has already been checked out in accept_connection
*/
new_client = make_client(NULL);
+ new_client->localClient->F = F;
+
+ memcpy(&new_client->localClient->ip, sai, sizeof(struct rb_sockaddr_storage));
+ memcpy(&new_client->preClient->lip, lai, sizeof(struct rb_sockaddr_storage));
+
+ /*
+ * copy address to 'sockhost' as a string, copy it to host too
+ * so we have something valid to put into error messages...
+ */
+ rb_inet_ntop_sock((struct sockaddr *)&new_client->localClient->ip, new_client->sockhost,
+ sizeof(new_client->sockhost));
+
+ rb_strlcpy(new_client->host, new_client->sockhost, sizeof(new_client->host));
+
+ if (listener->sctp) {
+ SetSCTP(new_client);
+ }
if (listener->ssl)
{
rb_fde_t *xF[2];
if(rb_socketpair(AF_UNIX, SOCK_STREAM, 0, &xF[0], &xF[1], "Incoming ssld Connection") == -1)
{
- free_client(new_client);
+ SetIOError(new_client);
+ exit_client(new_client, new_client, new_client, "Fatal Error");
return;
}
+ new_client->localClient->ssl_callback = accept_sslcallback;
+ defer = true;
new_client->localClient->ssl_ctl = start_ssld_accept(F, xF[1], connid_get(new_client)); /* this will close F for us */
if(new_client->localClient->ssl_ctl == NULL)
{
- free_client(new_client);
+ SetIOError(new_client);
+ exit_client(new_client, new_client, new_client, "Service Unavailable");
return;
}
F = xF[0];
+ new_client->localClient->F = F;
SetSSL(new_client);
}
- memcpy(&new_client->localClient->ip, sai, sizeof(struct rb_sockaddr_storage));
- memcpy(&new_client->preClient->lip, lai, sizeof(struct rb_sockaddr_storage));
-
- /*
- * copy address to 'sockhost' as a string, copy it to host too
- * so we have something valid to put into error messages...
- */
- rb_inet_ntop_sock((struct sockaddr *)&new_client->localClient->ip, new_client->sockhost,
- sizeof(new_client->sockhost));
-
-
- rb_strlcpy(new_client->host, new_client->sockhost, sizeof(new_client->host));
+ if (listener->wsock)
+ {
+ rb_fde_t *xF[2];
+ if(rb_socketpair(AF_UNIX, SOCK_STREAM, 0, &xF[0], &xF[1], "Incoming wsockd Connection") == -1)
+ {
+ SetIOError(new_client);
+ exit_client(new_client, new_client, new_client, "Fatal Error");
+ return;
+ }
+ new_client->localClient->ws_ctl = start_wsockd_accept(F, xF[1], connid_get(new_client)); /* this will close F for us */
+ if(new_client->localClient->ws_ctl == NULL)
+ {
+ SetIOError(new_client);
+ exit_client(new_client, new_client, new_client, "Service Unavailable");
+ return;
+ }
+ F = xF[0];
+ new_client->localClient->F = F;
+ }
- new_client->localClient->F = F;
new_client->localClient->listener = listener;
++listener->ref_count;
- authd_initiate_client(new_client);
+ authd_initiate_client(new_client, defer);
+}
+
+static int
+accept_sslcallback(struct Client *client_p, int status)
+{
+ authd_deferred_client(client_p);
+ return 0; /* use default handler if status != RB_OK */
}
static const char *toofast = "ERROR :Reconnecting too fast, throttled.\r\n";
return 0;
}
- if(check_reject(F, addr))
+ if(check_reject(F, addr)) {
+ /* Reject the connection without closing the socket
+ * because it is now on the delay_exit list. */
return 0;
+ }
if(throttle_add(addr))
{