]> jfr.im git - solanum.git/blobdiff - ircd/s_serv.c
librb mbedTLS: der_pubkey is used out of scope
[solanum.git] / ircd / s_serv.c
index 7331f2172a6233f7fa51a76014568560fcf16ad5..210ed8b1b029b1fc374a0d2aac2e8f6633b190d3 100644 (file)
@@ -57,7 +57,7 @@ int MaxConnectionCount = 1;
 int MaxClientCount = 1;
 int refresh_user_links = 0;
 
-static char buf[EXT_BUFSIZE];
+static char buf[BUFSIZE];
 
 /*
  * list of recognized server capabilities.  "TS" is not on the list
@@ -103,6 +103,7 @@ unsigned int CLICAP_ECHO_MESSAGE;
 void
 init_builtin_capabs(void)
 {
+       static struct ClientCapability high_priority = {.flags = CLICAP_FLAGS_PRIORITY};
        serv_capindex = capability_index_create("server capabilities");
 
        /* These two are not set via CAPAB/GCAP keywords. */
@@ -135,13 +136,13 @@ init_builtin_capabs(void)
 
        cli_capindex = capability_index_create("client capabilities");
 
-       CLICAP_MULTI_PREFIX = capability_put(cli_capindex, "multi-prefix", NULL);
-       CLICAP_ACCOUNT_NOTIFY = capability_put(cli_capindex, "account-notify", NULL);
-       CLICAP_EXTENDED_JOIN = capability_put(cli_capindex, "extended-join", NULL);
-       CLICAP_AWAY_NOTIFY = capability_put(cli_capindex, "away-notify", NULL);
-       CLICAP_USERHOST_IN_NAMES = capability_put(cli_capindex, "userhost-in-names", NULL);
+       CLICAP_MULTI_PREFIX = capability_put(cli_capindex, "multi-prefix", &high_priority);
+       CLICAP_ACCOUNT_NOTIFY = capability_put(cli_capindex, "account-notify", &high_priority);
+       CLICAP_EXTENDED_JOIN = capability_put(cli_capindex, "extended-join", &high_priority);
+       CLICAP_AWAY_NOTIFY = capability_put(cli_capindex, "away-notify", &high_priority);
+       CLICAP_USERHOST_IN_NAMES = capability_put(cli_capindex, "userhost-in-names", &high_priority);
        CLICAP_CAP_NOTIFY = capability_put(cli_capindex, "cap-notify", NULL);
-       CLICAP_CHGHOST = capability_put(cli_capindex, "chghost", NULL);
+       CLICAP_CHGHOST = capability_put(cli_capindex, "chghost", &high_priority);
        CLICAP_ECHO_MESSAGE = capability_put(cli_capindex, "echo-message", NULL);
 }
 
@@ -297,7 +298,7 @@ try_connections(void *unused)
                 */
                client_p = find_server(NULL, tmp_p->name);
 
-               if(!client_p && (CurrUsers(cltmp) < MaxUsers(cltmp)) && !connecting)
+               if(!client_p && (CurrUsers(cltmp) < MaxAutoconn(cltmp)) && !connecting)
                {
                        server_p = tmp_p;
 
@@ -329,7 +330,7 @@ try_connections(void *unused)
         * error afterwards if it fails.
         *   -- adrian
         */
-       sendto_realops_snomask(SNO_GENERAL, L_ALL,
+       sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                        "Connection to %s activated",
                        server_p->name);
 
@@ -372,7 +373,7 @@ check_server(const char *name, struct Client *client_p)
 
                name_matched = true;
 
-               if(rb_inet_pton_sock(client_p->sockhost, (struct sockaddr *)&client_addr) <= 0)
+               if(rb_inet_pton_sock(client_p->sockhost, &client_addr) <= 0)
                        SET_SS_FAMILY(&client_addr, AF_UNSPEC);
 
                if((tmp_p->connect_host && match(tmp_p->connect_host, client_p->host))
@@ -473,13 +474,8 @@ burst_ban(struct Client *client_p)
 {
        rb_dlink_node *ptr;
        struct ConfItem *aconf;
-       const char *type, *oper;
-       /* +5 for !,@,{,} and null */
-       char operbuf[NICKLEN + USERLEN + HOSTLEN + HOSTLEN + 5];
-       char *p;
-       size_t melen;
+       const char *type;
 
-       melen = strlen(me.name);
        RB_DLINK_FOREACH(ptr, prop_bans.head)
        {
                aconf = ptr->data;
@@ -497,24 +493,6 @@ burst_ban(struct Client *client_p)
                        default:
                                continue;
                }
-               oper = aconf->info.oper;
-               if(aconf->flags & CONF_FLAGS_MYOPER)
-               {
-                       /* Our operator{} names may not be meaningful
-                        * to other servers, so rewrite to our server
-                        * name.
-                        */
-                       rb_strlcpy(operbuf, aconf->info.oper, sizeof buf);
-                       p = strrchr(operbuf, '{');
-                       if (p != NULL &&
-                                       operbuf + sizeof operbuf - p > (ptrdiff_t)(melen + 2))
-                       {
-                               memcpy(p + 1, me.name, melen);
-                               p[melen + 1] = '}';
-                               p[melen + 2] = '\0';
-                               oper = operbuf;
-                       }
-               }
                sendto_one(client_p, ":%s BAN %s %s %s %lu %d %d %s :%s%s%s",
                                me.id,
                                type,
@@ -522,7 +500,7 @@ burst_ban(struct Client *client_p)
                                (unsigned long)aconf->created,
                                (int)(aconf->hold - aconf->created),
                                (int)(aconf->lifetime - aconf->created),
-                               oper,
+                               aconf->info.oper,
                                aconf->passwd,
                                aconf->spasswd ? "|" : "",
                                aconf->spasswd ? aconf->spasswd : "");
@@ -541,51 +519,26 @@ burst_modes_TS6(struct Client *client_p, struct Channel *chptr,
 {
        rb_dlink_node *ptr;
        struct Ban *banptr;
-       char *t;
-       int tlen;
-       int mlen;
-       int cur_len;
 
-       cur_len = mlen = sprintf(buf, ":%s BMASK %ld %s %c :",
-                                   me.id, (long) chptr->channelts, chptr->chname, flag);
-       t = buf + mlen;
+       send_multiline_init(client_p, " ", ":%s BMASK %ld %s %c :",
+                       me.id,
+                       (long)chptr->channelts,
+                       chptr->chname,
+                       flag);
 
-       RB_DLINK_FOREACH(ptr, list->head)
+       RB_DLINK_FOREACH_PREV(ptr, list->tail)
        {
                banptr = ptr->data;
 
-               tlen = strlen(banptr->banstr) + (banptr->forward ? strlen(banptr->forward) + 1 : 0) + 1;
-
-               /* uh oh */
-               if(cur_len + tlen > EXT_BUFSIZE - 3)
-               {
-                       /* the one we're trying to send doesnt fit at all! */
-                       if(cur_len == mlen)
-                       {
-                               s_assert(0);
-                               continue;
-                       }
-
-                       /* chop off trailing space and send.. */
-                       *(t-1) = '\0';
-                       sendto_one(client_p, "%s", buf);
-                       cur_len = mlen;
-                       t = buf + mlen;
-               }
-
                if (banptr->forward)
-                       sprintf(t, "%s$%s ", banptr->banstr, banptr->forward);
+                       send_multiline_item(client_p, "%s$%s",
+                                       banptr->banstr,
+                                       banptr->forward);
                else
-                       sprintf(t, "%s ", banptr->banstr);
-               t += tlen;
-               cur_len += tlen;
+                       send_multiline_item(client_p, "%s", banptr->banstr);
        }
 
-       /* cant ever exit the loop above without having modified buf,
-        * chop off trailing space and send.
-        */
-       *(t-1) = '\0';
-       sendto_one(client_p, "%s", buf);
+       send_multiline_fini(client_p, NULL);
 }
 
 /*
@@ -599,7 +552,7 @@ burst_modes_TS6(struct Client *client_p, struct Channel *chptr,
 static void
 burst_TS6(struct Client *client_p)
 {
-       char ubuf[EXT_BUFSIZE];
+       char ubuf[BUFSIZE];
        struct Client *target_p;
        struct Channel *chptr;
        struct membership *msptr;
@@ -669,6 +622,12 @@ burst_TS6(struct Client *client_p)
                                   use_id(target_p),
                                   target_p->user->away);
 
+               if(IsOper(target_p) && target_p->user && target_p->user->opername && target_p->user->privset)
+                       sendto_one(client_p, ":%s OPER %s %s",
+                                       use_id(target_p),
+                                       target_p->user->opername,
+                                       target_p->user->privset->name);
+
                hclientinfo.target = target_p;
                call_hook(h_burst_client, &hclientinfo);
        }
@@ -696,7 +655,7 @@ burst_TS6(struct Client *client_p)
                        if(is_voiced(msptr))
                                tlen++;
 
-                       if(cur_len + tlen >= EXT_BUFSIZE - 3)
+                       if(cur_len + tlen >= BUFSIZE - 3)
                        {
                                *(t-1) = '\0';
                                sendto_one(client_p, "%s", buf);
@@ -762,7 +721,7 @@ burst_TS6(struct Client *client_p)
 const char *
 show_capabilities(struct Client *target_p)
 {
-       static char msgbuf[EXT_BUFSIZE];
+       static char msgbuf[BUFSIZE];
 
        *msgbuf = '\0';
 
@@ -807,7 +766,7 @@ server_estab(struct Client *client_p)
        if((server_p = client_p->localClient->att_sconf) == NULL)
        {
                /* This shouldn't happen, better tell the ops... -A1kmm */
-               sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL,
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                     "Warning: Lost connect{} block for server %s!", host);
                return exit_client(client_p, client_p, client_p, "Lost connect{} block!");
        }
@@ -1031,8 +990,8 @@ int
 serv_connect(struct server_conf *server_p, struct Client *by)
 {
        struct Client *client_p;
-       struct rb_sockaddr_storage sa_connect;
-       struct rb_sockaddr_storage sa_bind;
+       struct sockaddr_storage sa_connect[2];
+       struct sockaddr_storage sa_bind[ARRAY_SIZE(sa_connect)];
        char note[HOSTLEN + 10];
        rb_fde_t *F;
 
@@ -1040,46 +999,66 @@ serv_connect(struct server_conf *server_p, struct Client *by)
        if(server_p == NULL)
                return 0;
 
-       SET_SS_FAMILY(&sa_connect, AF_UNSPEC);
-       SET_SS_FAMILY(&sa_bind, AF_UNSPEC);
+       for (int i = 0; i < ARRAY_SIZE(sa_connect); i++) {
+               SET_SS_FAMILY(&sa_connect[i], AF_UNSPEC);
+               SET_SS_FAMILY(&sa_bind[i], AF_UNSPEC);
+       }
 
-       if(server_p->aftype != AF_UNSPEC
+       if(server_p->aftype == AF_UNSPEC
                && GET_SS_FAMILY(&server_p->connect4) == AF_INET
                && GET_SS_FAMILY(&server_p->connect6) == AF_INET6)
        {
                if(rand() % 2 == 0)
                {
-                       sa_connect = server_p->connect4;
-                       sa_bind = server_p->bind4;
+                       sa_connect[0] = server_p->connect4;
+                       sa_connect[1] = server_p->connect6;
+                       sa_bind[0] = server_p->bind4;
+                       sa_bind[1] = server_p->bind6;
                }
                else
                {
-                       sa_connect = server_p->connect6;
-                       sa_bind = server_p->bind6;
+                       sa_connect[0] = server_p->connect6;
+                       sa_connect[1] = server_p->connect4;
+                       sa_bind[0] = server_p->bind6;
+                       sa_bind[1] = server_p->bind4;
                }
        }
        else if(server_p->aftype == AF_INET || GET_SS_FAMILY(&server_p->connect4) == AF_INET)
        {
-               sa_connect = server_p->connect4;
-               sa_bind = server_p->bind4;
+               sa_connect[0] = server_p->connect4;
+               sa_bind[0] = server_p->bind4;
        }
        else if(server_p->aftype == AF_INET6 || GET_SS_FAMILY(&server_p->connect6) == AF_INET6)
        {
-               sa_connect = server_p->connect6;
-               sa_bind = server_p->bind6;
+               sa_connect[0] = server_p->connect6;
+               sa_bind[0] = server_p->bind6;
        }
 
        /* log */
-       buf[0] = 0;
-       rb_inet_ntop_sock((struct sockaddr *)&sa_connect, buf, sizeof(buf));
-       ilog(L_SERVER, "Connect to *[%s] @%s", server_p->name, buf);
+#ifdef HAVE_LIBSCTP
+       if (ServerConfSCTP(server_p) && GET_SS_FAMILY(&sa_connect[1]) != AF_UNSPEC) {
+               char buf2[HOSTLEN + 1];
+
+               buf[0] = 0;
+               buf2[0] = 0;
+               rb_inet_ntop_sock((struct sockaddr *)&sa_connect[0], buf, sizeof(buf));
+               rb_inet_ntop_sock((struct sockaddr *)&sa_connect[1], buf2, sizeof(buf2));
+               ilog(L_SERVER, "Connect to *[%s] @%s&%s", server_p->name, buf, buf2);
+       } else {
+#else
+       {
+#endif
+               buf[0] = 0;
+               rb_inet_ntop_sock((struct sockaddr *)&sa_connect[0], buf, sizeof(buf));
+               ilog(L_SERVER, "Connect to *[%s] @%s", server_p->name, buf);
+       }
 
        /*
         * Make sure this server isn't already connected
         */
        if((client_p = find_server(NULL, server_p->name)))
        {
-               sendto_realops_snomask(SNO_GENERAL, L_ALL,
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                     "Server %s already present from %s",
                                     server_p->name, client_p->name);
                if(by && IsPerson(by) && !MyClient(by))
@@ -1089,7 +1068,7 @@ serv_connect(struct server_conf *server_p, struct Client *by)
        }
 
        if (CurrUsers(server_p->class) >= MaxUsers(server_p->class)) {
-               sendto_realops_snomask(SNO_GENERAL, L_ALL,
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                     "No more connections allowed in class \"%s\" for server %s",
                                     server_p->class->class_name, server_p->name);
                if(by && IsPerson(by) && !MyClient(by))
@@ -1099,13 +1078,17 @@ serv_connect(struct server_conf *server_p, struct Client *by)
        }
 
        /* create a socket for the server connection */
-       if(GET_SS_FAMILY(&sa_connect) == AF_UNSPEC)
-       {
+       if(GET_SS_FAMILY(&sa_connect[0]) == AF_UNSPEC) {
                ilog_error("unspecified socket address family");
                return 0;
-       }
-       else if((F = rb_socket(GET_SS_FAMILY(&sa_connect), SOCK_STREAM, 0, NULL)) == NULL)
-       {
+#ifdef HAVE_LIBSCTP
+       } else if (ServerConfSCTP(server_p)) {
+               if ((F = rb_socket(AF_INET6, SOCK_STREAM, IPPROTO_SCTP, NULL)) == NULL) {
+                       ilog_error("opening a stream socket");
+                       return 0;
+               }
+#endif
+       } else if ((F = rb_socket(GET_SS_FAMILY(&sa_connect[0]), SOCK_STREAM, IPPROTO_TCP, NULL)) == NULL) {
                ilog_error("opening a stream socket");
                return 0;
        }
@@ -1126,7 +1109,8 @@ serv_connect(struct server_conf *server_p, struct Client *by)
        rb_strlcpy(client_p->sockhost, buf, sizeof(client_p->sockhost));
        client_p->localClient->F = F;
        /* shove the port number into the sockaddr */
-       SET_SS_PORT(&sa_connect, htons(server_p->port));
+       SET_SS_PORT(&sa_connect[0], htons(server_p->port));
+       SET_SS_PORT(&sa_connect[1], htons(server_p->port));
 
        /*
         * Set up the initial server evilness, ripped straight from
@@ -1161,19 +1145,31 @@ serv_connect(struct server_conf *server_p, struct Client *by)
        SetConnecting(client_p);
        rb_dlinkAddTail(client_p, &client_p->node, &global_client_list);
 
-       if(GET_SS_FAMILY(&sa_bind) == AF_UNSPEC)
-       {
-               if(GET_SS_FAMILY(&sa_connect) == GET_SS_FAMILY(&ServerInfo.bind4))
-                       sa_bind = ServerInfo.bind4;
-               if(GET_SS_FAMILY(&sa_connect) == GET_SS_FAMILY(&ServerInfo.bind6))
-                       sa_bind = ServerInfo.bind6;
+       for (int i = 0; i < ARRAY_SIZE(sa_connect); i++) {
+               if (GET_SS_FAMILY(&sa_bind[i]) == AF_UNSPEC) {
+                       if (GET_SS_FAMILY(&sa_connect[i]) == GET_SS_FAMILY(&ServerInfo.bind4))
+                               sa_bind[i] = ServerInfo.bind4;
+                       if (GET_SS_FAMILY(&sa_connect[i]) == GET_SS_FAMILY(&ServerInfo.bind6))
+                               sa_bind[i] = ServerInfo.bind6;
+               }
        }
 
-       rb_connect_tcp(client_p->localClient->F,
-               (struct sockaddr *)&sa_connect,
-               GET_SS_FAMILY(&sa_bind) == AF_UNSPEC ? NULL : (struct sockaddr *)&sa_bind,
-               ServerConfSSL(server_p) ? serv_connect_ssl_callback : serv_connect_callback,
-               client_p, ConfigFileEntry.connect_timeout);
+#ifdef HAVE_LIBSCTP
+       if (ServerConfSCTP(server_p)) {
+               rb_connect_sctp(client_p->localClient->F,
+                       sa_connect, ARRAY_SIZE(sa_connect), sa_bind, ARRAY_SIZE(sa_bind),
+                       ServerConfSSL(server_p) ? serv_connect_ssl_callback : serv_connect_callback,
+                       client_p, ConfigFileEntry.connect_timeout);
+       } else {
+#else
+       {
+#endif
+               rb_connect_tcp(client_p->localClient->F,
+                       (struct sockaddr *)&sa_connect[0],
+                       GET_SS_FAMILY(&sa_bind[0]) == AF_UNSPEC ? NULL : (struct sockaddr *)&sa_bind[0],
+                       ServerConfSSL(server_p) ? serv_connect_ssl_callback : serv_connect_callback,
+                       client_p, ConfigFileEntry.connect_timeout);
+       }
        return 1;
 }
 
@@ -1258,7 +1254,7 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
                 */
                if(status == RB_ERR_TIMEOUT || status == RB_ERROR_SSL)
                {
-                       sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL,
+                       sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                        "Error connecting to %s[%s]: %s",
                                        client_p->name,
                                        "255.255.255.255",
@@ -1270,7 +1266,7 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
                else
                {
                        errstr = strerror(rb_get_sockerr(F));
-                       sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL,
+                       sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                        "Error connecting to %s[%s]: %s (%s)",
                                        client_p->name,
                                        "255.255.255.255",
@@ -1288,7 +1284,7 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
        /* Get the C/N lines */
        if((server_p = client_p->localClient->att_sconf) == NULL)
        {
-               sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL, "Lost connect{} block for %s",
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE, "Lost connect{} block for %s",
                                client_p->name);
                exit_client(client_p, client_p, &me, "Lost connect{} block");
                return;
@@ -1296,7 +1292,7 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
 
        if(server_p->certfp && (!client_p->certfp || rb_strcasecmp(server_p->certfp, client_p->certfp) != 0))
        {
-               sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL,
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                     "Connection to %s has invalid certificate fingerprint %s",
                     client_p->name, client_p->certfp);
                ilog(L_SERVER, "Access denied, invalid certificate fingerprint %s from %s",
@@ -1328,7 +1324,7 @@ serv_connect_callback(rb_fde_t *F, int status, void *data)
         */
        if(IsAnyDead(client_p))
        {
-               sendto_realops_snomask(SNO_GENERAL, is_remote_connect(client_p) ? L_NETWIDE : L_ALL,
+               sendto_realops_snomask(SNO_GENERAL, L_NETWIDE,
                                     "%s went dead during handshake", client_p->name);
                exit_client(client_p, client_p, &me, "Went dead during handshake");
                return;