X-Git-Url: https://jfr.im/git/solanum.git/blobdiff_plain/86b6be08ebb6536b03a4648691a7a60b816f8a64..b47f8a4fda31315010464212717fc8be226ba7dc:/include/client.h diff --git a/include/client.h b/include/client.h index 33491442..0261c775 100644 --- a/include/client.h +++ b/include/client.h @@ -36,7 +36,7 @@ #include "ircd_defs.h" #include "channel.h" -#include "res.h" +#include "dns.h" #include "snomask.h" #include "match.h" #include "ircd.h" @@ -53,6 +53,11 @@ struct Blacklist; #define IDLEN 10 +#define TGCHANGE_NUM 10 /* how many targets we keep track of */ +#define TGCHANGE_REPLY 5 /* how many reply targets */ +#define TGCHANGE_INITIAL 10 /* initial free targets (normal) */ +#define TGCHANGE_INITIAL_LOW 4 /* initial free targets (possible spambot) */ + /* * pre declare structs */ @@ -69,22 +74,6 @@ struct PreClient; struct ListClient; struct scache_entry; -/* - * Atheme's coding standards require that we use BSD-style user-defined types - * for stuff. Fun! --nenolod - */ -typedef struct User user_t; -typedef struct Server server_t; -typedef struct Client client_t; -typedef struct LocalUser local_user_t; -typedef struct Listener listener_t; -typedef struct DNSReply dns_reply_t; -typedef struct Whowas whowas_entry_t; -typedef struct ConfItem conf_item_t; -typedef struct AuthRequest auth_request_t; -typedef struct PreClient pre_client_t; -typedef struct ListClient list_client_t; - /* * Client structures */ @@ -100,7 +89,7 @@ struct User struct Server { - user_t *user; /* who activated this connection */ + struct User *user; /* who activated this connection */ char by[NICKLEN]; rb_dlink_list servers; rb_dlink_list users; @@ -123,12 +112,13 @@ struct Client { rb_dlink_node node; rb_dlink_node lnode; - user_t *user; /* ...defined, if this is a User */ - server_t *serv; /* ...defined, if this is a server */ - client_t *servptr; /* Points to server this Client is on */ - client_t *from; /* == self, if Local Client, *NEVER* NULL! */ + struct User *user; /* ...defined, if this is a User */ + struct Server *serv; /* ...defined, if this is a server */ + struct Client *servptr; /* Points to server this Client is on */ + struct Client *from; /* == self, if Local Client, *NEVER* NULL! */ + + rb_dlink_list whowas_clist; - whowas_entry_t *whowas; /* Pointers to whowas structs */ time_t tsinfo; /* TS on the nick, SVINFO on server */ unsigned int umodes; /* opers, normal users subset */ unsigned int flags; /* client flags */ @@ -144,10 +134,10 @@ struct Client /* client->name is the unique name for a client nick or host */ char name[HOSTLEN + 1]; - /* - * client->username is the username from ident or the USER message, - * If the client is idented the USER message is ignored, otherwise - * the username part of the USER message is put here prefixed with a + /* + * client->username is the username from ident or the USER message, + * If the client is idented the USER message is ignored, otherwise + * the username part of the USER message is put here prefixed with a * tilde depending on the I:line, Once a client has registered, this * field should be considered read-only. */ @@ -173,8 +163,11 @@ struct Client int received_number_of_privmsgs; int flood_noticed; - local_user_t *localClient; - pre_client_t *preClient; + struct LocalUser *localClient; + struct PreClient *preClient; + + time_t large_ctcp_sent; /* ctcp to large group sent, relax flood checks */ + char *certfp; /* client certificate fingerprint */ }; struct LocalUser @@ -185,13 +178,13 @@ struct LocalUser * (directly connected to *this* server with a socket. */ /* Anti flooding part, all because of lamers... */ - time_t last_join_time; /* when this client last + time_t last_join_time; /* when this client last joined a channel */ - time_t last_leave_time; /* when this client last + time_t last_leave_time; /* when this client last * left a channel */ - int join_leave_count; /* count of JOIN/LEAVE in less than + int join_leave_count; /* count of JOIN/LEAVE in less than MIN_JOIN_LEAVE_TIME seconds */ - int oper_warn_count_down; /* warn opers of this possible + int oper_warn_count_down; /* warn opers of this possible spambot every time this gets to 0 */ time_t last_caller_id_time; @@ -205,10 +198,10 @@ struct LocalUser * we want to use unsigned int here so the sizes have a better chance of * staying the same on 64 bit machines. The current trend is to use * I32LP64, (32 bit ints, 64 bit longs and pointers) and since ircd - * will NEVER run on an operating system where ints are less than 32 bits, + * will NEVER run on an operating system where ints are less than 32 bits, * it's a relatively safe bet to use ints. Since right shift operations are - * performed on these, it's not safe to allow them to become negative, - * which is possible for long running server connections. Unsigned values + * performed on these, it's not safe to allow them to become negative, + * which is possible for long running server connections. Unsigned values * generally overflow gracefully. --Bleep */ unsigned int sendM; /* Statistics: protocol messages send */ @@ -217,8 +210,8 @@ struct LocalUser unsigned int receiveK; /* Statistics: total k-bytes received */ unsigned short sendB; /* counters to count upto 1-k lots of bytes */ unsigned short receiveB; /* sent and received. */ - listener_t *listener; /* listener accepted from */ - conf_item_t *att_conf; /* attached conf */ + struct Listener *listener; /* listener accepted from */ + struct ConfItem *att_conf; /* attached conf */ struct server_conf *att_sconf; struct rb_sockaddr_storage ip; @@ -236,6 +229,7 @@ struct LocalUser char *opername; /* name of operator{} block being used or tried (challenge) */ char *challenge; char *fullcaps; + char *cipher_string; int caps; /* capabilities bit-field */ rb_fde_t *F; /* >= 0, for local clients */ @@ -243,10 +237,9 @@ struct LocalUser /* time challenge response is valid for */ time_t chal_time; - struct DNSQuery *dnsquery; /* for outgoing server's name lookup */ - - time_t last_away; /* Away since... */ + time_t next_away; /* Don't allow next away before... */ time_t last; + uint32_t connid; /* clients allowed to talk through +g */ rb_dlink_list allow_list; @@ -260,30 +253,42 @@ struct LocalUser * to avoid flooding. * -- adrian */ - int allow_read; /* how many we're allowed to read in this second */ - int actually_read; /* how many we've actually read in this second */ int sent_parsed; /* how many messages we've parsed in this second */ time_t last_knock; /* time of last knock */ unsigned long random_ping; - auth_request_t *auth_request; + struct AuthRequest *auth_request; /* target change stuff */ - uint32_t targets[10]; /* targets were aware of (fnv32(use_id(target_p))) */ - unsigned int targinfo[2]; /* cyclic array, no in use */ + /* targets we're aware of (fnv32(use_id(target_p))): + * 0..TGCHANGE_NUM-1 regular slots + * TGCHANGE_NUM..TGCHANGE_NUM+TGCHANGE_REPLY-1 reply slots + */ + uint32_t targets[TGCHANGE_NUM + TGCHANGE_REPLY]; + unsigned int targets_free; /* free targets */ time_t target_last; /* last time we cleared a slot */ - list_client_t *safelist_data; + /* ratelimit items */ + time_t ratelimit; + unsigned int join_who_credits; + + struct ListClient *safelist_data; char *mangledhost; /* non-NULL if host mangling module loaded and applicable to this client */ struct _ssl_ctl *ssl_ctl; /* which ssl daemon we're associate with */ + struct _ssl_ctl *z_ctl; /* second ctl for ssl+zlib */ + uint32_t zconnid; uint32_t localflags; struct ZipStats *zipstats; /* zipstats */ uint16_t cork_count; /* used for corking/uncorking connections */ struct ev_entry *event; /* used for associated events */ struct PrivilegeSet *privset; /* privset... */ + + char sasl_agent[IDLEN]; + unsigned char sasl_out; + unsigned char sasl_complete; }; struct PreClient @@ -292,10 +297,6 @@ struct PreClient char spoofuser[USERLEN + 1]; char spoofhost[HOSTLEN + 1]; - char sasl_agent[IDLEN]; - unsigned char sasl_out; - unsigned char sasl_complete; - rb_dlink_list dnsbl_queries; /* list of struct BlacklistClient * */ struct Blacklist *dnsbl_listed; /* first dnsbl where it's listed */ @@ -304,18 +305,10 @@ struct PreClient struct ListClient { - unsigned int hash_indice; + char *chname; unsigned int users_min, users_max; - - /* It would be nice to add other modifiers, - * but not for 1.1 --nenolod - */ -}; - -struct exit_client_hook -{ - struct Client *client_p; - char exit_message[TOPICLEN]; + time_t created_min, created_max, topic_min, topic_max; + int operspy; }; /* @@ -404,7 +397,6 @@ struct exit_client_hook #define FLAGS_GOTID 0x0080 /* successful ident lookup achieved */ #define FLAGS_FLOODDONE 0x0100 /* flood grace period over / reported */ #define FLAGS_NORMALEX 0x0400 /* Client exited normally */ -#define FLAGS_SENDQEX 0x0800 /* Sendq exceeded */ #define FLAGS_MARK 0x10000 /* marked client */ #define FLAGS_HIDDEN 0x20000 /* hidden server */ #define FLAGS_EOB 0x40000 /* EOB */ @@ -413,7 +405,7 @@ struct exit_client_hook #define FLAGS_SERVICE 0x200000 /* network service */ #define FLAGS_TGCHANGE 0x400000 /* we're allowed to clear something */ #define FLAGS_DYNSPOOF 0x800000 /* dynamic spoof, only opers see ip */ -#define FLAGS_EXUNKNOWN 0x1000000 /* too many unknowns exit.. */ +#define FLAGS_TGEXCESSIVE 0x1000000 /* whether the client has attemped to change targets excessively fast */ /* flags for local clients, this needs stuff moved from above to here at some point */ #define LFLAGS_SSL 0x00000001 @@ -440,6 +432,7 @@ struct exit_client_hook /* overflow flags */ /* EARLIER FLAGS ARE IN s_newconf.h */ +#define FLAGS2_EXTENDCHANS 0x00200000 #define FLAGS2_EXEMPTRESV 0x00400000 #define FLAGS2_EXEMPTKLINE 0x00800000 #define FLAGS2_EXEMPTFLOOD 0x01000000 @@ -452,8 +445,15 @@ struct exit_client_hook UMODE_WALLOP | UMODE_LOCOPS) #define DEFAULT_OPER_SNOMASK SNO_GENERAL -#define CLICAP_MULTI_PREFIX 0x0001 -#define CLICAP_SASL 0x0002 +#define CLICAP_MULTI_PREFIX 0x0001 +#define CLICAP_SASL 0x0002 +#define CLICAP_ACCOUNT_NOTIFY 0x0004 +#define CLICAP_EXTENDED_JOIN 0x0008 +#define CLICAP_AWAY_NOTIFY 0x0010 +#define CLICAP_TLS 0x0020 +#define CLICAP_USERHOST_IN_NAMES 0x0040 +#define CLICAP_CAP_NOTIFY 0x0080 +#define CLICAP_CHGHOST 0x0100 /* * flags macros. @@ -488,8 +488,9 @@ struct exit_client_hook #define IsDynSpoof(x) ((x)->flags & FLAGS_DYNSPOOF) #define SetDynSpoof(x) ((x)->flags |= FLAGS_DYNSPOOF) #define ClearDynSpoof(x) ((x)->flags &= ~FLAGS_DYNSPOOF) -#define IsExUnknown(x) ((x)->flags & FLAGS_EXUNKNOWN) -#define SetExUnknown(x) ((x)->flags |= FLAGS_EXUNKNOWN) +#define IsTGExcessive(x) ((x)->flags & FLAGS_TGEXCESSIVE) +#define SetTGExcessive(x) ((x)->flags |= FLAGS_TGEXCESSIVE) +#define ClearTGExcessive(x) ((x)->flags &= ~FLAGS_TGEXCESSIVE) /* local flags */ @@ -548,6 +549,8 @@ struct exit_client_hook #define SetExemptResv(x) ((x)->flags2 |= FLAGS2_EXEMPTRESV) #define IsIPSpoof(x) ((x)->flags2 & FLAGS2_IP_SPOOFING) #define SetIPSpoof(x) ((x)->flags2 |= FLAGS2_IP_SPOOFING) +#define IsExtendChans(x) ((x)->flags2 & FLAGS2_EXTENDCHANS) +#define SetExtendChans(x) ((x)->flags2 |= FLAGS2_EXTENDCHANS) /* for local users: flood grace period is over * for servers: mentioned in networknotice.c notice @@ -572,12 +575,13 @@ extern void check_klines_event(void *unused); extern void check_klines(void); extern void check_dlines(void); extern void check_xlines(void); +extern void resv_nick_fnc(const char *mask, const char *reason, int temp_time); extern const char *get_client_name(struct Client *client, int show_ip); extern const char *log_client_name(struct Client *, int); extern int is_remote_connect(struct Client *); extern void init_client(void); -extern client_t *make_client(struct Client *from); +extern struct Client *make_client(struct Client *from); extern void free_pre_client(struct Client *client); extern void free_client(struct Client *client); @@ -590,22 +594,25 @@ extern void error_exit_client(struct Client *, int); extern void count_local_client_memory(size_t * count, size_t * memory); extern void count_remote_client_memory(size_t * count, size_t * memory); -extern client_t *find_chasing(struct Client *, const char *, int *); -extern client_t *find_person(const char *); -extern client_t *find_named_person(const char *); -extern client_t *next_client(struct Client *, const char *); +extern int clean_nick(const char *, int loc_client); + +extern struct Client *find_chasing(struct Client *, const char *, int *); +extern struct Client *find_person(const char *); +extern struct Client *find_named_person(const char *); +extern struct Client *next_client(struct Client *, const char *); #define accept_message(s, t) ((s) == (t) || (rb_dlinkFind((s), &((t)->localClient->allow_list)))) extern void del_all_accepts(struct Client *client_p); -extern void dead_link(struct Client *client_p); +extern void dead_link(struct Client *client_p, int sendqex); extern int show_ip(struct Client *source_p, struct Client *target_p); -extern int show_ip_conf(struct ConfItem *aconf, struct Client *target_p); +extern int show_ip_conf(struct ConfItem *aconf, struct Client *source_p); +extern int show_ip_whowas(struct Whowas *whowas, struct Client *source_p); extern void initUser(void); extern void free_user(struct User *, struct Client *); -extern user_t *make_user(struct Client *); -extern server_t *make_server(struct Client *); +extern struct User *make_user(struct Client *); +extern struct Server *make_server(struct Client *); extern void close_connection(struct Client *); extern void init_uid(void); extern char *generate_uid(void);