X-Git-Url: https://jfr.im/git/solanum.git/blobdiff_plain/e55bb3da3d19dc2c4116da20a0ae5c238e09df27..c287438827f8e15610e5110500404cec74a7adab:/modules/core/m_message.c diff --git a/modules/core/m_message.c b/modules/core/m_message.c index 67a69da8..fc0896ff 100644 --- a/modules/core/m_message.c +++ b/modules/core/m_message.c @@ -35,7 +35,7 @@ #include "parse.h" #include "modules.h" #include "channel.h" -#include "irc_string.h" +#include "match.h" #include "hash.h" #include "class.h" #include "msg.h" @@ -43,6 +43,7 @@ #include "send.h" #include "s_newconf.h" #include "s_stats.h" +#include "inline/stringops.h" static int m_message(int, const char *, struct Client *, struct Client *, int, const char **); static int m_privmsg(struct Client *, struct Client *, int, const char **); @@ -89,10 +90,10 @@ static int build_target_list(int p_or_n, const char *command, struct Client *client_p, struct Client *source_p, const char *nicks_channels, const char *text); +static struct Channel *find_allowing_channel(struct Client *source_p, struct Client *target_p); static int flood_attack_client(int p_or_n, struct Client *source_p, struct Client *target_p); static int flood_attack_channel(int p_or_n, struct Client *source_p, struct Channel *chptr, char *chname); -static struct Client *find_userhost(const char *, const char *, int *); #define ENTITY_NONE 0 #define ENTITY_CHANNEL 1 @@ -250,7 +251,7 @@ build_target_list(int p_or_n, const char *command, struct Client *client_p, ntargets = 0; - for(nick = strtoken(&p, target_list, ","); nick; nick = strtoken(&p, NULL, ",")) + for(nick = rb_strtok_r(target_list, ",", &p); nick; nick = rb_strtok_r(NULL, ",", &p)) { char *with_prefix; /* @@ -451,7 +452,7 @@ msg_channel(int p_or_n, const char *command, if(chptr->mode.mode & MODE_NOCOLOR) { - strlcpy(text2, text, BUFSIZE); + rb_strlcpy(text2, text, BUFSIZE); strip_colour(text2); text = text2; if (EmptyString(text)) @@ -561,63 +562,75 @@ expire_tgchange(void *unused) } } -static int -add_target(struct Client *source_p, struct Client *target_p) -{ - unsigned int i, j; - /* messaging themselves, doesnt incur any penalties */ - if(source_p == target_p) - return 1; - - if(USED_TARGETS(source_p)) - { - /* hunt for an existing target */ - for(i = PREV_FREE_TARGET(source_p), j = USED_TARGETS(source_p); - j; - --j, PREV_TARGET(i)) - { - if(source_p->localClient->targets[i] == target_p) - return 1; - } - - /* first message after connect, we may only start clearing - * slots after this message --anfl - */ - if(!IsTGChange(source_p)) - { - SetTGChange(source_p); - source_p->localClient->target_last = rb_current_time(); - } - /* clear as many targets as we can */ - else if((i = (rb_current_time() - source_p->localClient->target_last) / 60)) - { - if(i > USED_TARGETS(source_p)) - USED_TARGETS(source_p) = 0; - else - USED_TARGETS(source_p) -= i; - - source_p->localClient->target_last = rb_current_time(); - } - /* cant clear any, full target list */ - else if(USED_TARGETS(source_p) == 10) - { - add_tgchange(source_p->sockhost); - return 0; - } - } - /* no targets in use, reset their target_last so that they cant - * abuse a long idle to get targets back more quickly - */ - else - { - source_p->localClient->target_last = rb_current_time(); - SetTGChange(source_p); - } - - source_p->localClient->targets[FREE_TARGET(source_p)] = target_p; - NEXT_TARGET(FREE_TARGET(source_p)); - ++USED_TARGETS(source_p); - return 1; +static int +add_target(struct Client *source_p, struct Client *target_p) +{ + int i, j; + uint32_t hashv; + + /* can msg themselves or services without using any target slots */ + if(source_p == target_p || IsService(target_p)) + return 1; + + /* special condition for those who have had PRIVMSG crippled to allow them + * to talk to IRCops still. + * + * XXX: is this controversial? + */ + if(source_p->localClient->target_last > rb_current_time() && IsOper(target_p)) + return 1; + + hashv = fnv_hash_upper((const unsigned char *)use_id(target_p), 32); + + if(USED_TARGETS(source_p)) + { + /* hunt for an existing target */ + for(i = PREV_FREE_TARGET(source_p), j = USED_TARGETS(source_p); + j; --j, PREV_TARGET(i)) + { + if(source_p->localClient->targets[i] == hashv) + return 1; + } + + /* first message after connect, we may only start clearing + * slots after this message --anfl + */ + if(!IsTGChange(source_p)) + { + SetTGChange(source_p); + source_p->localClient->target_last = rb_current_time(); + } + /* clear as many targets as we can */ + else if((i = (rb_current_time() - source_p->localClient->target_last) / 60)) + { + if(i > USED_TARGETS(source_p)) + USED_TARGETS(source_p) = 0; + else + USED_TARGETS(source_p) -= i; + + source_p->localClient->target_last = rb_current_time(); + } + /* cant clear any, full target list */ + else if(USED_TARGETS(source_p) == 10) + { + ServerStats.is_tgch++; + add_tgchange(source_p->sockhost); + return 0; + } + } + /* no targets in use, reset their target_last so that they cant + * abuse a long idle to get targets back more quickly + */ + else + { + source_p->localClient->target_last = rb_current_time(); + SetTGChange(source_p); + } + + source_p->localClient->targets[FREE_TARGET(source_p)] = hashv; + NEXT_TARGET(FREE_TARGET(source_p)); + ++USED_TARGETS(source_p); + return 1; } /* @@ -636,6 +649,8 @@ static void msg_client(int p_or_n, const char *command, struct Client *source_p, struct Client *target_p, const char *text) { + int do_floodcount = 0; + if(MyClient(source_p)) { /* reset idle time for message only if its not to self @@ -643,12 +658,16 @@ msg_client(int p_or_n, const char *command, if(p_or_n != NOTICE) source_p->localClient->last = rb_current_time(); + /* auto cprivmsg/cnotice */ + do_floodcount = !IsOper(source_p) && + !find_allowing_channel(source_p, target_p); + /* target change stuff, dont limit ctcp replies as that * would allow people to start filling up random users * targets just by ctcping them */ if((p_or_n != NOTICE || *text != '\001') && - ConfigFileEntry.target_change && !IsOper(source_p)) + ConfigFileEntry.target_change && do_floodcount) { if(!add_target(source_p, target_p)) { @@ -691,7 +710,8 @@ msg_client(int p_or_n, const char *command, form_str(ERR_NONONREG), target_p->name); /* Only so opers can watch for floods */ - (void) flood_attack_client(p_or_n, source_p, target_p); + if (do_floodcount) + (void) flood_attack_client(p_or_n, source_p, target_p); } else { @@ -718,7 +738,8 @@ msg_client(int p_or_n, const char *command, target_p->localClient->last_caller_id_time = rb_current_time(); } /* Only so opers can watch for floods */ - (void) flood_attack_client(p_or_n, source_p, target_p); + if (do_floodcount) + (void) flood_attack_client(p_or_n, source_p, target_p); } } else @@ -728,18 +749,33 @@ msg_client(int p_or_n, const char *command, * we dont give warnings.. we then check if theyre opered * (to avoid flood warnings), lastly if theyre our client * and flooding -- fl */ - if(!MyClient(source_p) || IsOper(source_p) || + if(!do_floodcount || !flood_attack_client(p_or_n, source_p, target_p)) sendto_anywhere(target_p, source_p, command, ":%s", text); } } - else if(!MyClient(source_p) || IsOper(source_p) || + else if(!do_floodcount || !flood_attack_client(p_or_n, source_p, target_p)) sendto_anywhere(target_p, source_p, command, ":%s", text); return; } +static struct Channel * +find_allowing_channel(struct Client *source_p, struct Client *target_p) +{ + rb_dlink_node *ptr; + struct membership *msptr; + + RB_DLINK_FOREACH(ptr, source_p->user->channel.head) + { + msptr = ptr->data; + if (is_chanop_voiced(msptr) && IsMember(target_p, msptr->chptr)) + return msptr->chptr; + } + return NULL; +} + /* * flood_attack_client * inputs - flag 0 if PRIVMSG 1 if NOTICE. RFC @@ -754,33 +790,38 @@ flood_attack_client(int p_or_n, struct Client *source_p, struct Client *target_p { int delta; - if(GlobalSetOptions.floodcount && MyConnect(target_p) && IsClient(source_p)) + /* Services could get many messages legitimately and + * can be messaged without rate limiting via aliases + * and msg user@server. + * -- jilles + */ + if(GlobalSetOptions.floodcount && IsClient(source_p) && source_p != target_p && !IsService(target_p)) { - if((target_p->localClient->first_received_message_time + 1) < rb_current_time()) + if((target_p->first_received_message_time + 1) < rb_current_time()) { - delta = rb_current_time() - target_p->localClient->first_received_message_time; - target_p->localClient->received_number_of_privmsgs -= delta; - target_p->localClient->first_received_message_time = rb_current_time(); - if(target_p->localClient->received_number_of_privmsgs <= 0) + delta = rb_current_time() - target_p->first_received_message_time; + target_p->received_number_of_privmsgs -= delta; + target_p->first_received_message_time = rb_current_time(); + if(target_p->received_number_of_privmsgs <= 0) { - target_p->localClient->received_number_of_privmsgs = 0; - target_p->localClient->flood_noticed = 0; + target_p->received_number_of_privmsgs = 0; + target_p->flood_noticed = 0; } } - if((target_p->localClient->received_number_of_privmsgs >= - GlobalSetOptions.floodcount) || target_p->localClient->flood_noticed) + if((target_p->received_number_of_privmsgs >= + GlobalSetOptions.floodcount) || target_p->flood_noticed) { - if(target_p->localClient->flood_noticed == 0) + if(target_p->flood_noticed == 0) { sendto_realops_snomask(SNO_BOTS, L_NETWIDE, "Possible Flooder %s[%s@%s] on %s target: %s", source_p->name, source_p->username, source_p->orighost, source_p->servptr->name, target_p->name); - target_p->localClient->flood_noticed = 1; + target_p->flood_noticed = 1; /* add a bit of penalty */ - target_p->localClient->received_number_of_privmsgs += 2; + target_p->received_number_of_privmsgs += 2; } if(MyClient(source_p) && (p_or_n != NOTICE)) sendto_one(source_p, @@ -789,7 +830,7 @@ flood_attack_client(int p_or_n, struct Client *source_p, struct Client *target_p return 1; } else - target_p->localClient->received_number_of_privmsgs++; + target_p->received_number_of_privmsgs++; } return 0; @@ -873,7 +914,6 @@ handle_special(int p_or_n, const char *command, struct Client *client_p, struct Client *source_p, const char *nick, const char *text) { struct Client *target_p; - char *host; char *server; char *s; int count; @@ -911,39 +951,23 @@ handle_special(int p_or_n, const char *command, struct Client *client_p, return; } - *server = '\0'; - - if((host = strchr(nick, '%')) != NULL) - *host++ = '\0'; - /* Check if someones msg'ing opers@our.server */ - if(strcmp(nick, "opers") == 0) + if(strncmp(nick, "opers@", 6) == 0) { sendto_realops_snomask(SNO_GENERAL, L_ALL, "To opers: From: %s: %s", source_p->name, text); return; } - /* - * Look for users which match the destination host - * (no host == wildcard) and if one and one only is - * found connected to me, deliver message! + /* This was not very useful except for bypassing certain + * restrictions. Note that we still allow sending to + * remote servers this way, for messaging pseudoservers + * securely whether they have a service{} block or not. + * -- jilles */ - target_p = find_userhost(nick, host, &count); - - if(target_p != NULL) - { - if(server != NULL) - *server = '@'; - if(host != NULL) - *--host = '%'; - - if(count == 1) - sendto_anywhere(target_p, source_p, command, ":%s", text); - else - sendto_one(source_p, form_str(ERR_TOOMANYTARGETS), - get_id(&me, source_p), get_id(source_p, source_p), nick); - } + sendto_one_numeric(source_p, ERR_NOSUCHNICK, + form_str(ERR_NOSUCHNICK), nick); + return; } /* @@ -994,38 +1018,3 @@ handle_special(int p_or_n, const char *command, struct Client *client_p, return; } } - -/* - * find_userhost - find a user@host (server or user). - * inputs - user name to look for - * - host name to look for - * - pointer to count of number of matches found - * outputs - pointer to client if found - * - count is updated - * side effects - none - * - */ -static struct Client * -find_userhost(const char *user, const char *host, int *count) -{ - struct Client *c2ptr; - struct Client *res = NULL; - char *u = LOCAL_COPY(user); - rb_dlink_node *ptr; - *count = 0; - if(collapse(u) != NULL) - { - RB_DLINK_FOREACH(ptr, global_client_list.head) - { - c2ptr = ptr->data; - if(!MyClient(c2ptr)) /* implies mine and an user */ - continue; - if((!host || match(host, c2ptr->host)) && irccmp(u, c2ptr->username) == 0) - { - (*count)++; - res = c2ptr; - } - } - } - return (res); -}