diff options
Diffstat (limited to 'src/commands.cpp')
-rw-r--r-- | src/commands.cpp | 957 |
1 files changed, 957 insertions, 0 deletions
diff --git a/src/commands.cpp b/src/commands.cpp index b7baa9b9f..c84edf2ea 100644 --- a/src/commands.cpp +++ b/src/commands.cpp @@ -32,6 +32,7 @@ #include "dynamic.h" #include "wildcard.h" #include "message.h" +#include "mode.h" #ifdef GCC3 #define nspace __gnu_cxx @@ -1385,4 +1386,960 @@ void handle_nick(char **parameters, int pcnt, userrec *user) +void handle_V(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* src = strtok(params," "); + char* dest = strtok(NULL," :"); + char* text = strtok(NULL,"\r\n"); + text++; + + userrec* user = Find(src); + if (user) + { + userrec* dst = Find(dest); + + if (dst) + { + WriteTo(user, dst, "NOTICE %s :%s", dst->nick, text); + } + else + { + chanrec* d = FindChan(dest); + if (d) + { + ChanExceptSender(d, user, "NOTICE %s :%s", d->name, text); + } + } + } + +} + + +void handle_P(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* src = strtok(params," "); + char* dest = strtok(NULL," :"); + char* text = strtok(NULL,"\r\n"); + text++; + + userrec* user = Find(src); + if (user) + { + userrec* dst = Find(dest); + + if (dst) + { + WriteTo(user, dst, "PRIVMSG %s :%s", dst->nick, text); + } + else + { + chanrec* d = FindChan(dest); + if (d) + { + ChanExceptSender(d, user, "PRIVMSG %s :%s", d->name, text); + } + } + } + +} + +void handle_i(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* nick = strtok(params," "); + char* from = strtok(NULL," "); + char* channel = strtok(NULL," "); + userrec* u = Find(nick); + userrec* user = Find(from); + chanrec* c = FindChan(channel); + if ((c) && (u) && (user)) + { + u->InviteTo(c->name); + WriteFrom(u->fd,user,"INVITE %s :%s",u->nick,c->name); + } +} + +void handle_t(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* setby = strtok(params," "); + char* channel = strtok(NULL," :"); + char* topic = strtok(NULL,"\r\n"); + topic++; + userrec* u = Find(setby); + chanrec* c = FindChan(channel); + if ((c) && (u)) + { + WriteChannelLocal(c,u,"TOPIC %s :%s",c->name,topic); + strncpy(c->topic,topic,MAXTOPIC); + strncpy(c->setby,u->nick,NICKMAX); + } +} + + +void handle_T(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* tm = strtok(params," "); + char* setby = strtok(NULL," "); + char* channel = strtok(NULL," :"); + char* topic = strtok(NULL,"\r\n"); + topic++; + time_t TS = atoi(tm); + chanrec* c = FindChan(channel); + if (c) + { + // in the case of topics and TS, the *NEWER* + if (TS <= c->topicset) + { + WriteChannelLocal(c,NULL,"TOPIC %s :%s",c->name,topic); + strncpy(c->topic,topic,MAXTOPIC); + strncpy(c->setby,setby,NICKMAX); + } + } +} + +void handle_M(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* pars[128]; + char original[MAXBUF],target[MAXBUF]; + strncpy(original,params,MAXBUF); + int index = 0; + char* parameter = strtok(params," "); + strncpy(target,parameter,MAXBUF); + while (parameter) + { + pars[index++] = parameter; + parameter = strtok(NULL," "); + } + merge_mode(pars,index); + if (FindChan(target)) + { + WriteChannelLocal(FindChan(target), NULL, "MODE %s",original); + } + if (Find(target)) + { + WriteTo(NULL,Find(target),"MODE %s",original); + } +} + +// m is modes set by users only (not servers) valid targets are channels or users. + +void handle_m(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + // m blah #chatspike +b *!test@*4 + char* pars[128]; + char original[MAXBUF]; + strncpy(original,params,MAXBUF); + + if (!strchr(params,' ')) + { + WriteOpers("WARNING! 'm' token in data stream without any parameters! Something fishy is going on!"); + return; + } + + int index = 0; + + char* src = strtok(params," "); + userrec* user = Find(src); + + if (user) + { + log(DEBUG,"Found user: %s",user->nick); + char* parameter = strtok(NULL," "); + while (parameter) + { + pars[index++] = parameter; + parameter = strtok(NULL," "); + } + + log(DEBUG,"Calling merge_mode2"); + merge_mode2(pars,index,user); + } +} + + +void handle_L(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* nick = strtok(params," "); + char* channel = strtok(NULL," :"); + char* reason = strtok(NULL,"\r\n"); + userrec* user = Find(nick); + reason++; + if (user) + { + if (strcmp(reason,"")) + { + del_channel(user,channel,reason,true); + } + else + { + del_channel(user,channel,NULL,true); + } + } +} + +void handle_K(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* src = strtok(params," "); + char* nick = strtok(NULL," :"); + char* reason = strtok(NULL,"\r\n"); + char kreason[MAXBUF]; + reason++; + + userrec* u = Find(nick); + userrec* user = Find(src); + + if ((user) && (u)) + { + WriteTo(user, u, "KILL %s :%s!%s!%s!%s (%s)", u->nick, source->name, ServerName, user->dhost,user->nick,reason); + WriteOpers("*** Remote kill from %s by %s: %s!%s@%s (%s)",source->name,user->nick,u->nick,u->ident,u->host,reason); + snprintf(kreason,MAXBUF,"[%s] Killed (%s (%s))",source->name,user->nick,reason); + kill_link(u,kreason); + } +} + +void handle_Q(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* nick = strtok(params," :"); + char* reason = strtok(NULL,"\r\n"); + reason++; + + userrec* user = Find(nick); + + if (user) + { + if (strlen(reason)>MAXQUIT) + { + reason[MAXQUIT-1] = '\0'; + } + + + WriteCommonExcept(user,"QUIT :%s",reason); + + user_hash::iterator iter = clientlist.find(user->nick); + + if (iter != clientlist.end()) + { + log(DEBUG,"deleting user hash value %d",iter->second); + if ((iter->second) && (user->registered == 7)) { + delete iter->second; + } + clientlist.erase(iter); + } + + purge_empty_chans(); + } +} + +void handle_n(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* oldnick = strtok(params," "); + char* newnick = strtok(NULL," "); + + userrec* user = Find(oldnick); + + if (user) + { + WriteCommon(user,"NICK %s",newnick); + user = ReHashNick(user->nick, newnick); + if (!user) return; + if (!user->nick) return; + strncpy(user->nick, newnick,NICKMAX); + log(DEBUG,"new nick set: %s",user->nick); + } +} + +// k <SOURCE> <DEST> <CHANNEL> :<REASON> +void handle_k(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* src = strtok(params," "); + char* dest = strtok(NULL," "); + char* channel = strtok(NULL," :"); + char* reason = strtok(NULL,"\r\n"); + reason++; + userrec* s = Find(src); + userrec* d = Find(dest); + chanrec* c = FindChan(channel); + if ((s) && (d) && (c)) + { + kick_channel(s,d,c,reason); + } +} + +void handle_AT(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* who = strtok(params," :"); + char* text = strtok(NULL,"\r\n"); + text++; + userrec* s = Find(who); + if (s) + { + WriteWallOps(s,true,text); + } +} + + +void handle_N(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* tm = strtok(params," "); + char* nick = strtok(NULL," "); + char* host = strtok(NULL," "); + char* dhost = strtok(NULL," "); + char* ident = strtok(NULL," "); + char* modes = strtok(NULL," "); + char* server = strtok(NULL," :"); + char* gecos = strtok(NULL,"\r\n"); + gecos++; + modes++; + time_t TS = atoi(tm); + user_hash::iterator iter = clientlist.find(nick); + if (iter != clientlist.end()) + { + // nick collision + WriteOpers("Nickname collision: %s@%s != %s@%s",nick,server,iter->second->nick,iter->second->server); + char str[MAXBUF]; + snprintf(str,MAXBUF,"Killed (Nick Collision (%s@%s < %s@%s))",nick,server,iter->second->nick,iter->second->server); + WriteServ(iter->second->fd, "KILL %s :%s",iter->second->nick,str); + kill_link(iter->second,str); + } + clientlist[nick] = new userrec(); + // remote users have an fd of -1. This is so that our Write abstraction + // routines know to route any messages to this record away to whatever server + // theyre on. + clientlist[nick]->fd = -1; + strncpy(clientlist[nick]->nick, nick,NICKMAX); + strncpy(clientlist[nick]->host, host,160); + strncpy(clientlist[nick]->dhost, dhost,160); + strncpy(clientlist[nick]->server, server,256); + strncpy(clientlist[nick]->ident, ident,10); // +1 char to compensate for tilde + strncpy(clientlist[nick]->fullname, gecos,128); + clientlist[nick]->signon = TS; + clientlist[nick]->nping = 0; // this is ignored for a remote user anyway. + clientlist[nick]->lastping = 1; + clientlist[nick]->port = 0; // so is this... + clientlist[nick]->registered = 7; // this however we need to set for them to receive messages and appear online + clientlist[nick]->idle_lastmsg = time(NULL); // this is unrealiable and wont actually be used locally + for (int i = 0; i < MAXCHANS; i++) + { + clientlist[nick]->chans[i].channel = NULL; + clientlist[nick]->chans[i].uc_modes = 0; + } +} + +void handle_F(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + long tdiff = time(NULL) - atoi(params); + if (tdiff) + WriteOpers("TS split for %s -> %s: %d",source->name,reply->name,tdiff); +} + +void handle_a(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* nick = strtok(params," :"); + char* gecos = strtok(NULL,"\r\n"); + + userrec* user = Find(nick); + + if (user) + strncpy(user->fullname,gecos,MAXBUF); +} + +void handle_b(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* nick = strtok(params," "); + char* host = strtok(NULL," "); + + userrec* user = Find(nick); + + if (user) + strncpy(user->dhost,host,160); +} + +void handle_plus(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + // %s %s %d %d + // + test3.chatspike.net 7010 -2016508415 + char* servername = strtok(params," "); + char* ipaddr = strtok(NULL," "); + char* ipport = strtok(NULL," "); + char* cookie = strtok(NULL," "); + log(DEBUG,"*** Connecting back to %s:%d",ipaddr,atoi(ipport)); + + + bool conn_already = false; + for (int i = 0; i < 32; i++) + { + if (me[i] != NULL) + { + for (int j = 0; j < me[i]->connectors.size(); j++) + { + if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),servername)) + { + if (me[i]->connectors[j].GetServerPort() == atoi(ipport)) + { + log(DEBUG,"Already got a connection to %s:%d, ignoring +",ipaddr,atoi(ipport)); + conn_already = true; + } + } + } + } + } + if (!conn_already) + me[defaultRoute]->MeshCookie(ipaddr,atoi(ipport),atoi(cookie),servername); +} + +void handle_R(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + char* server = strtok(params," "); + char* data = strtok(NULL,"\r\n"); + log(DEBUG,"Forwarded packet '%s' to '%s'",data,server); + NetSendToOne(server,data); +} + +void handle_J(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + // IMPORTANT NOTE + // The J token currently has no timestamp - this needs looking at + // because it will allow splitriding. + char* nick = strtok(params," "); + char* channel = strtok(NULL," "); + userrec* user = Find(nick); + while (channel) + { + if ((user != NULL) && (strcmp(channel,""))) + { + char privilage = '\0'; + if (channel[0] != '#') + { + privilage = channel[0]; + channel++; + } + add_channel(user,channel,"",true); + + // now work out the privilages they should have on each channel + // and send the appropriate servermodes. + for (int i = 0; i != MAXCHANS; i++) + { + if (user->chans[i].channel) + { + if (!strcasecmp(user->chans[i].channel->name,channel)) + { + if (privilage == '@') + { + user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_OP; + WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +o %s",channel,user->nick); + } + if (privilage == '%') + { + user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_HOP; + WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +h %s",channel,user->nick); + } + if (privilage == '+') + { + user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_VOICE; + WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +v %s",channel,user->nick); + } + } + } + } + + } + channel = strtok(NULL," "); + } +} + +void handle_dollar(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + log(DEBUG,"Storing routing table..."); + char* sourceserver = strtok(params," "); + char* server = strtok(NULL," "); + for (int i = 0; i < 32; i++) + { + if (me[i] != NULL) + { + for (int j = 0; j < me[i]->connectors.size(); j++) + { + if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),sourceserver)) + { + me[i]->connectors[j].routes.clear(); + log(DEBUG,"Found entry for source server."); + while (server) + { + // store each route + me[i]->connectors[j].routes.push_back(server); + log(DEBUG,"*** Stored route: %s -> %s -> %s",ServerName,sourceserver,server); + server = strtok(NULL," "); + } + return; + } + } + } + } + log(DEBUG,"Warning! routing table received from nonexistent server!"); +} + +void handle_amp(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host) +{ + log(DEBUG,"Netsplit! %s split from mesh, removing!",params); + bool go_again = true; + while (go_again) + { + go_again = false; + for (int i = 0; i < 32; i++) + { + if (me[i] != NULL) + { + for (vector<ircd_connector>::iterator j = me[i]->connectors.begin(); j != me[i]->connectors.end(); j++) + { + if (!strcasecmp(j->GetServerName().c_str(),params)) + { + j->routes.clear(); + j->CloseConnection(); + me[i]->connectors.erase(j); + go_again = true; + break; + } + } + } + } + } + log(DEBUG,"Removed server. Will remove clients..."); + // iterate through the userlist and remove all users on this server. + // because we're dealing with a mesh, we dont have to deal with anything + // "down-route" from this server (nice huh) + go_again = true; + char reason[MAXBUF]; + snprintf(reason,MAXBUF,"%s %s",ServerName,params); + while (go_again) + { + go_again = false; + for (user_hash::const_iterator u = clientlist.begin(); u != clientlist.end(); u++) + { + if (!strcasecmp(u->second->server,params)) + { + kill_link(u->second,reason); + go_again = true; + break; + } + } + } +} + +long authcookie; + + +void process_restricted_commands(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host,char* ipaddr,int port) +{ + char buffer[MAXBUF]; + + switch(token) + { + // Y <TS> + // start netburst + case 'Y': + nb_start = time(NULL); + WriteOpers("Server %s is starting netburst.",tcp_host); + // now broadcast this new servers address out to all servers that are linked to us, + // except the newcomer. They'll all attempt to connect back to it. + authcookie = rand()*rand(); + snprintf(buffer,MAXBUF,"~ %d",authcookie); + NetSendToAll(buffer); + break; + // ~ + // Store authcookie + // once stored, this authcookie permits other servers to log in + // without user or password, using it. + case '~': + auth_cookies.push_back(atoi(params)); + log(DEBUG,"*** Stored auth cookie, will permit servers with auth-cookie %d",atoi(params)); + break; + // connect back to a server using an authcookie + case '+': + handle_plus(token,params,source,reply,tcp_host); + break; + // routing table + case '$': + handle_dollar(token,params,source,reply,tcp_host); + break; + // node unreachable - we cant route to a server, sooooo we slit it off. + // servers can generate these for themselves for an squit. + case '&': + handle_amp(token,params,source,reply,tcp_host); + break; + // R <server> <data> + // redirect token, send all of <data> along to the given + // server as this server has been found to still have a route to it + case 'R': + handle_R(token,params,source,reply,tcp_host); + break; + // ? + // ping + case '?': + reply->SendPacket("!",tcp_host); + break; + // ? + // pong + case '!': + break; + // * + // no operation + case '*': + break; + // N <TS> <NICK> <HOST> <DHOST> <IDENT> <MODES> <SERVER> :<GECOS> + // introduce remote client + case 'N': + handle_N(token,params,source,reply,tcp_host); + break; + // a <NICK> :<GECOS> + // change GECOS (SETNAME) + case 'a': + handle_a(token,params,source,reply,tcp_host); + break; + // b <NICK> :<HOST> + // change displayed host (SETHOST) + case 'b': + handle_b(token,params,source,reply,tcp_host); + break; + // t <NICK> <CHANNEL> :<TOPIC> + // change a channel topic + case 't': + handle_t(token,params,source,reply,tcp_host); + break; + // i <NICK> <CHANNEL> + // invite a user to a channel + case 'i': + handle_i(token,params,source,reply,tcp_host); + break; + // k <SOURCE> <DEST> <CHANNEL> :<REASON> + // kick a user from a channel + case 'k': + handle_k(token,params,source,reply,tcp_host); + break; + // n <NICK> <NEWNICK> + // change nickname of client -- a server should only be able to + // change the nicknames of clients that reside on it unless + // they are ulined. + case 'n': + handle_n(token,params,source,reply,tcp_host); + break; + // J <NICK> <CHANLIST> + // Join user to channel list, merge channel permissions + case 'J': + handle_J(token,params,source,reply,tcp_host); + break; + // T <TS> <CHANNEL> <TOPICSETTER> :<TOPIC> + // change channel topic (netburst only) + case 'T': + handle_T(token,params,source,reply,tcp_host); + break; + // M <TARGET> <MODES> [MODE-PARAMETERS] + // Server setting modes on an object + case 'M': + handle_M(token,params,source,reply,tcp_host); + break; + // m <SOURCE> <TARGET> <MODES> [MODE-PARAMETERS] + // User setting modes on an object + case 'm': + handle_m(token,params,source,reply,tcp_host); + break; + // P <SOURCE> <TARGET> :<TEXT> + // Send a private/channel message + case 'P': + handle_P(token,params,source,reply,tcp_host); + break; + // V <SOURCE> <TARGET> :<TEXT> + // Send a private/channel notice + case 'V': + handle_V(token,params,source,reply,tcp_host); + break; + // L <SOURCE> <CHANNEL> :<REASON> + // User parting a channel + case 'L': + handle_L(token,params,source,reply,tcp_host); + break; + // Q <SOURCE> :<REASON> + // user quitting + case 'Q': + handle_Q(token,params,source,reply,tcp_host); + break; + // K <SOURCE> <DEST> :<REASON> + // remote kill + case 'K': + handle_K(token,params,source,reply,tcp_host); + break; + // @ <SOURCE> :<TEXT> + // wallops + case '@': + handle_AT(token,params,source,reply,tcp_host); + break; + // F <TS> + // end netburst + case 'F': + WriteOpers("Server %s has completed netburst. (%d secs)",tcp_host,time(NULL)-nb_start); + handle_F(token,params,source,reply,tcp_host); + nb_start = 0; + // tell all the other servers to use this authcookie to connect back again + // got '+ test3.chatspike.net 7010 -2016508415' from test.chatspike.net + snprintf(buffer,MAXBUF,"+ %s %s %d %d",tcp_host,ipaddr,port,authcookie); + NetSendToAllExcept(tcp_host,buffer); + break; + // X <reserved> + // Send netburst now + case 'X': + WriteOpers("Sending my netburst to %s",tcp_host); + DoSync(source,tcp_host); + WriteOpers("Send of netburst to %s completed",tcp_host); + NetSendMyRoutingTable(); + break; + // anything else + default: + WriteOpers("WARNING! Unknown datagram type '%c'",token); + break; + } +} + + +void handle_link_packet(char* udp_msg, char* tcp_host, serverrec *serv) +{ + char response[10240]; + char token = udp_msg[0]; + char* params = udp_msg + 2; + char finalparam[1024]; + strcpy(finalparam," :xxxx"); + if (strstr(udp_msg," :")) { + strncpy(finalparam,strstr(udp_msg," :"),1024); + } + if (token == '-') { + char* cookie = strtok(params," "); + char* servername = strtok(NULL," "); + char* serverdesc = finalparam+2; + + WriteOpers("AuthCookie CONNECT from %s (%s)",servername,tcp_host); + + for (int u = 0; u < auth_cookies.size(); u++) + { + if (auth_cookies[u] == atoi(cookie)) + { + WriteOpers("Allowed cookie from %s, is now part of the mesh",servername); + + + for (int j = 0; j < 32; j++) + { + if (me[j] != NULL) + { + for (int k = 0; k < me[j]->connectors.size(); k++) + { + if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host)) + { + me[j]->connectors[k].SetServerName(servername); + me[j]->connectors[k].SetDescription(serverdesc); + me[j]->connectors[k].SetState(STATE_CONNECTED); + NetSendMyRoutingTable(); + return; + } + } + } + WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right now! Possible intrusion attempt!",tcp_host); + return; + } + + + return; + } + } + // bad cookie, bad bad! go sit in the corner! + WriteOpers("Bad cookie from %s!",servername); + return; + } + else + if (token == 'S') { + // S test.chatspike.net password portn :ChatSpike InspIRCd test server + char* servername = strtok(params," "); + char* password = strtok(NULL," "); + char* myport = strtok(NULL," "); + char* revision = strtok(NULL," "); + char* serverdesc = finalparam+2; + + WriteOpers("CONNECT from %s (%s) (their port: %d)",servername,tcp_host,atoi(myport)); + + ircd_connector* cn = serv->FindHost(servername); + + if (cn) + { + WriteOpers("CONNECT aborted: Server %s already exists from %s",servername,ServerName); + char buffer[MAXBUF]; + sprintf(buffer,"E :Server %s already exists!",servername); + serv->SendPacket(buffer,tcp_host); + RemoveServer(tcp_host); + return; + } + + if (atoi(revision) != GetRevision()) + { + WriteOpers("CONNECT aborted: Could not link to %s, is an incompatible version %s, our version is %d",servername,revision,GetRevision()); + char buffer[MAXBUF]; + sprintf(buffer,"E :Version number mismatch"); + serv->SendPacket(buffer,tcp_host); + RemoveServer(tcp_host); + RemoveServer(servername); + return; + } + + for (int j = 0; j < serv->connectors.size(); j++) + { + if (!strcasecmp(serv->connectors[j].GetServerName().c_str(),tcp_host)) + { + serv->connectors[j].SetServerName(servername); + serv->connectors[j].SetDescription(serverdesc); + serv->connectors[j].SetServerPort(atoi(myport)); + } + } + + + char Link_ServerName[1024]; + char Link_IPAddr[1024]; + char Link_Port[1024]; + char Link_Pass[1024]; + char Link_SendPass[1024]; + int LinkPort = 0; + + // search for a corresponding <link> block in the config files + for (int i = 0; i < ConfValueEnum("link",&config_f); i++) + { + ConfValue("link","name",i,Link_ServerName,&config_f); + ConfValue("link","ipaddr",i,Link_IPAddr,&config_f); + ConfValue("link","port",i,Link_Port,&config_f); + ConfValue("link","recvpass",i,Link_Pass,&config_f); + ConfValue("link","sendpass",i,Link_SendPass,&config_f); + log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass); + LinkPort = atoi(Link_Port); + if (!strcasecmp(Link_ServerName,servername)) + { + // we have a matching link line - + // send a 'diminutive' server message back... + snprintf(response,10240,"s %s %s :%s",ServerName,Link_SendPass,ServerDesc); + serv->SendPacket(response,servername); + + for (int t = 0; t < serv->connectors.size(); t++) + { + if (!strcasecmp(serv->connectors[t].GetServerName().c_str(),servername)) + { + serv->connectors[t].SetState(STATE_CONNECTED); + } + } + + return; + } + } + char buffer[MAXBUF]; + sprintf(buffer,"E :Access is denied (no matching link block)"); + serv->SendPacket(buffer,tcp_host); + WriteOpers("CONNECT from %s denied, no matching link block",servername); + RemoveServer(tcp_host); + RemoveServer(servername); + return; + } + else + if (token == 's') { + // S test.chatspike.net password :ChatSpike InspIRCd test server + char* servername = strtok(params," "); + char* password = strtok(NULL," "); + char* serverdesc = finalparam+2; + + // TODO: we should do a check here to ensure that this server is one we recently initiated a + // link with, and didnt hear an 's' or 'E' back from yet (these are the only two valid responses + // to an 'S' command. If we didn't recently send an 'S' to this server, theyre trying to spoof + // a connect, so put out an oper alert! + + // for now, just accept all, we'll fix that later. + WriteOpers("%s accepted our link credentials ",servername); + + char Link_ServerName[1024]; + char Link_IPAddr[1024]; + char Link_Port[1024]; + char Link_Pass[1024]; + char Link_SendPass[1024]; + int LinkPort = 0; + + // search for a corresponding <link> block in the config files + for (int i = 0; i < ConfValueEnum("link",&config_f); i++) + { + ConfValue("link","name",i,Link_ServerName,&config_f); + ConfValue("link","ipaddr",i,Link_IPAddr,&config_f); + ConfValue("link","port",i,Link_Port,&config_f); + ConfValue("link","recvpass",i,Link_Pass,&config_f); + ConfValue("link","sendpass",i,Link_SendPass,&config_f); + log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass); + LinkPort = atoi(Link_Port); + if (!strcasecmp(Link_ServerName,servername)) + { + // matching link at this end too, we're all done! + // at this point we must begin key exchange and insert this + // server into our 'active' table. + for (int j = 0; j < 32; j++) + { + if (me[j] != NULL) + { + for (int k = 0; k < me[j]->connectors.size(); k++) + { + if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host)) + { + char buffer[MAXBUF]; + me[j]->connectors[k].SetDescription(serverdesc); + me[j]->connectors[k].SetState(STATE_CONNECTED); + sprintf(buffer,"X 0"); + serv->SendPacket(buffer,tcp_host); + DoSync(me[j],tcp_host); + NetSendMyRoutingTable(); + return; + } + } + } + WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right noe! Possible intrusion attempt!",tcp_host); + return; + } + } + else { + log(DEBUG,"Server names '%s' and '%s' don't match",Link_ServerName,servername); + } + } + char buffer[MAXBUF]; + sprintf(buffer,"E :Access is denied (no matching link block)"); + serv->SendPacket(buffer,tcp_host); + WriteOpers("CONNECT from %s denied, no matching link block",servername); + RemoveServer(tcp_host); + RemoveServer(servername); + return; + } + else + if (token == 'E') { + char* error_message = finalparam+2; + WriteOpers("ERROR from %s: %s",tcp_host,error_message); + return; + } + else { + + serverrec* source_server = NULL; + + for (int j = 0; j < 32; j++) + { + if (me[j] != NULL) + { + for (int x = 0; x < me[j]->connectors.size(); x++) + { + log(DEBUG,"Servers are: '%s' '%s'",tcp_host,me[j]->connectors[x].GetServerName().c_str()); + if (!strcasecmp(me[j]->connectors[x].GetServerName().c_str(),tcp_host)) + { + if (me[j]->connectors[x].GetState() == STATE_CONNECTED) + { + // found a valid ircd_connector. + process_restricted_commands(token,params,me[j],serv,tcp_host,me[j]->connectors[x].GetServerIP(),me[j]->connectors[x].GetServerPort()); + return; + } + } + } + } + } + + log(DEBUG,"Unrecognised token or unauthenticated host in datagram from %s: %c",tcp_host,token); + } +} |