summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
Diffstat (limited to 'src')
-rw-r--r--src/InspIRCd.dev22
-rw-r--r--src/InspIRCd.layout48
-rw-r--r--src/commands.cpp957
-rw-r--r--src/inspircd.cpp982
4 files changed, 1022 insertions, 987 deletions
diff --git a/src/InspIRCd.dev b/src/InspIRCd.dev
index 128a84bcf..5012e26ff 100644
--- a/src/InspIRCd.dev
+++ b/src/InspIRCd.dev
@@ -1,7 +1,7 @@
[Project]
FileName=InspIRCd.dev
Name=InspIRCd - The Inspire Internet Relay Chat Daemon
-UnitCount=43
+UnitCount=45
Type=1
Ver=1
ObjFiles=
@@ -475,3 +475,23 @@ Priority=1000
OverrideBuildCmd=0
BuildCmd=
+[Unit44]
+FileName=commands.cpp
+CompileCpp=1
+Folder=Source
+Compile=1
+Link=1
+Priority=1000
+OverrideBuildCmd=0
+BuildCmd=
+
+[Unit45]
+FileName=..\include\commands.h
+CompileCpp=1
+Folder=Headers
+Compile=1
+Link=1
+Priority=1000
+OverrideBuildCmd=0
+BuildCmd=
+
diff --git a/src/InspIRCd.layout b/src/InspIRCd.layout
index bb91d8747..12286c6d4 100644
--- a/src/InspIRCd.layout
+++ b/src/InspIRCd.layout
@@ -1,6 +1,6 @@
[Editors]
Focused=1
-Order=1,2,4,6,3,7,25,5,24,-1,39,42
+Order=1,2,4,6,3,7,25,5,24,-1,39,42,43
[Editor_0]
Open=0
@@ -13,9 +13,9 @@ LeftChar=1
[Editor_1]
Open=1
Top=1
-CursorCol=1
-CursorRow=2762
-TopLine=2726
+CursorCol=42
+CursorRow=3192
+TopLine=3148
LeftChar=1
[Editor_2]
@@ -99,7 +99,7 @@ TopLine=1
LeftChar=1
[Editor_12]
-Open=0
+Open=1
Top=0
CursorCol=12
CursorRow=104
@@ -141,9 +141,9 @@ LeftChar=1
[Editor_17]
Open=1
Top=0
-CursorCol=32
-CursorRow=98
-TopLine=74
+CursorCol=44
+CursorRow=157
+TopLine=103
LeftChar=1
[Editor_18]
@@ -187,7 +187,7 @@ TopLine=83
LeftChar=1
[Editor_23]
-Open=0
+Open=1
Top=0
CursorCol=1
CursorRow=1
@@ -197,9 +197,9 @@ LeftChar=1
[Editor_24]
Open=1
Top=0
-CursorCol=50
-CursorRow=348
-TopLine=320
+CursorCol=1
+CursorRow=15
+TopLine=1
LeftChar=1
[Editor_25]
Open=1
@@ -316,14 +316,28 @@ LeftChar=1
[Editor_41]
Open=1
Top=0
-CursorCol=62
-CursorRow=30
+CursorCol=22
+CursorRow=13
TopLine=1
LeftChar=1
[Editor_42]
Open=1
Top=0
-CursorCol=1
-CursorRow=37
-TopLine=1
+CursorCol=21
+CursorRow=36
+TopLine=16
+LeftChar=1
+[Editor_43]
+Open=1
+Top=0
+CursorCol=90
+CursorRow=2342
+TopLine=2291
+LeftChar=1
+[Editor_44]
+Open=1
+Top=0
+CursorCol=89
+CursorRow=89
+TopLine=38
LeftChar=1
diff --git a/src/commands.cpp b/src/commands.cpp
index b7baa9b9f..c84edf2ea 100644
--- a/src/commands.cpp
+++ b/src/commands.cpp
@@ -32,6 +32,7 @@
#include "dynamic.h"
#include "wildcard.h"
#include "message.h"
+#include "mode.h"
#ifdef GCC3
#define nspace __gnu_cxx
@@ -1385,4 +1386,960 @@ void handle_nick(char **parameters, int pcnt, userrec *user)
+void handle_V(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* src = strtok(params," ");
+ char* dest = strtok(NULL," :");
+ char* text = strtok(NULL,"\r\n");
+ text++;
+
+ userrec* user = Find(src);
+ if (user)
+ {
+ userrec* dst = Find(dest);
+
+ if (dst)
+ {
+ WriteTo(user, dst, "NOTICE %s :%s", dst->nick, text);
+ }
+ else
+ {
+ chanrec* d = FindChan(dest);
+ if (d)
+ {
+ ChanExceptSender(d, user, "NOTICE %s :%s", d->name, text);
+ }
+ }
+ }
+
+}
+
+
+void handle_P(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* src = strtok(params," ");
+ char* dest = strtok(NULL," :");
+ char* text = strtok(NULL,"\r\n");
+ text++;
+
+ userrec* user = Find(src);
+ if (user)
+ {
+ userrec* dst = Find(dest);
+
+ if (dst)
+ {
+ WriteTo(user, dst, "PRIVMSG %s :%s", dst->nick, text);
+ }
+ else
+ {
+ chanrec* d = FindChan(dest);
+ if (d)
+ {
+ ChanExceptSender(d, user, "PRIVMSG %s :%s", d->name, text);
+ }
+ }
+ }
+
+}
+
+void handle_i(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* nick = strtok(params," ");
+ char* from = strtok(NULL," ");
+ char* channel = strtok(NULL," ");
+ userrec* u = Find(nick);
+ userrec* user = Find(from);
+ chanrec* c = FindChan(channel);
+ if ((c) && (u) && (user))
+ {
+ u->InviteTo(c->name);
+ WriteFrom(u->fd,user,"INVITE %s :%s",u->nick,c->name);
+ }
+}
+
+void handle_t(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* setby = strtok(params," ");
+ char* channel = strtok(NULL," :");
+ char* topic = strtok(NULL,"\r\n");
+ topic++;
+ userrec* u = Find(setby);
+ chanrec* c = FindChan(channel);
+ if ((c) && (u))
+ {
+ WriteChannelLocal(c,u,"TOPIC %s :%s",c->name,topic);
+ strncpy(c->topic,topic,MAXTOPIC);
+ strncpy(c->setby,u->nick,NICKMAX);
+ }
+}
+
+
+void handle_T(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* tm = strtok(params," ");
+ char* setby = strtok(NULL," ");
+ char* channel = strtok(NULL," :");
+ char* topic = strtok(NULL,"\r\n");
+ topic++;
+ time_t TS = atoi(tm);
+ chanrec* c = FindChan(channel);
+ if (c)
+ {
+ // in the case of topics and TS, the *NEWER*
+ if (TS <= c->topicset)
+ {
+ WriteChannelLocal(c,NULL,"TOPIC %s :%s",c->name,topic);
+ strncpy(c->topic,topic,MAXTOPIC);
+ strncpy(c->setby,setby,NICKMAX);
+ }
+ }
+}
+
+void handle_M(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* pars[128];
+ char original[MAXBUF],target[MAXBUF];
+ strncpy(original,params,MAXBUF);
+ int index = 0;
+ char* parameter = strtok(params," ");
+ strncpy(target,parameter,MAXBUF);
+ while (parameter)
+ {
+ pars[index++] = parameter;
+ parameter = strtok(NULL," ");
+ }
+ merge_mode(pars,index);
+ if (FindChan(target))
+ {
+ WriteChannelLocal(FindChan(target), NULL, "MODE %s",original);
+ }
+ if (Find(target))
+ {
+ WriteTo(NULL,Find(target),"MODE %s",original);
+ }
+}
+
+// m is modes set by users only (not servers) valid targets are channels or users.
+
+void handle_m(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ // m blah #chatspike +b *!test@*4
+ char* pars[128];
+ char original[MAXBUF];
+ strncpy(original,params,MAXBUF);
+
+ if (!strchr(params,' '))
+ {
+ WriteOpers("WARNING! 'm' token in data stream without any parameters! Something fishy is going on!");
+ return;
+ }
+
+ int index = 0;
+
+ char* src = strtok(params," ");
+ userrec* user = Find(src);
+
+ if (user)
+ {
+ log(DEBUG,"Found user: %s",user->nick);
+ char* parameter = strtok(NULL," ");
+ while (parameter)
+ {
+ pars[index++] = parameter;
+ parameter = strtok(NULL," ");
+ }
+
+ log(DEBUG,"Calling merge_mode2");
+ merge_mode2(pars,index,user);
+ }
+}
+
+
+void handle_L(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* nick = strtok(params," ");
+ char* channel = strtok(NULL," :");
+ char* reason = strtok(NULL,"\r\n");
+ userrec* user = Find(nick);
+ reason++;
+ if (user)
+ {
+ if (strcmp(reason,""))
+ {
+ del_channel(user,channel,reason,true);
+ }
+ else
+ {
+ del_channel(user,channel,NULL,true);
+ }
+ }
+}
+
+void handle_K(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* src = strtok(params," ");
+ char* nick = strtok(NULL," :");
+ char* reason = strtok(NULL,"\r\n");
+ char kreason[MAXBUF];
+ reason++;
+
+ userrec* u = Find(nick);
+ userrec* user = Find(src);
+
+ if ((user) && (u))
+ {
+ WriteTo(user, u, "KILL %s :%s!%s!%s!%s (%s)", u->nick, source->name, ServerName, user->dhost,user->nick,reason);
+ WriteOpers("*** Remote kill from %s by %s: %s!%s@%s (%s)",source->name,user->nick,u->nick,u->ident,u->host,reason);
+ snprintf(kreason,MAXBUF,"[%s] Killed (%s (%s))",source->name,user->nick,reason);
+ kill_link(u,kreason);
+ }
+}
+
+void handle_Q(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* nick = strtok(params," :");
+ char* reason = strtok(NULL,"\r\n");
+ reason++;
+
+ userrec* user = Find(nick);
+
+ if (user)
+ {
+ if (strlen(reason)>MAXQUIT)
+ {
+ reason[MAXQUIT-1] = '\0';
+ }
+
+
+ WriteCommonExcept(user,"QUIT :%s",reason);
+
+ user_hash::iterator iter = clientlist.find(user->nick);
+
+ if (iter != clientlist.end())
+ {
+ log(DEBUG,"deleting user hash value %d",iter->second);
+ if ((iter->second) && (user->registered == 7)) {
+ delete iter->second;
+ }
+ clientlist.erase(iter);
+ }
+
+ purge_empty_chans();
+ }
+}
+
+void handle_n(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* oldnick = strtok(params," ");
+ char* newnick = strtok(NULL," ");
+
+ userrec* user = Find(oldnick);
+
+ if (user)
+ {
+ WriteCommon(user,"NICK %s",newnick);
+ user = ReHashNick(user->nick, newnick);
+ if (!user) return;
+ if (!user->nick) return;
+ strncpy(user->nick, newnick,NICKMAX);
+ log(DEBUG,"new nick set: %s",user->nick);
+ }
+}
+
+// k <SOURCE> <DEST> <CHANNEL> :<REASON>
+void handle_k(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* src = strtok(params," ");
+ char* dest = strtok(NULL," ");
+ char* channel = strtok(NULL," :");
+ char* reason = strtok(NULL,"\r\n");
+ reason++;
+ userrec* s = Find(src);
+ userrec* d = Find(dest);
+ chanrec* c = FindChan(channel);
+ if ((s) && (d) && (c))
+ {
+ kick_channel(s,d,c,reason);
+ }
+}
+
+void handle_AT(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* who = strtok(params," :");
+ char* text = strtok(NULL,"\r\n");
+ text++;
+ userrec* s = Find(who);
+ if (s)
+ {
+ WriteWallOps(s,true,text);
+ }
+}
+
+
+void handle_N(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* tm = strtok(params," ");
+ char* nick = strtok(NULL," ");
+ char* host = strtok(NULL," ");
+ char* dhost = strtok(NULL," ");
+ char* ident = strtok(NULL," ");
+ char* modes = strtok(NULL," ");
+ char* server = strtok(NULL," :");
+ char* gecos = strtok(NULL,"\r\n");
+ gecos++;
+ modes++;
+ time_t TS = atoi(tm);
+ user_hash::iterator iter = clientlist.find(nick);
+ if (iter != clientlist.end())
+ {
+ // nick collision
+ WriteOpers("Nickname collision: %s@%s != %s@%s",nick,server,iter->second->nick,iter->second->server);
+ char str[MAXBUF];
+ snprintf(str,MAXBUF,"Killed (Nick Collision (%s@%s < %s@%s))",nick,server,iter->second->nick,iter->second->server);
+ WriteServ(iter->second->fd, "KILL %s :%s",iter->second->nick,str);
+ kill_link(iter->second,str);
+ }
+ clientlist[nick] = new userrec();
+ // remote users have an fd of -1. This is so that our Write abstraction
+ // routines know to route any messages to this record away to whatever server
+ // theyre on.
+ clientlist[nick]->fd = -1;
+ strncpy(clientlist[nick]->nick, nick,NICKMAX);
+ strncpy(clientlist[nick]->host, host,160);
+ strncpy(clientlist[nick]->dhost, dhost,160);
+ strncpy(clientlist[nick]->server, server,256);
+ strncpy(clientlist[nick]->ident, ident,10); // +1 char to compensate for tilde
+ strncpy(clientlist[nick]->fullname, gecos,128);
+ clientlist[nick]->signon = TS;
+ clientlist[nick]->nping = 0; // this is ignored for a remote user anyway.
+ clientlist[nick]->lastping = 1;
+ clientlist[nick]->port = 0; // so is this...
+ clientlist[nick]->registered = 7; // this however we need to set for them to receive messages and appear online
+ clientlist[nick]->idle_lastmsg = time(NULL); // this is unrealiable and wont actually be used locally
+ for (int i = 0; i < MAXCHANS; i++)
+ {
+ clientlist[nick]->chans[i].channel = NULL;
+ clientlist[nick]->chans[i].uc_modes = 0;
+ }
+}
+
+void handle_F(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ long tdiff = time(NULL) - atoi(params);
+ if (tdiff)
+ WriteOpers("TS split for %s -> %s: %d",source->name,reply->name,tdiff);
+}
+
+void handle_a(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* nick = strtok(params," :");
+ char* gecos = strtok(NULL,"\r\n");
+
+ userrec* user = Find(nick);
+
+ if (user)
+ strncpy(user->fullname,gecos,MAXBUF);
+}
+
+void handle_b(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* nick = strtok(params," ");
+ char* host = strtok(NULL," ");
+
+ userrec* user = Find(nick);
+
+ if (user)
+ strncpy(user->dhost,host,160);
+}
+
+void handle_plus(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ // %s %s %d %d
+ // + test3.chatspike.net 7010 -2016508415
+ char* servername = strtok(params," ");
+ char* ipaddr = strtok(NULL," ");
+ char* ipport = strtok(NULL," ");
+ char* cookie = strtok(NULL," ");
+ log(DEBUG,"*** Connecting back to %s:%d",ipaddr,atoi(ipport));
+
+
+ bool conn_already = false;
+ for (int i = 0; i < 32; i++)
+ {
+ if (me[i] != NULL)
+ {
+ for (int j = 0; j < me[i]->connectors.size(); j++)
+ {
+ if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),servername))
+ {
+ if (me[i]->connectors[j].GetServerPort() == atoi(ipport))
+ {
+ log(DEBUG,"Already got a connection to %s:%d, ignoring +",ipaddr,atoi(ipport));
+ conn_already = true;
+ }
+ }
+ }
+ }
+ }
+ if (!conn_already)
+ me[defaultRoute]->MeshCookie(ipaddr,atoi(ipport),atoi(cookie),servername);
+}
+
+void handle_R(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ char* server = strtok(params," ");
+ char* data = strtok(NULL,"\r\n");
+ log(DEBUG,"Forwarded packet '%s' to '%s'",data,server);
+ NetSendToOne(server,data);
+}
+
+void handle_J(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ // IMPORTANT NOTE
+ // The J token currently has no timestamp - this needs looking at
+ // because it will allow splitriding.
+ char* nick = strtok(params," ");
+ char* channel = strtok(NULL," ");
+ userrec* user = Find(nick);
+ while (channel)
+ {
+ if ((user != NULL) && (strcmp(channel,"")))
+ {
+ char privilage = '\0';
+ if (channel[0] != '#')
+ {
+ privilage = channel[0];
+ channel++;
+ }
+ add_channel(user,channel,"",true);
+
+ // now work out the privilages they should have on each channel
+ // and send the appropriate servermodes.
+ for (int i = 0; i != MAXCHANS; i++)
+ {
+ if (user->chans[i].channel)
+ {
+ if (!strcasecmp(user->chans[i].channel->name,channel))
+ {
+ if (privilage == '@')
+ {
+ user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_OP;
+ WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +o %s",channel,user->nick);
+ }
+ if (privilage == '%')
+ {
+ user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_HOP;
+ WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +h %s",channel,user->nick);
+ }
+ if (privilage == '+')
+ {
+ user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_VOICE;
+ WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +v %s",channel,user->nick);
+ }
+ }
+ }
+ }
+
+ }
+ channel = strtok(NULL," ");
+ }
+}
+
+void handle_dollar(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ log(DEBUG,"Storing routing table...");
+ char* sourceserver = strtok(params," ");
+ char* server = strtok(NULL," ");
+ for (int i = 0; i < 32; i++)
+ {
+ if (me[i] != NULL)
+ {
+ for (int j = 0; j < me[i]->connectors.size(); j++)
+ {
+ if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),sourceserver))
+ {
+ me[i]->connectors[j].routes.clear();
+ log(DEBUG,"Found entry for source server.");
+ while (server)
+ {
+ // store each route
+ me[i]->connectors[j].routes.push_back(server);
+ log(DEBUG,"*** Stored route: %s -> %s -> %s",ServerName,sourceserver,server);
+ server = strtok(NULL," ");
+ }
+ return;
+ }
+ }
+ }
+ }
+ log(DEBUG,"Warning! routing table received from nonexistent server!");
+}
+
+void handle_amp(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
+{
+ log(DEBUG,"Netsplit! %s split from mesh, removing!",params);
+ bool go_again = true;
+ while (go_again)
+ {
+ go_again = false;
+ for (int i = 0; i < 32; i++)
+ {
+ if (me[i] != NULL)
+ {
+ for (vector<ircd_connector>::iterator j = me[i]->connectors.begin(); j != me[i]->connectors.end(); j++)
+ {
+ if (!strcasecmp(j->GetServerName().c_str(),params))
+ {
+ j->routes.clear();
+ j->CloseConnection();
+ me[i]->connectors.erase(j);
+ go_again = true;
+ break;
+ }
+ }
+ }
+ }
+ }
+ log(DEBUG,"Removed server. Will remove clients...");
+ // iterate through the userlist and remove all users on this server.
+ // because we're dealing with a mesh, we dont have to deal with anything
+ // "down-route" from this server (nice huh)
+ go_again = true;
+ char reason[MAXBUF];
+ snprintf(reason,MAXBUF,"%s %s",ServerName,params);
+ while (go_again)
+ {
+ go_again = false;
+ for (user_hash::const_iterator u = clientlist.begin(); u != clientlist.end(); u++)
+ {
+ if (!strcasecmp(u->second->server,params))
+ {
+ kill_link(u->second,reason);
+ go_again = true;
+ break;
+ }
+ }
+ }
+}
+
+long authcookie;
+
+
+void process_restricted_commands(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host,char* ipaddr,int port)
+{
+ char buffer[MAXBUF];
+
+ switch(token)
+ {
+ // Y <TS>
+ // start netburst
+ case 'Y':
+ nb_start = time(NULL);
+ WriteOpers("Server %s is starting netburst.",tcp_host);
+ // now broadcast this new servers address out to all servers that are linked to us,
+ // except the newcomer. They'll all attempt to connect back to it.
+ authcookie = rand()*rand();
+ snprintf(buffer,MAXBUF,"~ %d",authcookie);
+ NetSendToAll(buffer);
+ break;
+ // ~
+ // Store authcookie
+ // once stored, this authcookie permits other servers to log in
+ // without user or password, using it.
+ case '~':
+ auth_cookies.push_back(atoi(params));
+ log(DEBUG,"*** Stored auth cookie, will permit servers with auth-cookie %d",atoi(params));
+ break;
+ // connect back to a server using an authcookie
+ case '+':
+ handle_plus(token,params,source,reply,tcp_host);
+ break;
+ // routing table
+ case '$':
+ handle_dollar(token,params,source,reply,tcp_host);
+ break;
+ // node unreachable - we cant route to a server, sooooo we slit it off.
+ // servers can generate these for themselves for an squit.
+ case '&':
+ handle_amp(token,params,source,reply,tcp_host);
+ break;
+ // R <server> <data>
+ // redirect token, send all of <data> along to the given
+ // server as this server has been found to still have a route to it
+ case 'R':
+ handle_R(token,params,source,reply,tcp_host);
+ break;
+ // ?
+ // ping
+ case '?':
+ reply->SendPacket("!",tcp_host);
+ break;
+ // ?
+ // pong
+ case '!':
+ break;
+ // *
+ // no operation
+ case '*':
+ break;
+ // N <TS> <NICK> <HOST> <DHOST> <IDENT> <MODES> <SERVER> :<GECOS>
+ // introduce remote client
+ case 'N':
+ handle_N(token,params,source,reply,tcp_host);
+ break;
+ // a <NICK> :<GECOS>
+ // change GECOS (SETNAME)
+ case 'a':
+ handle_a(token,params,source,reply,tcp_host);
+ break;
+ // b <NICK> :<HOST>
+ // change displayed host (SETHOST)
+ case 'b':
+ handle_b(token,params,source,reply,tcp_host);
+ break;
+ // t <NICK> <CHANNEL> :<TOPIC>
+ // change a channel topic
+ case 't':
+ handle_t(token,params,source,reply,tcp_host);
+ break;
+ // i <NICK> <CHANNEL>
+ // invite a user to a channel
+ case 'i':
+ handle_i(token,params,source,reply,tcp_host);
+ break;
+ // k <SOURCE> <DEST> <CHANNEL> :<REASON>
+ // kick a user from a channel
+ case 'k':
+ handle_k(token,params,source,reply,tcp_host);
+ break;
+ // n <NICK> <NEWNICK>
+ // change nickname of client -- a server should only be able to
+ // change the nicknames of clients that reside on it unless
+ // they are ulined.
+ case 'n':
+ handle_n(token,params,source,reply,tcp_host);
+ break;
+ // J <NICK> <CHANLIST>
+ // Join user to channel list, merge channel permissions
+ case 'J':
+ handle_J(token,params,source,reply,tcp_host);
+ break;
+ // T <TS> <CHANNEL> <TOPICSETTER> :<TOPIC>
+ // change channel topic (netburst only)
+ case 'T':
+ handle_T(token,params,source,reply,tcp_host);
+ break;
+ // M <TARGET> <MODES> [MODE-PARAMETERS]
+ // Server setting modes on an object
+ case 'M':
+ handle_M(token,params,source,reply,tcp_host);
+ break;
+ // m <SOURCE> <TARGET> <MODES> [MODE-PARAMETERS]
+ // User setting modes on an object
+ case 'm':
+ handle_m(token,params,source,reply,tcp_host);
+ break;
+ // P <SOURCE> <TARGET> :<TEXT>
+ // Send a private/channel message
+ case 'P':
+ handle_P(token,params,source,reply,tcp_host);
+ break;
+ // V <SOURCE> <TARGET> :<TEXT>
+ // Send a private/channel notice
+ case 'V':
+ handle_V(token,params,source,reply,tcp_host);
+ break;
+ // L <SOURCE> <CHANNEL> :<REASON>
+ // User parting a channel
+ case 'L':
+ handle_L(token,params,source,reply,tcp_host);
+ break;
+ // Q <SOURCE> :<REASON>
+ // user quitting
+ case 'Q':
+ handle_Q(token,params,source,reply,tcp_host);
+ break;
+ // K <SOURCE> <DEST> :<REASON>
+ // remote kill
+ case 'K':
+ handle_K(token,params,source,reply,tcp_host);
+ break;
+ // @ <SOURCE> :<TEXT>
+ // wallops
+ case '@':
+ handle_AT(token,params,source,reply,tcp_host);
+ break;
+ // F <TS>
+ // end netburst
+ case 'F':
+ WriteOpers("Server %s has completed netburst. (%d secs)",tcp_host,time(NULL)-nb_start);
+ handle_F(token,params,source,reply,tcp_host);
+ nb_start = 0;
+ // tell all the other servers to use this authcookie to connect back again
+ // got '+ test3.chatspike.net 7010 -2016508415' from test.chatspike.net
+ snprintf(buffer,MAXBUF,"+ %s %s %d %d",tcp_host,ipaddr,port,authcookie);
+ NetSendToAllExcept(tcp_host,buffer);
+ break;
+ // X <reserved>
+ // Send netburst now
+ case 'X':
+ WriteOpers("Sending my netburst to %s",tcp_host);
+ DoSync(source,tcp_host);
+ WriteOpers("Send of netburst to %s completed",tcp_host);
+ NetSendMyRoutingTable();
+ break;
+ // anything else
+ default:
+ WriteOpers("WARNING! Unknown datagram type '%c'",token);
+ break;
+ }
+}
+
+
+void handle_link_packet(char* udp_msg, char* tcp_host, serverrec *serv)
+{
+ char response[10240];
+ char token = udp_msg[0];
+ char* params = udp_msg + 2;
+ char finalparam[1024];
+ strcpy(finalparam," :xxxx");
+ if (strstr(udp_msg," :")) {
+ strncpy(finalparam,strstr(udp_msg," :"),1024);
+ }
+ if (token == '-') {
+ char* cookie = strtok(params," ");
+ char* servername = strtok(NULL," ");
+ char* serverdesc = finalparam+2;
+
+ WriteOpers("AuthCookie CONNECT from %s (%s)",servername,tcp_host);
+
+ for (int u = 0; u < auth_cookies.size(); u++)
+ {
+ if (auth_cookies[u] == atoi(cookie))
+ {
+ WriteOpers("Allowed cookie from %s, is now part of the mesh",servername);
+
+
+ for (int j = 0; j < 32; j++)
+ {
+ if (me[j] != NULL)
+ {
+ for (int k = 0; k < me[j]->connectors.size(); k++)
+ {
+ if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host))
+ {
+ me[j]->connectors[k].SetServerName(servername);
+ me[j]->connectors[k].SetDescription(serverdesc);
+ me[j]->connectors[k].SetState(STATE_CONNECTED);
+ NetSendMyRoutingTable();
+ return;
+ }
+ }
+ }
+ WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right now! Possible intrusion attempt!",tcp_host);
+ return;
+ }
+
+
+ return;
+ }
+ }
+ // bad cookie, bad bad! go sit in the corner!
+ WriteOpers("Bad cookie from %s!",servername);
+ return;
+ }
+ else
+ if (token == 'S') {
+ // S test.chatspike.net password portn :ChatSpike InspIRCd test server
+ char* servername = strtok(params," ");
+ char* password = strtok(NULL," ");
+ char* myport = strtok(NULL," ");
+ char* revision = strtok(NULL," ");
+ char* serverdesc = finalparam+2;
+
+ WriteOpers("CONNECT from %s (%s) (their port: %d)",servername,tcp_host,atoi(myport));
+
+ ircd_connector* cn = serv->FindHost(servername);
+
+ if (cn)
+ {
+ WriteOpers("CONNECT aborted: Server %s already exists from %s",servername,ServerName);
+ char buffer[MAXBUF];
+ sprintf(buffer,"E :Server %s already exists!",servername);
+ serv->SendPacket(buffer,tcp_host);
+ RemoveServer(tcp_host);
+ return;
+ }
+
+ if (atoi(revision) != GetRevision())
+ {
+ WriteOpers("CONNECT aborted: Could not link to %s, is an incompatible version %s, our version is %d",servername,revision,GetRevision());
+ char buffer[MAXBUF];
+ sprintf(buffer,"E :Version number mismatch");
+ serv->SendPacket(buffer,tcp_host);
+ RemoveServer(tcp_host);
+ RemoveServer(servername);
+ return;
+ }
+
+ for (int j = 0; j < serv->connectors.size(); j++)
+ {
+ if (!strcasecmp(serv->connectors[j].GetServerName().c_str(),tcp_host))
+ {
+ serv->connectors[j].SetServerName(servername);
+ serv->connectors[j].SetDescription(serverdesc);
+ serv->connectors[j].SetServerPort(atoi(myport));
+ }
+ }
+
+
+ char Link_ServerName[1024];
+ char Link_IPAddr[1024];
+ char Link_Port[1024];
+ char Link_Pass[1024];
+ char Link_SendPass[1024];
+ int LinkPort = 0;
+
+ // search for a corresponding <link> block in the config files
+ for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
+ {
+ ConfValue("link","name",i,Link_ServerName,&config_f);
+ ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
+ ConfValue("link","port",i,Link_Port,&config_f);
+ ConfValue("link","recvpass",i,Link_Pass,&config_f);
+ ConfValue("link","sendpass",i,Link_SendPass,&config_f);
+ log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
+ LinkPort = atoi(Link_Port);
+ if (!strcasecmp(Link_ServerName,servername))
+ {
+ // we have a matching link line -
+ // send a 'diminutive' server message back...
+ snprintf(response,10240,"s %s %s :%s",ServerName,Link_SendPass,ServerDesc);
+ serv->SendPacket(response,servername);
+
+ for (int t = 0; t < serv->connectors.size(); t++)
+ {
+ if (!strcasecmp(serv->connectors[t].GetServerName().c_str(),servername))
+ {
+ serv->connectors[t].SetState(STATE_CONNECTED);
+ }
+ }
+
+ return;
+ }
+ }
+ char buffer[MAXBUF];
+ sprintf(buffer,"E :Access is denied (no matching link block)");
+ serv->SendPacket(buffer,tcp_host);
+ WriteOpers("CONNECT from %s denied, no matching link block",servername);
+ RemoveServer(tcp_host);
+ RemoveServer(servername);
+ return;
+ }
+ else
+ if (token == 's') {
+ // S test.chatspike.net password :ChatSpike InspIRCd test server
+ char* servername = strtok(params," ");
+ char* password = strtok(NULL," ");
+ char* serverdesc = finalparam+2;
+
+ // TODO: we should do a check here to ensure that this server is one we recently initiated a
+ // link with, and didnt hear an 's' or 'E' back from yet (these are the only two valid responses
+ // to an 'S' command. If we didn't recently send an 'S' to this server, theyre trying to spoof
+ // a connect, so put out an oper alert!
+
+ // for now, just accept all, we'll fix that later.
+ WriteOpers("%s accepted our link credentials ",servername);
+
+ char Link_ServerName[1024];
+ char Link_IPAddr[1024];
+ char Link_Port[1024];
+ char Link_Pass[1024];
+ char Link_SendPass[1024];
+ int LinkPort = 0;
+
+ // search for a corresponding <link> block in the config files
+ for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
+ {
+ ConfValue("link","name",i,Link_ServerName,&config_f);
+ ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
+ ConfValue("link","port",i,Link_Port,&config_f);
+ ConfValue("link","recvpass",i,Link_Pass,&config_f);
+ ConfValue("link","sendpass",i,Link_SendPass,&config_f);
+ log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
+ LinkPort = atoi(Link_Port);
+ if (!strcasecmp(Link_ServerName,servername))
+ {
+ // matching link at this end too, we're all done!
+ // at this point we must begin key exchange and insert this
+ // server into our 'active' table.
+ for (int j = 0; j < 32; j++)
+ {
+ if (me[j] != NULL)
+ {
+ for (int k = 0; k < me[j]->connectors.size(); k++)
+ {
+ if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host))
+ {
+ char buffer[MAXBUF];
+ me[j]->connectors[k].SetDescription(serverdesc);
+ me[j]->connectors[k].SetState(STATE_CONNECTED);
+ sprintf(buffer,"X 0");
+ serv->SendPacket(buffer,tcp_host);
+ DoSync(me[j],tcp_host);
+ NetSendMyRoutingTable();
+ return;
+ }
+ }
+ }
+ WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right noe! Possible intrusion attempt!",tcp_host);
+ return;
+ }
+ }
+ else {
+ log(DEBUG,"Server names '%s' and '%s' don't match",Link_ServerName,servername);
+ }
+ }
+ char buffer[MAXBUF];
+ sprintf(buffer,"E :Access is denied (no matching link block)");
+ serv->SendPacket(buffer,tcp_host);
+ WriteOpers("CONNECT from %s denied, no matching link block",servername);
+ RemoveServer(tcp_host);
+ RemoveServer(servername);
+ return;
+ }
+ else
+ if (token == 'E') {
+ char* error_message = finalparam+2;
+ WriteOpers("ERROR from %s: %s",tcp_host,error_message);
+ return;
+ }
+ else {
+
+ serverrec* source_server = NULL;
+
+ for (int j = 0; j < 32; j++)
+ {
+ if (me[j] != NULL)
+ {
+ for (int x = 0; x < me[j]->connectors.size(); x++)
+ {
+ log(DEBUG,"Servers are: '%s' '%s'",tcp_host,me[j]->connectors[x].GetServerName().c_str());
+ if (!strcasecmp(me[j]->connectors[x].GetServerName().c_str(),tcp_host))
+ {
+ if (me[j]->connectors[x].GetState() == STATE_CONNECTED)
+ {
+ // found a valid ircd_connector.
+ process_restricted_commands(token,params,me[j],serv,tcp_host,me[j]->connectors[x].GetServerIP(),me[j]->connectors[x].GetServerPort());
+ return;
+ }
+ }
+ }
+ }
+ }
+
+ log(DEBUG,"Unrecognised token or unauthenticated host in datagram from %s: %c",tcp_host,token);
+ }
+}
diff --git a/src/inspircd.cpp b/src/inspircd.cpp
index fe0b65e59..001f7e2d5 100644
--- a/src/inspircd.cpp
+++ b/src/inspircd.cpp
@@ -2774,510 +2774,50 @@ void process_buffer(const char* cmdbuf,userrec *user)
}
}
-void DoSync(serverrec* serv, char* udp_host)
+void DoSync(serverrec* serv, char* tcp_host)
{
char data[MAXBUF];
// send start of sync marker: Y <timestamp>
// at this point the ircd receiving it starts broadcasting this netburst to all ircds
// except the ones its receiving it from.
snprintf(data,MAXBUF,"Y %d",time(NULL));
- serv->SendPacket(data,udp_host);
+ serv->SendPacket(data,tcp_host);
// send users and channels
for (user_hash::iterator u = clientlist.begin(); u != clientlist.end(); u++)
{
snprintf(data,MAXBUF,"N %d %s %s %s %s +%s %s :%s",u->second->age,u->second->nick,u->second->host,u->second->dhost,u->second->ident,u->second->modes,u->second->server,u->second->fullname);
- serv->SendPacket(data,udp_host);
+ serv->SendPacket(data,tcp_host);
if (strcmp(chlist(u->second),""))
{
snprintf(data,MAXBUF,"J %s %s",u->second->nick,chlist(u->second));
- serv->SendPacket(data,udp_host);
+ serv->SendPacket(data,tcp_host);
}
}
// send channel modes, topics etc...
for (chan_hash::iterator c = chanlist.begin(); c != chanlist.end(); c++)
{
snprintf(data,MAXBUF,"M %s +%s",c->second->name,chanmodes(c->second));
- serv->SendPacket(data,udp_host);
+ serv->SendPacket(data,tcp_host);
if (strcmp(c->second->topic,""))
{
snprintf(data,MAXBUF,"T %d %s %s :%s",c->second->topicset,c->second->setby,c->second->name,c->second->topic);
- serv->SendPacket(data,udp_host);
+ serv->SendPacket(data,tcp_host);
}
// send current banlist
for (BanList::iterator b = c->second->bans.begin(); b != c->second->bans.end(); b++)
{
snprintf(data,MAXBUF,"M %s +b %s",b->set_time,c->second->name,b->data);
- serv->SendPacket(data,udp_host);
+ serv->SendPacket(data,tcp_host);
}
}
// send end of sync marker: E <timestamp>
snprintf(data,MAXBUF,"F %d",time(NULL));
- serv->SendPacket(data,udp_host);
+ serv->SendPacket(data,tcp_host);
// ircd sends its serverlist after the end of sync here
}
-void handle_V(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* src = strtok(params," ");
- char* dest = strtok(NULL," :");
- char* text = strtok(NULL,"\r\n");
- text++;
-
- userrec* user = Find(src);
- if (user)
- {
- userrec* dst = Find(dest);
-
- if (dst)
- {
- WriteTo(user, dst, "NOTICE %s :%s", dst->nick, text);
- }
- else
- {
- chanrec* d = FindChan(dest);
- if (d)
- {
- ChanExceptSender(d, user, "NOTICE %s :%s", d->name, text);
- }
- }
- }
-
-}
-
-
-void handle_P(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* src = strtok(params," ");
- char* dest = strtok(NULL," :");
- char* text = strtok(NULL,"\r\n");
- text++;
-
- userrec* user = Find(src);
- if (user)
- {
- userrec* dst = Find(dest);
-
- if (dst)
- {
- WriteTo(user, dst, "PRIVMSG %s :%s", dst->nick, text);
- }
- else
- {
- chanrec* d = FindChan(dest);
- if (d)
- {
- ChanExceptSender(d, user, "PRIVMSG %s :%s", d->name, text);
- }
- }
- }
-
-}
-
-void handle_i(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* nick = strtok(params," ");
- char* from = strtok(NULL," ");
- char* channel = strtok(NULL," ");
- userrec* u = Find(nick);
- userrec* user = Find(from);
- chanrec* c = FindChan(channel);
- if ((c) && (u) && (user))
- {
- u->InviteTo(c->name);
- WriteFrom(u->fd,user,"INVITE %s :%s",u->nick,c->name);
- }
-}
-
-void handle_t(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* setby = strtok(params," ");
- char* channel = strtok(NULL," :");
- char* topic = strtok(NULL,"\r\n");
- topic++;
- userrec* u = Find(setby);
- chanrec* c = FindChan(channel);
- if ((c) && (u))
- {
- WriteChannelLocal(c,u,"TOPIC %s :%s",c->name,topic);
- strncpy(c->topic,topic,MAXTOPIC);
- strncpy(c->setby,u->nick,NICKMAX);
- }
-}
-
-
-void handle_T(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* tm = strtok(params," ");
- char* setby = strtok(NULL," ");
- char* channel = strtok(NULL," :");
- char* topic = strtok(NULL,"\r\n");
- topic++;
- time_t TS = atoi(tm);
- chanrec* c = FindChan(channel);
- if (c)
- {
- // in the case of topics and TS, the *NEWER*
- if (TS <= c->topicset)
- {
- WriteChannelLocal(c,NULL,"TOPIC %s :%s",c->name,topic);
- strncpy(c->topic,topic,MAXTOPIC);
- strncpy(c->setby,setby,NICKMAX);
- }
- }
-}
-
-void handle_M(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* pars[128];
- char original[MAXBUF],target[MAXBUF];
- strncpy(original,params,MAXBUF);
- int index = 0;
- char* parameter = strtok(params," ");
- strncpy(target,parameter,MAXBUF);
- while (parameter)
- {
- pars[index++] = parameter;
- parameter = strtok(NULL," ");
- }
- merge_mode(pars,index);
- if (FindChan(target))
- {
- WriteChannelLocal(FindChan(target), NULL, "MODE %s",original);
- }
- if (Find(target))
- {
- WriteTo(NULL,Find(target),"MODE %s",original);
- }
-}
-
-// m is modes set by users only (not servers) valid targets are channels or users.
-
-void handle_m(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- // m blah #chatspike +b *!test@*4
- char* pars[128];
- char original[MAXBUF];
- strncpy(original,params,MAXBUF);
-
- if (!strchr(params,' '))
- {
- WriteOpers("WARNING! 'm' token in data stream without any parameters! Something fishy is going on!");
- return;
- }
-
- int index = 0;
-
- char* src = strtok(params," ");
- userrec* user = Find(src);
-
- if (user)
- {
- log(DEBUG,"Found user: %s",user->nick);
- char* parameter = strtok(NULL," ");
- while (parameter)
- {
- pars[index++] = parameter;
- parameter = strtok(NULL," ");
- }
-
- log(DEBUG,"Calling merge_mode2");
- merge_mode2(pars,index,user);
- }
-}
-
-
-void handle_L(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* nick = strtok(params," ");
- char* channel = strtok(NULL," :");
- char* reason = strtok(NULL,"\r\n");
- userrec* user = Find(nick);
- reason++;
- if (user)
- {
- if (strcmp(reason,""))
- {
- del_channel(user,channel,reason,true);
- }
- else
- {
- del_channel(user,channel,NULL,true);
- }
- }
-}
-
-void handle_K(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* src = strtok(params," ");
- char* nick = strtok(NULL," :");
- char* reason = strtok(NULL,"\r\n");
- char kreason[MAXBUF];
- reason++;
-
- userrec* u = Find(nick);
- userrec* user = Find(src);
-
- if ((user) && (u))
- {
- WriteTo(user, u, "KILL %s :%s!%s!%s!%s (%s)", u->nick, source->name, ServerName, user->dhost,user->nick,reason);
- WriteOpers("*** Remote kill from %s by %s: %s!%s@%s (%s)",source->name,user->nick,u->nick,u->ident,u->host,reason);
- snprintf(kreason,MAXBUF,"[%s] Killed (%s (%s))",source->name,user->nick,reason);
- kill_link(u,kreason);
- }
-}
-
-void handle_Q(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* nick = strtok(params," :");
- char* reason = strtok(NULL,"\r\n");
- reason++;
-
- userrec* user = Find(nick);
-
- if (user)
- {
- if (strlen(reason)>MAXQUIT)
- {
- reason[MAXQUIT-1] = '\0';
- }
-
-
- WriteCommonExcept(user,"QUIT :%s",reason);
-
- user_hash::iterator iter = clientlist.find(user->nick);
-
- if (iter != clientlist.end())
- {
- log(DEBUG,"deleting user hash value %d",iter->second);
- if ((iter->second) && (user->registered == 7)) {
- delete iter->second;
- }
- clientlist.erase(iter);
- }
-
- purge_empty_chans();
- }
-}
-
-void handle_n(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* oldnick = strtok(params," ");
- char* newnick = strtok(NULL," ");
-
- userrec* user = Find(oldnick);
-
- if (user)
- {
- WriteCommon(user,"NICK %s",newnick);
- user = ReHashNick(user->nick, newnick);
- if (!user) return;
- if (!user->nick) return;
- strncpy(user->nick, newnick,NICKMAX);
- log(DEBUG,"new nick set: %s",user->nick);
- }
-}
-
-// k <SOURCE> <DEST> <CHANNEL> :<REASON>
-void handle_k(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* src = strtok(params," ");
- char* dest = strtok(NULL," ");
- char* channel = strtok(NULL," :");
- char* reason = strtok(NULL,"\r\n");
- reason++;
- userrec* s = Find(src);
- userrec* d = Find(dest);
- chanrec* c = FindChan(channel);
- if ((s) && (d) && (c))
- {
- kick_channel(s,d,c,reason);
- }
-}
-
-void handle_AT(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* who = strtok(params," :");
- char* text = strtok(NULL,"\r\n");
- text++;
- userrec* s = Find(who);
- if (s)
- {
- WriteWallOps(s,true,text);
- }
-}
-
-
-void handle_N(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* tm = strtok(params," ");
- char* nick = strtok(NULL," ");
- char* host = strtok(NULL," ");
- char* dhost = strtok(NULL," ");
- char* ident = strtok(NULL," ");
- char* modes = strtok(NULL," ");
- char* server = strtok(NULL," :");
- char* gecos = strtok(NULL,"\r\n");
- gecos++;
- modes++;
- time_t TS = atoi(tm);
- user_hash::iterator iter = clientlist.find(nick);
- if (iter != clientlist.end())
- {
- // nick collision
- WriteOpers("Nickname collision: %s@%s != %s@%s",nick,server,iter->second->nick,iter->second->server);
- char str[MAXBUF];
- snprintf(str,MAXBUF,"Killed (Nick Collision (%s@%s < %s@%s))",nick,server,iter->second->nick,iter->second->server);
- WriteServ(iter->second->fd, "KILL %s :%s",iter->second->nick,str);
- kill_link(iter->second,str);
- }
- clientlist[nick] = new userrec();
- // remote users have an fd of -1. This is so that our Write abstraction
- // routines know to route any messages to this record away to whatever server
- // theyre on.
- clientlist[nick]->fd = -1;
- strncpy(clientlist[nick]->nick, nick,NICKMAX);
- strncpy(clientlist[nick]->host, host,160);
- strncpy(clientlist[nick]->dhost, dhost,160);
- strncpy(clientlist[nick]->server, server,256);
- strncpy(clientlist[nick]->ident, ident,10); // +1 char to compensate for tilde
- strncpy(clientlist[nick]->fullname, gecos,128);
- clientlist[nick]->signon = TS;
- clientlist[nick]->nping = 0; // this is ignored for a remote user anyway.
- clientlist[nick]->lastping = 1;
- clientlist[nick]->port = 0; // so is this...
- clientlist[nick]->registered = 7; // this however we need to set for them to receive messages and appear online
- clientlist[nick]->idle_lastmsg = time(NULL); // this is unrealiable and wont actually be used locally
- for (int i = 0; i < MAXCHANS; i++)
- {
- clientlist[nick]->chans[i].channel = NULL;
- clientlist[nick]->chans[i].uc_modes = 0;
- }
-}
-
-void handle_F(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- long tdiff = time(NULL) - atoi(params);
- if (tdiff)
- WriteOpers("TS split for %s -> %s: %d",source->name,reply->name,tdiff);
-}
-
-void handle_a(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* nick = strtok(params," :");
- char* gecos = strtok(NULL,"\r\n");
-
- userrec* user = Find(nick);
-
- if (user)
- strncpy(user->fullname,gecos,MAXBUF);
-}
-
-void handle_b(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* nick = strtok(params," ");
- char* host = strtok(NULL," ");
-
- userrec* user = Find(nick);
-
- if (user)
- strncpy(user->dhost,host,160);
-}
-
-void handle_plus(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- // %s %s %d %d
- // + test3.chatspike.net 7010 -2016508415
- char* servername = strtok(params," ");
- char* ipaddr = strtok(NULL," ");
- char* ipport = strtok(NULL," ");
- char* cookie = strtok(NULL," ");
- log(DEBUG,"*** Connecting back to %s:%d",ipaddr,atoi(ipport));
-
-
- bool conn_already = false;
- for (int i = 0; i < 32; i++)
- {
- if (me[i] != NULL)
- {
- for (int j = 0; j < me[i]->connectors.size(); j++)
- {
- if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),servername))
- {
- if (me[i]->connectors[j].GetServerPort() == atoi(ipport))
- {
- log(DEBUG,"Already got a connection to %s:%d, ignoring +",ipaddr,atoi(ipport));
- conn_already = true;
- }
- }
- }
- }
- }
- if (!conn_already)
- me[defaultRoute]->MeshCookie(ipaddr,atoi(ipport),atoi(cookie),servername);
-}
-
-void handle_R(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- char* server = strtok(params," ");
- char* data = strtok(NULL,"\r\n");
- log(DEBUG,"Forwarded packet '%s' to '%s'",data,server);
- NetSendToOne(server,data);
-}
-
-void handle_J(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- // IMPORTANT NOTE
- // The J token currently has no timestamp - this needs looking at
- // because it will allow splitriding.
- char* nick = strtok(params," ");
- char* channel = strtok(NULL," ");
- userrec* user = Find(nick);
- while (channel)
- {
- if ((user != NULL) && (strcmp(channel,"")))
- {
- char privilage = '\0';
- if (channel[0] != '#')
- {
- privilage = channel[0];
- channel++;
- }
- add_channel(user,channel,"",true);
-
- // now work out the privilages they should have on each channel
- // and send the appropriate servermodes.
- for (int i = 0; i != MAXCHANS; i++)
- {
- if (user->chans[i].channel)
- {
- if (!strcasecmp(user->chans[i].channel->name,channel))
- {
- if (privilage == '@')
- {
- user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_OP;
- WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +o %s",channel,user->nick);
- }
- if (privilage == '%')
- {
- user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_HOP;
- WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +h %s",channel,user->nick);
- }
- if (privilage == '+')
- {
- user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_VOICE;
- WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +v %s",channel,user->nick);
- }
- }
- }
- }
-
- }
- channel = strtok(NULL," ");
- }
-}
-
void NetSendMyRoutingTable()
{
// send out a line saying what is reachable to us.
@@ -3308,36 +2848,6 @@ void NetSendMyRoutingTable()
NetSendToAll(buffer);
}
-void handle_dollar(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- log(DEBUG,"Storing routing table...");
- char* sourceserver = strtok(params," ");
- char* server = strtok(NULL," ");
- for (int i = 0; i < 32; i++)
- {
- if (me[i] != NULL)
- {
- for (int j = 0; j < me[i]->connectors.size(); j++)
- {
- if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),sourceserver))
- {
- me[i]->connectors[j].routes.clear();
- log(DEBUG,"Found entry for source server.");
- while (server)
- {
- // store each route
- me[i]->connectors[j].routes.push_back(server);
- log(DEBUG,"*** Stored route: %s -> %s -> %s",ServerName,sourceserver,server);
- server = strtok(NULL," ");
- }
- return;
- }
- }
- }
- }
- log(DEBUG,"Warning! routing table received from nonexistent server!");
-}
-
void DoSplit(const char* params)
{
@@ -3413,472 +2923,6 @@ void RemoveServer(const char* name)
}
}
-void handle_amp(char token,char* params,serverrec* source,serverrec* reply, char* udp_host)
-{
- log(DEBUG,"Netsplit! %s split from mesh, removing!",params);
- bool go_again = true;
- while (go_again)
- {
- go_again = false;
- for (int i = 0; i < 32; i++)
- {
- if (me[i] != NULL)
- {
- for (vector<ircd_connector>::iterator j = me[i]->connectors.begin(); j != me[i]->connectors.end(); j++)
- {
- if (!strcasecmp(j->GetServerName().c_str(),params))
- {
- j->routes.clear();
- j->CloseConnection();
- me[i]->connectors.erase(j);
- go_again = true;
- break;
- }
- }
- }
- }
- }
- log(DEBUG,"Removed server. Will remove clients...");
- // iterate through the userlist and remove all users on this server.
- // because we're dealing with a mesh, we dont have to deal with anything
- // "down-route" from this server (nice huh)
- go_again = true;
- char reason[MAXBUF];
- snprintf(reason,MAXBUF,"%s %s",ServerName,params);
- while (go_again)
- {
- go_again = false;
- for (user_hash::const_iterator u = clientlist.begin(); u != clientlist.end(); u++)
- {
- if (!strcasecmp(u->second->server,params))
- {
- kill_link(u->second,reason);
- go_again = true;
- break;
- }
- }
- }
-}
-
-long authcookie;
-
-
-void process_restricted_commands(char token,char* params,serverrec* source,serverrec* reply, char* udp_host,char* ipaddr,int port)
-{
- char buffer[MAXBUF];
-
- switch(token)
- {
- // Y <TS>
- // start netburst
- case 'Y':
- nb_start = time(NULL);
- WriteOpers("Server %s is starting netburst.",udp_host);
- // now broadcast this new servers address out to all servers that are linked to us,
- // except the newcomer. They'll all attempt to connect back to it.
- authcookie = rand()*rand();
- snprintf(buffer,MAXBUF,"~ %d",authcookie);
- NetSendToAll(buffer);
- break;
- // ~
- // Store authcookie
- // once stored, this authcookie permits other servers to log in
- // without user or password, using it.
- case '~':
- auth_cookies.push_back(atoi(params));
- log(DEBUG,"*** Stored auth cookie, will permit servers with auth-cookie %d",atoi(params));
- break;
- // connect back to a server using an authcookie
- case '+':
- handle_plus(token,params,source,reply,udp_host);
- break;
- // routing table
- case '$':
- handle_dollar(token,params,source,reply,udp_host);
- break;
- // node unreachable - we cant route to a server, sooooo we slit it off.
- // servers can generate these for themselves for an squit.
- case '&':
- handle_amp(token,params,source,reply,udp_host);
- break;
- // R <server> <data>
- // redirect token, send all of <data> along to the given
- // server as this server has been found to still have a route to it
- case 'R':
- handle_R(token,params,source,reply,udp_host);
- break;
- // ?
- // ping
- case '?':
- reply->SendPacket("!",udp_host);
- break;
- // ?
- // pong
- case '!':
- break;
- // *
- // no operation
- case '*':
- break;
- // N <TS> <NICK> <HOST> <DHOST> <IDENT> <MODES> <SERVER> :<GECOS>
- // introduce remote client
- case 'N':
- handle_N(token,params,source,reply,udp_host);
- break;
- // a <NICK> :<GECOS>
- // change GECOS (SETNAME)
- case 'a':
- handle_a(token,params,source,reply,udp_host);
- break;
- // b <NICK> :<HOST>
- // change displayed host (SETHOST)
- case 'b':
- handle_b(token,params,source,reply,udp_host);
- break;
- // t <NICK> <CHANNEL> :<TOPIC>
- // change a channel topic
- case 't':
- handle_t(token,params,source,reply,udp_host);
- break;
- // i <NICK> <CHANNEL>
- // invite a user to a channel
- case 'i':
- handle_i(token,params,source,reply,udp_host);
- break;
- // k <SOURCE> <DEST> <CHANNEL> :<REASON>
- // kick a user from a channel
- case 'k':
- handle_k(token,params,source,reply,udp_host);
- break;
- // n <NICK> <NEWNICK>
- // change nickname of client -- a server should only be able to
- // change the nicknames of clients that reside on it unless
- // they are ulined.
- case 'n':
- handle_n(token,params,source,reply,udp_host);
- break;
- // J <NICK> <CHANLIST>
- // Join user to channel list, merge channel permissions
- case 'J':
- handle_J(token,params,source,reply,udp_host);
- break;
- // T <TS> <CHANNEL> <TOPICSETTER> :<TOPIC>
- // change channel topic (netburst only)
- case 'T':
- handle_T(token,params,source,reply,udp_host);
- break;
- // M <TARGET> <MODES> [MODE-PARAMETERS]
- // Server setting modes on an object
- case 'M':
- handle_M(token,params,source,reply,udp_host);
- break;
- // m <SOURCE> <TARGET> <MODES> [MODE-PARAMETERS]
- // User setting modes on an object
- case 'm':
- handle_m(token,params,source,reply,udp_host);
- break;
- // P <SOURCE> <TARGET> :<TEXT>
- // Send a private/channel message
- case 'P':
- handle_P(token,params,source,reply,udp_host);
- break;
- // V <SOURCE> <TARGET> :<TEXT>
- // Send a private/channel notice
- case 'V':
- handle_V(token,params,source,reply,udp_host);
- break;
- // L <SOURCE> <CHANNEL> :<REASON>
- // User parting a channel
- case 'L':
- handle_L(token,params,source,reply,udp_host);
- break;
- // Q <SOURCE> :<REASON>
- // user quitting
- case 'Q':
- handle_Q(token,params,source,reply,udp_host);
- break;
- // K <SOURCE> <DEST> :<REASON>
- // remote kill
- case 'K':
- handle_K(token,params,source,reply,udp_host);
- break;
- // @ <SOURCE> :<TEXT>
- // wallops
- case '@':
- handle_AT(token,params,source,reply,udp_host);
- break;
- // F <TS>
- // end netburst
- case 'F':
- WriteOpers("Server %s has completed netburst. (%d secs)",udp_host,time(NULL)-nb_start);
- handle_F(token,params,source,reply,udp_host);
- nb_start = 0;
- // tell all the other servers to use this authcookie to connect back again
- // got '+ test3.chatspike.net 7010 -2016508415' from test.chatspike.net
- snprintf(buffer,MAXBUF,"+ %s %s %d %d",udp_host,ipaddr,port,authcookie);
- NetSendToAllExcept(udp_host,buffer);
- break;
- // X <reserved>
- // Send netburst now
- case 'X':
- WriteOpers("Sending my netburst to %s",udp_host);
- DoSync(source,udp_host);
- WriteOpers("Send of netburst to %s completed",udp_host);
- NetSendMyRoutingTable();
- break;
- // anything else
- default:
- WriteOpers("WARNING! Unknown datagram type '%c'",token);
- break;
- }
-}
-
-
-void handle_link_packet(char* udp_msg, char* udp_host, serverrec *serv)
-{
- char response[10240];
- char token = udp_msg[0];
- char* params = udp_msg + 2;
- char finalparam[1024];
- strcpy(finalparam," :xxxx");
- if (strstr(udp_msg," :")) {
- strncpy(finalparam,strstr(udp_msg," :"),1024);
- }
- if (token == '-') {
- char* cookie = strtok(params," ");
- char* servername = strtok(NULL," ");
- char* serverdesc = finalparam+2;
-
- WriteOpers("AuthCookie CONNECT from %s (%s)",servername,udp_host);
-
- for (int u = 0; u < auth_cookies.size(); u++)
- {
- if (auth_cookies[u] == atoi(cookie))
- {
- WriteOpers("Allowed cookie from %s, is now part of the mesh",servername);
-
-
- for (int j = 0; j < 32; j++)
- {
- if (me[j] != NULL)
- {
- for (int k = 0; k < me[j]->connectors.size(); k++)
- {
- if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),udp_host))
- {
- me[j]->connectors[k].SetServerName(servername);
- me[j]->connectors[k].SetDescription(serverdesc);
- me[j]->connectors[k].SetState(STATE_CONNECTED);
- NetSendMyRoutingTable();
- return;
- }
- }
- }
- WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right now! Possible intrusion attempt!",udp_host);
- return;
- }
-
-
- return;
- }
- }
- // bad cookie, bad bad! go sit in the corner!
- WriteOpers("Bad cookie from %s!",servername);
- return;
- }
- else
- if (token == 'S') {
- // S test.chatspike.net password portn :ChatSpike InspIRCd test server
- char* servername = strtok(params," ");
- char* password = strtok(NULL," ");
- char* myport = strtok(NULL," ");
- char* revision = strtok(NULL," ");
- char* serverdesc = finalparam+2;
-
- WriteOpers("CONNECT from %s (%s) (their port: %d)",servername,udp_host,atoi(myport));
-
- ircd_connector* cn = serv->FindHost(servername);
-
- if (cn)
- {
- WriteOpers("CONNECT aborted: Server %s already exists from %s",servername,ServerName);
- char buffer[MAXBUF];
- sprintf(buffer,"E :Server %s already exists!",servername);
- serv->SendPacket(buffer,udp_host);
- RemoveServer(udp_host);
- return;
- }
-
- if (atoi(revision) != GetRevision())
- {
- WriteOpers("CONNECT aborted: Could not link to %s, is an incompatible version %s, our version is %d",servername,revision,GetRevision());
- char buffer[MAXBUF];
- sprintf(buffer,"E :Version number mismatch");
- serv->SendPacket(buffer,udp_host);
- RemoveServer(udp_host);
- RemoveServer(servername);
- return;
- }
-
- for (int j = 0; j < serv->connectors.size(); j++)
- {
- if (!strcasecmp(serv->connectors[j].GetServerName().c_str(),udp_host))
- {
- serv->connectors[j].SetServerName(servername);
- serv->connectors[j].SetDescription(serverdesc);
- serv->connectors[j].SetServerPort(atoi(myport));
- }
- }
-
-
- char Link_ServerName[1024];
- char Link_IPAddr[1024];
- char Link_Port[1024];
- char Link_Pass[1024];
- char Link_SendPass[1024];
- int LinkPort = 0;
-
- // search for a corresponding <link> block in the config files
- for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
- {
- ConfValue("link","name",i,Link_ServerName,&config_f);
- ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
- ConfValue("link","port",i,Link_Port,&config_f);
- ConfValue("link","recvpass",i,Link_Pass,&config_f);
- ConfValue("link","sendpass",i,Link_SendPass,&config_f);
- log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
- LinkPort = atoi(Link_Port);
- if (!strcasecmp(Link_ServerName,servername))
- {
- // we have a matching link line -
- // send a 'diminutive' server message back...
- snprintf(response,10240,"s %s %s :%s",ServerName,Link_SendPass,ServerDesc);
- serv->SendPacket(response,servername);
-
- for (int t = 0; t < serv->connectors.size(); t++)
- {
- if (!strcasecmp(serv->connectors[t].GetServerName().c_str(),servername))
- {
- serv->connectors[t].SetState(STATE_CONNECTED);
- }
- }
-
- return;
- }
- }
- char buffer[MAXBUF];
- sprintf(buffer,"E :Access is denied (no matching link block)");
- serv->SendPacket(buffer,udp_host);
- WriteOpers("CONNECT from %s denied, no matching link block",servername);
- RemoveServer(udp_host);
- RemoveServer(servername);
- return;
- }
- else
- if (token == 's') {
- // S test.chatspike.net password :ChatSpike InspIRCd test server
- char* servername = strtok(params," ");
- char* password = strtok(NULL," ");
- char* serverdesc = finalparam+2;
-
- // TODO: we should do a check here to ensure that this server is one we recently initiated a
- // link with, and didnt hear an 's' or 'E' back from yet (these are the only two valid responses
- // to an 'S' command. If we didn't recently send an 'S' to this server, theyre trying to spoof
- // a connect, so put out an oper alert!
-
- // for now, just accept all, we'll fix that later.
- WriteOpers("%s accepted our link credentials ",servername);
-
- char Link_ServerName[1024];
- char Link_IPAddr[1024];
- char Link_Port[1024];
- char Link_Pass[1024];
- char Link_SendPass[1024];
- int LinkPort = 0;
-
- // search for a corresponding <link> block in the config files
- for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
- {
- ConfValue("link","name",i,Link_ServerName,&config_f);
- ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
- ConfValue("link","port",i,Link_Port,&config_f);
- ConfValue("link","recvpass",i,Link_Pass,&config_f);
- ConfValue("link","sendpass",i,Link_SendPass,&config_f);
- log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
- LinkPort = atoi(Link_Port);
- if (!strcasecmp(Link_ServerName,servername))
- {
- // matching link at this end too, we're all done!
- // at this point we must begin key exchange and insert this
- // server into our 'active' table.
- for (int j = 0; j < 32; j++)
- {
- if (me[j] != NULL)
- {
- for (int k = 0; k < me[j]->connectors.size(); k++)
- {
- if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),udp_host))
- {
- char buffer[MAXBUF];
- me[j]->connectors[k].SetDescription(serverdesc);
- me[j]->connectors[k].SetState(STATE_CONNECTED);
- sprintf(buffer,"X 0");
- serv->SendPacket(buffer,udp_host);
- DoSync(me[j],udp_host);
- NetSendMyRoutingTable();
- return;
- }
- }
- }
- WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right noe! Possible intrusion attempt!",udp_host);
- return;
- }
- }
- else {
- log(DEBUG,"Server names '%s' and '%s' don't match",Link_ServerName,servername);
- }
- }
- char buffer[MAXBUF];
- sprintf(buffer,"E :Access is denied (no matching link block)");
- serv->SendPacket(buffer,udp_host);
- WriteOpers("CONNECT from %s denied, no matching link block",servername);
- RemoveServer(udp_host);
- RemoveServer(servername);
- return;
- }
- else
- if (token == 'E') {
- char* error_message = finalparam+2;
- WriteOpers("ERROR from %s: %s",udp_host,error_message);
- return;
- }
- else {
-
- serverrec* source_server = NULL;
-
- for (int j = 0; j < 32; j++)
- {
- if (me[j] != NULL)
- {
- for (int x = 0; x < me[j]->connectors.size(); x++)
- {
- log(DEBUG,"Servers are: '%s' '%s'",udp_host,me[j]->connectors[x].GetServerName().c_str());
- if (!strcasecmp(me[j]->connectors[x].GetServerName().c_str(),udp_host))
- {
- if (me[j]->connectors[x].GetState() == STATE_CONNECTED)
- {
- // found a valid ircd_connector.
- process_restricted_commands(token,params,me[j],serv,udp_host,me[j]->connectors[x].GetServerIP(),me[j]->connectors[x].GetServerPort());
- return;
- }
- }
- }
- }
- }
-
- log(DEBUG,"Unrecognised token or unauthenticated host in datagram from %s: %c",udp_host,token);
- }
-}
int reap_counter = 0;
@@ -4057,7 +3101,7 @@ int InspIRCd(void)
length = sizeof (client);
- char udp_msg[MAXBUF], udp_host[MAXBUF];
+ char udp_msg[MAXBUF], tcp_host[MAXBUF];
/* main loop, this never returns */
for (;;)
@@ -4128,7 +3172,7 @@ int InspIRCd(void)
{
std::deque<std::string> msgs;
msgs.clear();
- if (me[x]->RecvPacket(msgs, udp_host))
+ if (me[x]->RecvPacket(msgs, tcp_host))
{
for (int ctr = 0; ctr < msgs.size(); ctr++)
{
@@ -4136,16 +3180,16 @@ int InspIRCd(void)
strncpy(udp_msg,msgs[ctr].c_str(),MAXBUF);
if (strlen(udp_msg)<1)
{
- log(DEBUG,"Invalid string from %s [route%d]",udp_host,x);
+ log(DEBUG,"Invalid string from %s [route%d]",tcp_host,x);
break;
}
// during a netburst, send all data to all other linked servers
if ((nb_start>0) && (udp_msg[0] != 'Y') && (udp_msg[0] != 'X') && (udp_msg[0] != 'F'))
{
- NetSendToAllExcept(udp_host,udp_msg);
+ NetSendToAllExcept(tcp_host,udp_msg);
}
FOREACH_MOD OnPacketReceive(udp_msg);
- handle_link_packet(udp_msg, udp_host, me[x]);
+ handle_link_packet(udp_msg, tcp_host, me[x]);
}
goto label;
}