2 #include "inspircd_io.h"
3 #include "inspircd_util.h"
4 #include "inspircd_config.h"
9 #include <sys/utsname.h>
14 #include <ext/hash_map>
26 #include "connection.h"
39 #define nspace __gnu_cxx
47 extern vector<Module*> modules;
48 extern vector<ircd_module*> factory;
51 extern char ServerName[MAXBUF];
52 extern char Network[MAXBUF];
53 extern char ServerDesc[MAXBUF];
54 extern char AdminName[MAXBUF];
55 extern char AdminEmail[MAXBUF];
56 extern char AdminNick[MAXBUF];
57 extern char diepass[MAXBUF];
58 extern char restartpass[MAXBUF];
59 extern char motd[MAXBUF];
60 extern char rules[MAXBUF];
61 extern char list[MAXBUF];
62 extern char PrefixQuit[MAXBUF];
63 extern char DieValue[MAXBUF];
66 extern int WHOWAS_STALE;
67 extern int WHOWAS_MAX;
69 extern time_t startup_time;
70 extern int NetBufferSize;
71 extern time_t nb_start;
73 extern std::vector<int> fd_reap;
74 extern std::vector<std::string> module_names;
76 extern char bannerBuffer[MAXBUF];
77 extern int boundPortCount;
79 extern int UDPportCount;
80 extern int ports[MAXSOCKS];
81 extern int defaultRoute;
83 extern std::vector<long> auth_cookies;
84 extern std::stringstream config_f;
86 extern serverrec* me[32];
88 extern FILE *log_file;
92 template<> struct nspace::hash<in_addr>
94 size_t operator()(const struct in_addr &a) const
97 memcpy(&q,&a,sizeof(size_t));
102 template<> struct nspace::hash<string>
104 size_t operator()(const string &s) const
107 static struct hash<const char *> strhash;
119 bool operator()(const string& s1, const string& s2) const
121 char a[MAXBUF],b[MAXBUF];
122 strcpy(a,s1.c_str());
123 strcpy(b,s2.c_str());
124 return (strcasecmp(a,b) == 0);
129 struct InAddr_HashComp
132 bool operator()(const in_addr &s1, const in_addr &s2) const
137 memcpy(&q,&s1,sizeof(size_t));
138 memcpy(&p,&s2,sizeof(size_t));
146 typedef nspace::hash_map<std::string, userrec*, nspace::hash<string>, StrHashComp> user_hash;
147 typedef nspace::hash_map<std::string, chanrec*, nspace::hash<string>, StrHashComp> chan_hash;
148 typedef nspace::hash_map<in_addr,string*, nspace::hash<in_addr>, InAddr_HashComp> address_cache;
149 typedef std::deque<command_t> command_table;
152 extern user_hash clientlist;
153 extern chan_hash chanlist;
154 extern user_hash whowas;
155 extern command_table cmdlist;
156 extern file_cache MOTD;
157 extern file_cache RULES;
158 extern address_cache IP;
161 void handle_join(char **parameters, int pcnt, userrec *user)
166 if (loop_call(handle_join,parameters,pcnt,user,0,0,1))
168 if (parameters[0][0] == '#')
170 Ptr = add_channel(user,parameters[0],parameters[1],false);
175 void handle_part(char **parameters, int pcnt, userrec *user)
181 if (loop_call(handle_part,parameters,pcnt,user,0,pcnt-2,0))
183 del_channel(user,parameters[0],parameters[1],false);
187 if (loop_call(handle_part,parameters,pcnt,user,0,pcnt-1,0))
189 del_channel(user,parameters[0],NULL,false);
193 void handle_kick(char **parameters, int pcnt, userrec *user)
195 chanrec* Ptr = FindChan(parameters[0]);
196 userrec* u = Find(parameters[1]);
200 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
204 if (!has_channel(u,Ptr))
206 WriteServ(user->fd,"442 %s %s :You're not on that channel!",user->nick, parameters[0]);
214 strncpy(reason,parameters[2],MAXBUF);
215 if (strlen(reason)>MAXKICK)
217 reason[MAXKICK-1] = '\0';
220 kick_channel(user,u,Ptr,reason);
224 strcpy(reason,user->nick);
225 kick_channel(user,u,Ptr,reason);
228 // this must be propogated so that channel membership is kept in step network-wide
231 snprintf(buffer,MAXBUF,"k %s %s %s :%s",user->nick,u->nick,Ptr->name,reason);
232 NetSendToAll(buffer);
236 void handle_die(char **parameters, int pcnt, userrec *user)
238 log(DEBUG,"die: %s",user->nick);
239 if (!strcmp(parameters[0],diepass))
241 WriteOpers("*** DIE command from %s!%s@%s, terminating...",user->nick,user->ident,user->host);
247 WriteOpers("*** Failed DIE Command from %s!%s@%s.",user->nick,user->ident,user->host);
251 void handle_restart(char **parameters, int pcnt, userrec *user)
253 log(DEBUG,"restart: %s",user->nick);
254 if (!strcmp(parameters[0],restartpass))
256 WriteOpers("*** RESTART command from %s!%s@%s, Pretending to restart till this is finished :D",user->nick,user->ident,user->host);
259 /* Will finish this later when i can be arsed :) */
263 WriteOpers("*** Failed RESTART Command from %s!%s@%s.",user->nick,user->ident,user->host);
267 void handle_kill(char **parameters, int pcnt, userrec *user)
269 userrec *u = Find(parameters[0]);
270 char killreason[MAXBUF];
272 log(DEBUG,"kill: %s %s",parameters[0],parameters[1]);
275 if (strcmp(ServerName,u->server))
278 WriteOpers("*** Remote kill by %s: %s!%s@%s (%s)",user->nick,u->nick,u->ident,u->host,parameters[1]);
279 sprintf(killreason,"[%s] Killed (%s (%s))",ServerName,user->nick,parameters[1]);
280 WriteCommonExcept(u,"QUIT :%s",killreason);
281 // K token must go to ALL servers!!!
283 snprintf(buffer,MAXBUF,"K %s %s :%s",user->nick,u->nick,killreason);
284 NetSendToAll(buffer);
286 user_hash::iterator iter = clientlist.find(u->nick);
287 if (iter != clientlist.end())
289 log(DEBUG,"deleting user hash value %d",iter->second);
290 if ((iter->second) && (user->registered == 7)) {
293 clientlist.erase(iter);
300 WriteTo(user, u, "KILL %s :%s!%s!%s (%s)", u->nick, ServerName,user->dhost,user->nick,parameters[1]);
301 WriteOpers("*** Local Kill by %s: %s!%s@%s (%s)",user->nick,u->nick,u->ident,u->host,parameters[1]);
302 sprintf(killreason,"Killed (%s (%s))",user->nick,parameters[1]);
303 kill_link(u,killreason);
308 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
312 void handle_summon(char **parameters, int pcnt, userrec *user)
314 WriteServ(user->fd,"445 %s :SUMMON has been disabled (depreciated command)",user->nick);
317 void handle_users(char **parameters, int pcnt, userrec *user)
319 WriteServ(user->fd,"445 %s :USERS has been disabled (depreciated command)",user->nick);
322 void handle_pass(char **parameters, int pcnt, userrec *user)
324 // Check to make sure they havnt registered -- Fix by FCS
325 if (user->registered == 7)
327 WriteServ(user->fd,"462 %s :You may not reregister",user->nick);
330 if (!strcasecmp(parameters[0],Passwd(user)))
332 user->haspassed = true;
336 void handle_invite(char **parameters, int pcnt, userrec *user)
338 userrec* u = Find(parameters[0]);
339 chanrec* c = FindChan(parameters[1]);
345 WriteServ(user->fd,"401 %s %s :No such nick/channel",user->nick, parameters[1]);
351 WriteServ(user->fd,"401 %s %s :No such nick/channel",user->nick, parameters[0]);
360 if (cstatus(user,c) < STATUS_HOP)
362 WriteServ(user->fd,"482 %s %s :You must be at least a half-operator to change modes on this channel",user->nick, c->name);
366 if (has_channel(u,c))
368 WriteServ(user->fd,"443 %s %s %s :Is already on channel %s",user->nick,u->nick,c->name,c->name);
371 if (!has_channel(user,c))
373 WriteServ(user->fd,"442 %s %s :You're not on that channel!",user->nick, c->name);
376 u->InviteTo(c->name);
377 WriteFrom(u->fd,user,"INVITE %s :%s",u->nick,c->name);
378 WriteServ(user->fd,"341 %s %s %s",user->nick,u->nick,c->name);
380 // i token must go to ALL servers!!!
382 snprintf(buffer,MAXBUF,"i %s %s %s",u->nick,user->nick,c->name);
383 NetSendToAll(buffer);
386 void handle_topic(char **parameters, int pcnt, userrec *user)
392 if (strlen(parameters[0]) <= CHANMAX)
394 Ptr = FindChan(parameters[0]);
399 WriteServ(user->fd,"332 %s %s :%s", user->nick, Ptr->name, Ptr->topic);
400 WriteServ(user->fd,"333 %s %s %s %d", user->nick, Ptr->name, Ptr->setby, Ptr->topicset);
404 WriteServ(user->fd,"331 %s %s :No topic is set.", user->nick, Ptr->name);
409 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
416 if (strlen(parameters[0]) <= CHANMAX)
418 Ptr = FindChan(parameters[0]);
421 if ((Ptr->topiclock) && (cstatus(user,Ptr)<STATUS_HOP))
423 WriteServ(user->fd,"482 %s %s :You must be at least a half-operator to change modes on this channel", user->nick, Ptr->name);
428 strncpy(topic,parameters[1],MAXBUF);
429 if (strlen(topic)>MAXTOPIC)
431 topic[MAXTOPIC-1] = '\0';
434 strcpy(Ptr->topic,topic);
435 strcpy(Ptr->setby,user->nick);
436 Ptr->topicset = time(NULL);
437 WriteChannel(Ptr,user,"TOPIC %s :%s",Ptr->name, Ptr->topic);
439 // t token must go to ALL servers!!!
441 snprintf(buffer,MAXBUF,"t %s %s :%s",user->nick,Ptr->name,topic);
442 NetSendToAll(buffer);
446 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
452 void handle_names(char **parameters, int pcnt, userrec *user)
456 if (loop_call(handle_names,parameters,pcnt,user,0,pcnt-1,0))
458 c = FindChan(parameters[0]);
461 /*WriteServ(user->fd,"353 %s = %s :%s", user->nick, c->name,*/
463 WriteServ(user->fd,"366 %s %s :End of /NAMES list.", user->nick, c->name);
467 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
471 void handle_privmsg(char **parameters, int pcnt, userrec *user)
476 user->idle_lastmsg = time(NULL);
478 if (loop_call(handle_privmsg,parameters,pcnt,user,0,pcnt-2,0))
480 if (parameters[0][0] == '#')
482 chan = FindChan(parameters[0]);
485 if ((chan->noexternal) && (!has_channel(user,chan)))
487 WriteServ(user->fd,"404 %s %s :Cannot send to channel (no external messages)", user->nick, chan->name);
490 if ((chan->moderated) && (cstatus(user,chan)<STATUS_VOICE))
492 WriteServ(user->fd,"404 %s %s :Cannot send to channel (+m)", user->nick, chan->name);
498 FOREACH_RESULT(OnUserPreMessage(user,chan,TYPE_CHANNEL,std::string(parameters[1])));
503 ChanExceptSender(chan, user, "PRIVMSG %s :%s", chan->name, parameters[1]);
505 // if any users of this channel are on remote servers, broadcast the packet
507 snprintf(buffer,MAXBUF,"P %s %s :%s",user->nick,chan->name,parameters[1]);
508 NetSendToCommon(user,buffer);
512 /* no such nick/channel */
513 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
518 dest = Find(parameters[0]);
521 if (strcmp(dest->awaymsg,""))
523 /* auto respond with aweh msg */
524 WriteServ(user->fd,"301 %s %s :%s",user->nick,dest->nick,dest->awaymsg);
529 FOREACH_RESULT(OnUserPreMessage(user,dest,TYPE_USER,std::string(parameters[1])));
536 if (!strcmp(dest->server,user->server))
538 // direct write, same server
539 WriteTo(user, dest, "PRIVMSG %s :%s", dest->nick, parameters[1]);
544 snprintf(buffer,MAXBUF,"P %s %s :%s",user->nick,dest->nick,parameters[1]);
545 NetSendToOne(dest->server,buffer);
550 /* no such nick/channel */
551 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
555 void handle_notice(char **parameters, int pcnt, userrec *user)
560 user->idle_lastmsg = time(NULL);
562 if (loop_call(handle_notice,parameters,pcnt,user,0,pcnt-2,0))
564 if (parameters[0][0] == '#')
566 chan = FindChan(parameters[0]);
569 if ((chan->noexternal) && (!has_channel(user,chan)))
571 WriteServ(user->fd,"404 %s %s :Cannot send to channel (no external messages)", user->nick, chan->name);
574 if ((chan->moderated) && (cstatus(user,chan)<STATUS_VOICE))
576 WriteServ(user->fd,"404 %s %s :Cannot send to channel (+m)", user->nick, chan->name);
582 FOREACH_RESULT(OnUserPreNotice(user,chan,TYPE_CHANNEL,std::string(parameters[1])));
587 ChanExceptSender(chan, user, "NOTICE %s :%s", chan->name, parameters[1]);
589 // if any users of this channel are on remote servers, broadcast the packet
591 snprintf(buffer,MAXBUF,"V %s %s :%s",user->nick,chan->name,parameters[1]);
592 NetSendToCommon(user,buffer);
596 /* no such nick/channel */
597 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
602 dest = Find(parameters[0]);
607 FOREACH_RESULT(OnUserPreNotice(user,dest,TYPE_USER,std::string(parameters[1])));
612 if (!strcmp(dest->server,user->server))
614 // direct write, same server
615 WriteTo(user, dest, "NOTICE %s :%s", dest->nick, parameters[1]);
620 snprintf(buffer,MAXBUF,"V %s %s :%s",user->nick,dest->nick,parameters[1]);
621 NetSendToOne(dest->server,buffer);
626 /* no such nick/channel */
627 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
632 void handle_info(char **parameters, int pcnt, userrec *user)
634 WriteServ(user->fd,"371 %s :The Inspire IRCd Project Has been brought to you by the following people..",user->nick);
635 WriteServ(user->fd,"371 %s :Craig Edwards, Craig McLure, and Others..",user->nick);
636 WriteServ(user->fd,"371 %s :Will finish this later when i can be arsed :p",user->nick);
637 FOREACH_MOD OnInfo(user);
638 WriteServ(user->fd,"374 %s :End of /INFO list",user->nick);
641 void handle_time(char **parameters, int pcnt, userrec *user)
644 struct tm * timeinfo;
647 timeinfo = localtime ( &rawtime );
648 WriteServ(user->fd,"391 %s %s :%s",user->nick,ServerName, asctime (timeinfo) );
652 void handle_whois(char **parameters, int pcnt, userrec *user)
657 if (loop_call(handle_whois,parameters,pcnt,user,0,pcnt-1,0))
659 dest = Find(parameters[0]);
662 // bug found by phidjit - were able to whois an incomplete connection if it had sent a NICK or USER
663 if (dest->registered == 7)
665 WriteServ(user->fd,"311 %s %s %s %s * :%s",user->nick, dest->nick, dest->ident, dest->dhost, dest->fullname);
666 if ((user == dest) || (strchr(user->modes,'o')))
668 WriteServ(user->fd,"378 %s %s :is connecting from *@%s",user->nick, dest->nick, dest->host);
670 if (strcmp(chlist(dest),""))
672 WriteServ(user->fd,"319 %s %s :%s",user->nick, dest->nick, chlist(dest));
674 WriteServ(user->fd,"312 %s %s %s :%s",user->nick, dest->nick, dest->server, GetServerDescription(dest->server).c_str());
675 if (strcmp(dest->awaymsg,""))
677 WriteServ(user->fd,"301 %s %s :%s",user->nick, dest->nick, dest->awaymsg);
679 if (strchr(dest->modes,'o'))
681 WriteServ(user->fd,"313 %s %s :is an IRC operator",user->nick, dest->nick);
683 FOREACH_MOD OnWhois(user,dest);
684 if (!strcasecmp(user->server,dest->server))
686 // idle time and signon line can only be sent if youre on the same server (according to RFC)
687 WriteServ(user->fd,"317 %s %s %d %d :seconds idle, signon time",user->nick, dest->nick, abs((dest->idle_lastmsg)-time(NULL)), dest->signon);
690 WriteServ(user->fd,"318 %s %s :End of /WHOIS list.",user->nick, dest->nick);
694 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
699 /* no such nick/channel */
700 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
704 void handle_quit(char **parameters, int pcnt, userrec *user)
706 user_hash::iterator iter = clientlist.find(user->nick);
709 if (user->registered == 7)
711 /* theres more to do here, but for now just close the socket */
714 if (parameters[0][0] == ':')
718 reason = parameters[0];
720 if (strlen(reason)>MAXQUIT)
722 reason[MAXQUIT-1] = '\0';
725 Write(user->fd,"ERROR :Closing link (%s@%s) [%s]",user->ident,user->host,parameters[0]);
726 WriteOpers("*** Client exiting: %s!%s@%s [%s]",user->nick,user->ident,user->host,parameters[0]);
727 WriteCommonExcept(user,"QUIT :%s%s",PrefixQuit,parameters[0]);
730 snprintf(buffer,MAXBUF,"Q %s :%s%s",user->nick,PrefixQuit,parameters[0]);
731 NetSendToAll(buffer);
735 Write(user->fd,"ERROR :Closing link (%s@%s) [QUIT]",user->ident,user->host);
736 WriteOpers("*** Client exiting: %s!%s@%s [Client exited]",user->nick,user->ident,user->host);
737 WriteCommonExcept(user,"QUIT :Client exited");
740 snprintf(buffer,MAXBUF,"Q %s :Client exited",user->nick);
741 NetSendToAll(buffer);
743 FOREACH_MOD OnUserQuit(user);
747 /* push the socket on a stack of sockets due to be closed at the next opportunity */
748 fd_reap.push_back(user->fd);
750 if (iter != clientlist.end())
752 clientlist.erase(iter);
753 log(DEBUG,"deleting user hash value %d",iter->second);
754 //if ((user) && (user->registered == 7)) {
759 if (user->registered == 7) {
764 void handle_who(char **parameters, int pcnt, userrec *user)
768 /* theres more to do here, but for now just close the socket */
771 if ((!strcmp(parameters[0],"0")) || (!strcmp(parameters[0],"*")))
773 if (user->chans[0].channel)
775 Ptr = user->chans[0].channel;
776 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
778 if ((common_channels(user,i->second)) && (isnick(i->second->nick)))
780 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, Ptr->name, i->second->ident, i->second->dhost, i->second->server, i->second->nick, i->second->fullname);
786 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, Ptr->name);
790 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, user->nick);
794 if (parameters[0][0] == '#')
796 Ptr = FindChan(parameters[0]);
799 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
801 if ((has_channel(i->second,Ptr)) && (isnick(i->second->nick)))
803 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, Ptr->name, i->second->ident, i->second->dhost, i->second->server, i->second->nick, i->second->fullname);
806 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, Ptr->name);
810 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
815 userrec* u = Find(parameters[0]);
818 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, u->nick, u->ident, u->dhost, u->server, u->nick, u->fullname);
820 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, parameters[0]);
825 if ((!strcmp(parameters[0],"0")) || (!strcmp(parameters[0],"*")) && (!strcmp(parameters[1],"o")))
827 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
829 if ((common_channels(user,i->second)) && (isnick(i->second->nick)))
831 if (strchr(i->second->modes,'o'))
833 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, user->nick, i->second->ident, i->second->dhost, i->second->server, i->second->nick, i->second->fullname);
837 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, user->nick);
843 void handle_wallops(char **parameters, int pcnt, userrec *user)
845 WriteWallOps(user,false,"%s",parameters[0]);
848 void handle_list(char **parameters, int pcnt, userrec *user)
852 WriteServ(user->fd,"321 %s Channel :Users Name",user->nick);
853 for (chan_hash::const_iterator i = chanlist.begin(); i != chanlist.end(); i++)
855 if ((!i->second->c_private) && (!i->second->secret))
857 WriteServ(user->fd,"322 %s %s %d :[+%s] %s",user->nick,i->second->name,usercount_i(i->second),chanmodes(i->second),i->second->topic);
860 WriteServ(user->fd,"323 %s :End of channel list.",user->nick);
864 void handle_rehash(char **parameters, int pcnt, userrec *user)
866 WriteServ(user->fd,"382 %s %s :Rehashing",user->nick,CleanFilename(CONFIG_FILE));
868 FOREACH_MOD OnRehash();
869 WriteOpers("%s is rehashing config file %s",user->nick,CleanFilename(CONFIG_FILE));
872 void handle_lusers(char **parameters, int pcnt, userrec *user)
874 WriteServ(user->fd,"251 %s :There are %d users and %d invisible on %d servers",user->nick,usercnt()-usercount_invisible(),usercount_invisible(),servercount());
875 WriteServ(user->fd,"252 %s %d :operator(s) online",user->nick,usercount_opers());
876 WriteServ(user->fd,"253 %s %d :unknown connections",user->nick,usercount_unknown());
877 WriteServ(user->fd,"254 %s %d :channels formed",user->nick,chancount());
878 WriteServ(user->fd,"254 %s :I have %d clients and %d servers",user->nick,local_count(),count_servs());
881 void handle_admin(char **parameters, int pcnt, userrec *user)
883 WriteServ(user->fd,"256 %s :Administrative info for %s",user->nick,ServerName);
884 WriteServ(user->fd,"257 %s :Name - %s",user->nick,AdminName);
885 WriteServ(user->fd,"258 %s :Nickname - %s",user->nick,AdminNick);
886 WriteServ(user->fd,"258 %s :E-Mail - %s",user->nick,AdminEmail);
889 void handle_ping(char **parameters, int pcnt, userrec *user)
891 WriteServ(user->fd,"PONG %s :%s",ServerName,parameters[0]);
894 void handle_pong(char **parameters, int pcnt, userrec *user)
896 // set the user as alive so they survive to next ping
900 void handle_motd(char **parameters, int pcnt, userrec *user)
905 void handle_rules(char **parameters, int pcnt, userrec *user)
910 void handle_user(char **parameters, int pcnt, userrec *user)
912 if (user->registered < 3)
914 if (isident(parameters[0]) == 0) {
915 // This kinda Sucks, According to the RFC thou, its either this,
916 // or "You have already registered" :p -- Craig
917 WriteServ(user->fd,"461 %s USER :Not enough parameters",user->nick);
920 WriteServ(user->fd,"NOTICE Auth :No ident response, ident prefixed with ~");
921 strcpy(user->ident,"~"); /* we arent checking ident... but these days why bother anyway? */
922 strncat(user->ident,parameters[0],IDENTMAX);
923 strncpy(user->fullname,parameters[3],128);
924 user->registered = (user->registered | 1);
929 WriteServ(user->fd,"462 %s :You may not reregister",user->nick);
932 /* parameters 2 and 3 are local and remote hosts, ignored when sent by client connection */
933 if (user->registered == 3)
935 /* user is registered now, bit 0 = USER command, bit 1 = sent a NICK command */
940 void handle_userhost(char **parameters, int pcnt, userrec *user)
942 char Return[MAXBUF],junk[MAXBUF];
943 sprintf(Return,"302 %s :",user->nick);
944 for (int i = 0; i < pcnt; i++)
946 userrec *u = Find(parameters[i]);
949 if (strchr(u->modes,'o'))
951 sprintf(junk,"%s*=+%s@%s ",u->nick,u->ident,u->host);
956 sprintf(junk,"%s=+%s@%s ",u->nick,u->ident,u->host);
961 WriteServ(user->fd,Return);
965 void handle_ison(char **parameters, int pcnt, userrec *user)
968 sprintf(Return,"303 %s :",user->nick);
969 for (int i = 0; i < pcnt; i++)
971 userrec *u = Find(parameters[i]);
974 strcat(Return,u->nick);
978 WriteServ(user->fd,Return);
982 void handle_away(char **parameters, int pcnt, userrec *user)
986 strcpy(user->awaymsg,parameters[0]);
987 WriteServ(user->fd,"306 %s :You have been marked as being away",user->nick);
991 strcpy(user->awaymsg,"");
992 WriteServ(user->fd,"305 %s :You are no longer marked as being away",user->nick);
996 void handle_whowas(char **parameters, int pcnt, userrec* user)
998 user_hash::iterator i = whowas.find(parameters[0]);
1000 if (i == whowas.end())
1002 WriteServ(user->fd,"406 %s %s :There was no such nickname",user->nick,parameters[0]);
1003 WriteServ(user->fd,"369 %s %s :End of WHOWAS",user->nick,parameters[0]);
1007 time_t rawtime = i->second->signon;
1011 timeinfo = localtime(&rawtime);
1012 strcpy(b,asctime(timeinfo));
1013 b[strlen(b)-1] = '\0';
1015 WriteServ(user->fd,"314 %s %s %s %s * :%s",user->nick,i->second->nick,i->second->ident,i->second->dhost,i->second->fullname);
1016 WriteServ(user->fd,"312 %s %s %s :%s",user->nick,i->second->nick,i->second->server,b);
1017 WriteServ(user->fd,"369 %s %s :End of WHOWAS",user->nick,parameters[0]);
1022 void handle_trace(char **parameters, int pcnt, userrec *user)
1024 for (user_hash::iterator i = clientlist.begin(); i != clientlist.end(); i++)
1028 if (isnick(i->second->nick))
1030 if (strchr(i->second->modes,'o'))
1032 WriteServ(user->fd,"205 %s :Oper 0 %s",user->nick,i->second->nick);
1036 WriteServ(user->fd,"204 %s :User 0 %s",user->nick,i->second->nick);
1041 WriteServ(user->fd,"203 %s :???? 0 [%s]",user->nick,i->second->host);
1047 void handle_modules(char **parameters, int pcnt, userrec *user)
1049 for (int i = 0; i < module_names.size(); i++)
1051 Version V = modules[i]->GetVersion();
1052 char modulename[MAXBUF];
1053 strncpy(modulename,module_names[i].c_str(),256);
1054 WriteServ(user->fd,"900 %s :0x%08lx %d.%d.%d.%d %s",user->nick,modules[i],V.Major,V.Minor,V.Revision,V.Build,CleanFilename(modulename));
1058 void handle_stats(char **parameters, int pcnt, userrec *user)
1064 if (strlen(parameters[0])>1)
1066 /* make the stats query 1 character long */
1067 parameters[0][1] = '\0';
1070 /* stats m (list number of times each command has been used, plus bytecount) */
1071 if (!strcasecmp(parameters[0],"m"))
1073 for (int i = 0; i < cmdlist.size(); i++)
1075 if (cmdlist[i].handler_function)
1077 if (cmdlist[i].use_count)
1079 /* RPL_STATSCOMMANDS */
1080 WriteServ(user->fd,"212 %s %s %d %d",user->nick,cmdlist[i].command,cmdlist[i].use_count,cmdlist[i].total_bytes);
1087 /* stats z (debug and memory info) */
1088 if (!strcasecmp(parameters[0],"z"))
1090 WriteServ(user->fd,"249 %s :Users(HASH_MAP) %d (%d bytes, %d buckets)",user->nick,clientlist.size(),clientlist.size()*sizeof(userrec),clientlist.bucket_count());
1091 WriteServ(user->fd,"249 %s :Channels(HASH_MAP) %d (%d bytes, %d buckets)",user->nick,chanlist.size(),chanlist.size()*sizeof(chanrec),chanlist.bucket_count());
1092 WriteServ(user->fd,"249 %s :Commands(VECTOR) %d (%d bytes)",user->nick,cmdlist.size(),cmdlist.size()*sizeof(command_t));
1093 WriteServ(user->fd,"249 %s :MOTD(VECTOR) %d, RULES(VECTOR) %d",user->nick,MOTD.size(),RULES.size());
1094 WriteServ(user->fd,"249 %s :address_cache(HASH_MAP) %d (%d buckets)",user->nick,IP.size(),IP.bucket_count());
1095 WriteServ(user->fd,"249 %s :Modules(VECTOR) %d (%d)",user->nick,modules.size(),modules.size()*sizeof(Module));
1096 WriteServ(user->fd,"249 %s :ClassFactories(VECTOR) %d (%d)",user->nick,factory.size(),factory.size()*sizeof(ircd_module));
1097 WriteServ(user->fd,"249 %s :Ports(STATIC_ARRAY) %d",user->nick,boundPortCount);
1101 if (!strcasecmp(parameters[0],"o"))
1103 for (int i = 0; i < ConfValueEnum("oper",&config_f); i++)
1105 char LoginName[MAXBUF];
1106 char HostName[MAXBUF];
1107 char OperType[MAXBUF];
1108 ConfValue("oper","name",i,LoginName,&config_f);
1109 ConfValue("oper","host",i,HostName,&config_f);
1110 ConfValue("oper","type",i,OperType,&config_f);
1111 WriteServ(user->fd,"243 %s O %s * %s %s 0",user->nick,HostName,LoginName,OperType);
1115 /* stats l (show user I/O stats) */
1116 if (!strcasecmp(parameters[0],"l"))
1118 WriteServ(user->fd,"211 %s :server:port nick bytes_in cmds_in bytes_out cmds_out",user->nick);
1119 for (user_hash::iterator i = clientlist.begin(); i != clientlist.end(); i++)
1121 if (isnick(i->second->nick))
1123 WriteServ(user->fd,"211 %s :%s:%d %s %d %d %d %d",user->nick,ServerName,i->second->port,i->second->nick,i->second->bytes_in,i->second->cmds_in,i->second->bytes_out,i->second->cmds_out);
1127 WriteServ(user->fd,"211 %s :%s:%d (unknown@%d) %d %d %d %d",user->nick,ServerName,i->second->port,i->second->fd,i->second->bytes_in,i->second->cmds_in,i->second->bytes_out,i->second->cmds_out);
1133 /* stats u (show server uptime) */
1134 if (!strcasecmp(parameters[0],"u"))
1136 time_t current_time = 0;
1137 current_time = time(NULL);
1138 time_t server_uptime = current_time - startup_time;
1140 stime = gmtime(&server_uptime);
1141 /* i dont know who the hell would have an ircd running for over a year nonstop, but
1142 * Craig suggested this, and it seemed a good idea so in it went */
1143 if (stime->tm_year > 70)
1145 WriteServ(user->fd,"242 %s :Server up %d years, %d days, %.2d:%.2d:%.2d",user->nick,(stime->tm_year-70),stime->tm_yday,stime->tm_hour,stime->tm_min,stime->tm_sec);
1149 WriteServ(user->fd,"242 %s :Server up %d days, %.2d:%.2d:%.2d",user->nick,stime->tm_yday,stime->tm_hour,stime->tm_min,stime->tm_sec);
1153 WriteServ(user->fd,"219 %s %s :End of /STATS report",user->nick,parameters[0]);
1154 WriteOpers("*** Notice: Stats '%s' requested by %s (%s@%s)",parameters[0],user->nick,user->ident,user->host);
1158 void handle_connect(char **parameters, int pcnt, userrec *user)
1160 char Link_ServerName[1024];
1161 char Link_IPAddr[1024];
1162 char Link_Port[1024];
1163 char Link_Pass[1024];
1167 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
1171 ConfValue("link","name",i,Link_ServerName,&config_f);
1172 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
1173 ConfValue("link","port",i,Link_Port,&config_f);
1174 ConfValue("link","sendpass",i,Link_Pass,&config_f);
1175 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
1176 LinkPort = atoi(Link_Port);
1177 if (match(Link_ServerName,parameters[0])) {
1185 WriteServ(user->fd,"NOTICE %s :*** Failed to connect to %s: No servers matching this pattern are configured for linking.",user->nick,parameters[0]);
1189 // TODO: Perform a check here to stop a server being linked twice!
1191 WriteServ(user->fd,"NOTICE %s :*** Connecting to %s (%s) port %s...",user->nick,Link_ServerName,Link_IPAddr,Link_Port);
1193 if (me[defaultRoute])
1195 me[defaultRoute]->BeginLink(Link_IPAddr,LinkPort,Link_Pass,Link_ServerName,me[defaultRoute]->port);
1200 WriteServ(user->fd,"NOTICE %s :No default route is defined for server connections on this server. You must define a server connection to be default route so that sockets can be bound to it.",user->nick);
1204 void handle_squit(char **parameters, int pcnt, userrec *user)
1206 // send out an squit across the mesh and then clear the server list (for local squit)
1209 WriteOpers("SQUIT command issued by %s",user->nick);
1210 char buffer[MAXBUF];
1211 snprintf(buffer,MAXBUF,"& %s",ServerName);
1212 NetSendToAll(buffer);
1217 WriteServ(user->fd,"NOTICE :*** Remote SQUIT not supported yet.");
1221 void handle_links(char **parameters, int pcnt, userrec *user)
1223 WriteServ(user->fd,"364 %s %s %s :0 %s",user->nick,ServerName,ServerName,ServerDesc);
1224 for (int j = 0; j < 32; j++)
1228 for (int k = 0; k < me[j]->connectors.size(); k++)
1230 WriteServ(user->fd,"364 %s %s %s :1 %s",user->nick,me[j]->connectors[k].GetServerName().c_str(),ServerName,me[j]->connectors[k].GetDescription().c_str());
1234 WriteServ(user->fd,"365 %s * :End of /LINKS list.",user->nick);
1237 void handle_map(char **parameters, int pcnt, userrec *user)
1240 snprintf(line,MAXBUF,"006 %s :%s",user->nick,ServerName);
1241 while (strlen(line) < 50)
1243 WriteServ(user->fd,"%s%d (%.2f%%)",line,local_count(),(float)(((float)local_count()/(float)usercnt())*100));
1244 for (int j = 0; j < 32; j++)
1248 for (int k = 0; k < me[j]->connectors.size(); k++)
1250 snprintf(line,MAXBUF,"006 %s :%c-%s",user->nick,islast(me[j]->connectors[k].GetServerName().c_str()),me[j]->connectors[k].GetServerName().c_str());
1251 while (strlen(line) < 50)
1253 WriteServ(user->fd,"%s%d (%.2f%%)",line,map_count(me[j]->connectors[k].GetServerName().c_str()),(float)(((float)map_count(me[j]->connectors[k].GetServerName().c_str())/(float)usercnt())*100));
1257 WriteServ(user->fd,"007 %s :End of /MAP",user->nick);
1260 bool is_uline(const char* server)
1262 char ServName[MAXBUF];
1265 for (int i = 0; i < ConfValueEnum("uline",&config_f); i++)
1267 ConfValue("uline","server",i,ServName,&config_f);
1268 if (!strcasecmp(server,ServName))
1277 void handle_oper(char **parameters, int pcnt, userrec *user)
1279 char LoginName[MAXBUF];
1280 char Password[MAXBUF];
1281 char OperType[MAXBUF];
1282 char TypeName[MAXBUF];
1283 char Hostname[MAXBUF];
1286 for (int i = 0; i < ConfValueEnum("oper",&config_f); i++)
1288 ConfValue("oper","name",i,LoginName,&config_f);
1289 ConfValue("oper","password",i,Password,&config_f);
1290 if ((!strcmp(LoginName,parameters[0])) && (!strcmp(Password,parameters[1])))
1292 /* correct oper credentials */
1293 ConfValue("oper","type",i,OperType,&config_f);
1294 WriteOpers("*** %s (%s@%s) is now an IRC operator of type %s",user->nick,user->ident,user->host,OperType);
1295 WriteServ(user->fd,"381 %s :You are now an IRC operator of type %s",user->nick,OperType);
1296 WriteServ(user->fd,"MODE %s :+o",user->nick);
1297 char global[MAXBUF];
1298 snprintf(global,MAXBUF,"M %s +o",user->nick);
1299 NetSendToAll(global);
1300 for (j =0; j < ConfValueEnum("type",&config_f); j++)
1302 ConfValue("type","name",j,TypeName,&config_f);
1303 if (!strcmp(TypeName,OperType))
1305 /* found this oper's opertype */
1306 ConfValue("type","host",j,Hostname,&config_f);
1307 ChangeDisplayedHost(user,Hostname);
1310 if (!strchr(user->modes,'o'))
1312 strcat(user->modes,"o");
1314 FOREACH_MOD OnOper(user);
1319 WriteServ(user->fd,"491 %s :Invalid oper credentials",user->nick);
1320 WriteOpers("*** WARNING! Failed oper attempt by %s!%s@%s!",user->nick,user->ident,user->host);
1323 void handle_nick(char **parameters, int pcnt, userrec *user)
1327 log(DEBUG,"not enough params for handle_nick");
1332 log(DEBUG,"invalid parameter passed to handle_nick");
1335 if (!strlen(parameters[0]))
1337 log(DEBUG,"zero length new nick passed to handle_nick");
1342 log(DEBUG,"invalid user passed to handle_nick");
1347 log(DEBUG,"invalid old nick passed to handle_nick");
1350 if (!strcasecmp(user->nick,parameters[0]))
1352 log(DEBUG,"old nick is new nick, skipping");
1357 if (strlen(parameters[0]) > 1)
1359 if (parameters[0][0] == ':')
1364 if ((Find(parameters[0])) && (Find(parameters[0]) != user))
1366 WriteServ(user->fd,"433 %s %s :Nickname is already in use.",user->nick,parameters[0]);
1370 if (isnick(parameters[0]) == 0)
1372 WriteServ(user->fd,"432 %s %s :Erroneous Nickname",user->nick,parameters[0]);
1376 if (user->registered == 7)
1379 FOREACH_RESULT(OnUserPreNick(user,parameters[0]));
1381 // if a module returns true, the nick change is silently forbidden.
1385 WriteCommon(user,"NICK %s",parameters[0]);
1387 // Q token must go to ALL servers!!!
1388 char buffer[MAXBUF];
1389 snprintf(buffer,MAXBUF,"n %s %s",user->nick,parameters[0]);
1390 NetSendToAll(buffer);
1394 /* change the nick of the user in the users_hash */
1395 user = ReHashNick(user->nick, parameters[0]);
1396 /* actually change the nick within the record */
1398 if (!user->nick) return;
1400 strncpy(user->nick, parameters[0],NICKMAX);
1402 log(DEBUG,"new nick set: %s",user->nick);
1404 if (user->registered < 3)
1405 user->registered = (user->registered | 2);
1406 if (user->registered == 3)
1408 /* user is registered now, bit 0 = USER command, bit 1 = sent a NICK command */
1411 log(DEBUG,"exit nickchange: %s",user->nick);
1416 void handle_V(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1418 char* src = strtok(params," ");
1419 char* dest = strtok(NULL," :");
1420 char* text = strtok(NULL,"\r\n");
1423 userrec* user = Find(src);
1426 userrec* dst = Find(dest);
1430 WriteTo(user, dst, "NOTICE %s :%s", dst->nick, text);
1434 chanrec* d = FindChan(dest);
1437 ChanExceptSender(d, user, "NOTICE %s :%s", d->name, text);
1445 void handle_P(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1447 char* src = strtok(params," ");
1448 char* dest = strtok(NULL," :");
1449 char* text = strtok(NULL,"\r\n");
1452 userrec* user = Find(src);
1455 userrec* dst = Find(dest);
1459 WriteTo(user, dst, "PRIVMSG %s :%s", dst->nick, text);
1463 chanrec* d = FindChan(dest);
1466 ChanExceptSender(d, user, "PRIVMSG %s :%s", d->name, text);
1473 void handle_i(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1475 char* nick = strtok(params," ");
1476 char* from = strtok(NULL," ");
1477 char* channel = strtok(NULL," ");
1478 userrec* u = Find(nick);
1479 userrec* user = Find(from);
1480 chanrec* c = FindChan(channel);
1481 if ((c) && (u) && (user))
1483 u->InviteTo(c->name);
1484 WriteFrom(u->fd,user,"INVITE %s :%s",u->nick,c->name);
1488 void handle_t(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1490 char* setby = strtok(params," ");
1491 char* channel = strtok(NULL," :");
1492 char* topic = strtok(NULL,"\r\n");
1494 userrec* u = Find(setby);
1495 chanrec* c = FindChan(channel);
1498 WriteChannelLocal(c,u,"TOPIC %s :%s",c->name,topic);
1499 strncpy(c->topic,topic,MAXTOPIC);
1500 strncpy(c->setby,u->nick,NICKMAX);
1501 c->topicset = time(NULL);
1506 void handle_T(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1508 char* tm = strtok(params," ");
1509 char* setby = strtok(NULL," ");
1510 char* channel = strtok(NULL," :");
1511 char* topic = strtok(NULL,"\r\n");
1513 time_t TS = atoi(tm);
1514 chanrec* c = FindChan(channel);
1517 // in the case of topics and TS, the *NEWER*
1518 if (TS <= c->topicset)
1520 WriteChannelLocal(c,NULL,"TOPIC %s :%s",c->name,topic);
1521 strncpy(c->topic,topic,MAXTOPIC);
1522 strncpy(c->setby,setby,NICKMAX);
1527 void handle_M(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1530 char original[MAXBUF],target[MAXBUF];
1531 strncpy(original,params,MAXBUF);
1533 char* parameter = strtok(params," ");
1534 strncpy(target,parameter,MAXBUF);
1537 if (parameter[0] == ':')
1539 pars[index++] = parameter;
1540 parameter = strtok(NULL," ");
1542 log(DEBUG,"*** MODE: %s %s",pars[0],pars[1]);
1543 merge_mode(pars,index);
1544 if (FindChan(target))
1546 WriteChannelLocal(FindChan(target), NULL, "MODE %s",original);
1550 Write(Find(target)->fd,":%s MODE %s",ServerName,original);
1554 // m is modes set by users only (not servers) valid targets are channels or users.
1556 void handle_m(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1558 // m blah #chatspike +b *!test@*4
1560 char original[MAXBUF];
1561 strncpy(original,params,MAXBUF);
1563 if (!strchr(params,' '))
1565 WriteOpers("WARNING! 'm' token in data stream without any parameters! Something fishy is going on!");
1571 char* src = strtok(params," ");
1572 userrec* user = Find(src);
1576 log(DEBUG,"Found user: %s",user->nick);
1577 char* parameter = strtok(NULL," ");
1580 pars[index++] = parameter;
1581 parameter = strtok(NULL," ");
1584 log(DEBUG,"Calling merge_mode2");
1585 merge_mode2(pars,index,user);
1590 void handle_L(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1592 char* nick = strtok(params," ");
1593 char* channel = strtok(NULL," :");
1594 char* reason = strtok(NULL,"\r\n");
1595 userrec* user = Find(nick);
1599 if (strcmp(reason,""))
1601 del_channel(user,channel,reason,true);
1605 del_channel(user,channel,NULL,true);
1610 void handle_K(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1612 char* src = strtok(params," ");
1613 char* nick = strtok(NULL," :");
1614 char* reason = strtok(NULL,"\r\n");
1615 char kreason[MAXBUF];
1618 userrec* u = Find(nick);
1619 userrec* user = Find(src);
1623 WriteTo(user, u, "KILL %s :%s!%s!%s!%s (%s)", u->nick, source->name, ServerName, user->dhost,user->nick,reason);
1624 WriteOpers("*** Remote kill from %s by %s: %s!%s@%s (%s)",source->name,user->nick,u->nick,u->ident,u->host,reason);
1625 snprintf(kreason,MAXBUF,"[%s] Killed (%s (%s))",source->name,user->nick,reason);
1626 kill_link(u,kreason);
1630 void handle_Q(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1632 char* nick = strtok(params," :");
1633 char* reason = strtok(NULL,"\r\n");
1636 userrec* user = Find(nick);
1640 if (strlen(reason)>MAXQUIT)
1642 reason[MAXQUIT-1] = '\0';
1646 WriteCommonExcept(user,"QUIT :%s",reason);
1648 user_hash::iterator iter = clientlist.find(user->nick);
1650 if (iter != clientlist.end())
1652 log(DEBUG,"deleting user hash value %d",iter->second);
1653 if ((iter->second) && (user->registered == 7)) {
1654 delete iter->second;
1656 clientlist.erase(iter);
1659 purge_empty_chans();
1663 void handle_n(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1665 char* oldnick = strtok(params," ");
1666 char* newnick = strtok(NULL," ");
1668 userrec* user = Find(oldnick);
1672 WriteCommon(user,"NICK %s",newnick);
1673 if (is_uline(tcp_host))
1676 FOREACH_RESULT(OnUserPreNick(user,newnick));
1678 // if a module returns true, the nick change couldnt be allowed
1679 kill_link(user,"Nickname collision");
1683 // broadcast this because its a services thingy
1684 char buffer[MAXBUF];
1685 snprintf(buffer,MAXBUF,"n %s %s",user->nick,newnick);
1686 NetSendToAll(buffer);
1688 user = ReHashNick(user->nick, newnick);
1690 if (!user->nick) return;
1691 strncpy(user->nick, newnick,NICKMAX);
1692 log(DEBUG,"new nick set: %s",user->nick);
1696 // k <SOURCE> <DEST> <CHANNEL> :<REASON>
1697 void handle_k(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1699 char* src = strtok(params," ");
1700 char* dest = strtok(NULL," ");
1701 char* channel = strtok(NULL," :");
1702 char* reason = strtok(NULL,"\r\n");
1704 userrec* s = Find(src);
1705 userrec* d = Find(dest);
1706 chanrec* c = FindChan(channel);
1707 if ((s) && (d) && (c))
1709 kick_channel(s,d,c,reason);
1714 if ((s) && (d) && (c))
1716 kick_channel(s,d,c,reason);
1721 void handle_AT(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1723 char* who = strtok(params," :");
1724 char* text = strtok(NULL,"\r\n");
1726 userrec* s = Find(who);
1729 WriteWallOps(s,true,text);
1733 void handle_H(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1735 log(DEBUG,"Adding ULined server %s to my map",params);
1737 s.SetState(STATE_DISCONNECTED);
1738 s.SetServerName(params);
1739 source->connectors.push_back(s);
1742 void handle_N(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1744 char* tm = strtok(params," ");
1745 char* nick = strtok(NULL," ");
1746 char* host = strtok(NULL," ");
1747 char* dhost = strtok(NULL," ");
1748 char* ident = strtok(NULL," ");
1749 char* modes = strtok(NULL," ");
1750 char* server = strtok(NULL," :");
1751 char* gecos = strtok(NULL,"\r\n");
1754 time_t TS = atoi(tm);
1755 user_hash::iterator iter = clientlist.find(nick);
1756 if (iter != clientlist.end())
1759 WriteOpers("Nickname collision: %s@%s != %s@%s",nick,server,iter->second->nick,iter->second->server);
1761 snprintf(str,MAXBUF,"Killed (Nick Collision (%s@%s < %s@%s))",nick,server,iter->second->nick,iter->second->server);
1762 WriteServ(iter->second->fd, "KILL %s :%s",iter->second->nick,str);
1763 kill_link(iter->second,str);
1765 clientlist[nick] = new userrec();
1766 // remote users have an fd of -1. This is so that our Write abstraction
1767 // routines know to route any messages to this record away to whatever server
1769 clientlist[nick]->fd = -1;
1770 strncpy(clientlist[nick]->nick, nick,NICKMAX);
1771 strncpy(clientlist[nick]->host, host,160);
1772 strncpy(clientlist[nick]->dhost, dhost,160);
1773 strncpy(clientlist[nick]->server, server,256);
1774 strncpy(clientlist[nick]->ident, ident,10); // +1 char to compensate for tilde
1775 strncpy(clientlist[nick]->fullname, gecos,128);
1776 clientlist[nick]->signon = TS;
1777 clientlist[nick]->nping = 0; // this is ignored for a remote user anyway.
1778 clientlist[nick]->lastping = 1;
1779 clientlist[nick]->port = 0; // so is this...
1780 clientlist[nick]->registered = 7; // this however we need to set for them to receive messages and appear online
1781 clientlist[nick]->idle_lastmsg = time(NULL); // this is unrealiable and wont actually be used locally
1782 for (int i = 0; i < MAXCHANS; i++)
1784 clientlist[nick]->chans[i].channel = NULL;
1785 clientlist[nick]->chans[i].uc_modes = 0;
1789 void handle_F(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1791 long tdiff = time(NULL) - atoi(params);
1793 WriteOpers("TS split for %s -> %s: %d",source->name,reply->name,tdiff);
1796 void handle_a(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1798 char* nick = strtok(params," :");
1799 char* gecos = strtok(NULL,"\r\n");
1801 userrec* user = Find(nick);
1804 strncpy(user->fullname,gecos,MAXBUF);
1807 void handle_b(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1809 char* nick = strtok(params," ");
1810 char* host = strtok(NULL," ");
1812 userrec* user = Find(nick);
1815 strncpy(user->dhost,host,160);
1818 void handle_plus(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1821 // + test3.chatspike.net 7010 -2016508415
1822 char* servername = strtok(params," ");
1823 char* ipaddr = strtok(NULL," ");
1824 char* ipport = strtok(NULL," ");
1825 char* cookie = strtok(NULL," ");
1826 log(DEBUG,"*** Connecting back to %s:%d",ipaddr,atoi(ipport));
1829 bool conn_already = false;
1830 for (int i = 0; i < 32; i++)
1834 for (int j = 0; j < me[i]->connectors.size(); j++)
1836 if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),servername))
1838 if (me[i]->connectors[j].GetServerPort() == atoi(ipport))
1840 log(DEBUG,"Already got a connection to %s:%d, ignoring +",ipaddr,atoi(ipport));
1841 conn_already = true;
1848 me[defaultRoute]->MeshCookie(ipaddr,atoi(ipport),atoi(cookie),servername);
1851 void handle_R(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1853 char* server = strtok(params," ");
1854 char* data = strtok(NULL,"\r\n");
1855 if ((!data) || (!server))
1857 log(DEBUG,"Someones playing silly buggers, attempting to send to a null server or send a null message (BUG?)");
1861 log(DEBUG,"Forwarded packet '%s' to '%s'",data,server);
1862 NetSendToOne(server,data);
1865 void handle_J(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1868 // The J token currently has no timestamp - this needs looking at
1869 // because it will allow splitriding.
1870 char* nick = strtok(params," ");
1871 char* channel = strtok(NULL," ");
1872 userrec* user = Find(nick);
1875 if ((user != NULL) && (strcmp(channel,"")))
1877 char privilage = '\0';
1878 if (channel[0] != '#')
1880 privilage = channel[0];
1883 add_channel(user,channel,"",true);
1885 // now work out the privilages they should have on each channel
1886 // and send the appropriate servermodes.
1887 for (int i = 0; i != MAXCHANS; i++)
1889 if (user->chans[i].channel)
1891 if (!strcasecmp(user->chans[i].channel->name,channel))
1893 if (privilage == '@')
1895 user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_OP;
1896 WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +o %s",channel,user->nick);
1898 if (privilage == '%')
1900 user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_HOP;
1901 WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +h %s",channel,user->nick);
1903 if (privilage == '+')
1905 user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_VOICE;
1906 WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +v %s",channel,user->nick);
1913 channel = strtok(NULL," ");
1917 void handle_dollar(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1919 log(DEBUG,"Storing routing table...");
1920 char* sourceserver = strtok(params," ");
1921 char* server = strtok(NULL," ");
1922 for (int i = 0; i < 32; i++)
1926 for (int j = 0; j < me[i]->connectors.size(); j++)
1928 if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),sourceserver))
1930 me[i]->connectors[j].routes.clear();
1931 log(DEBUG,"Found entry for source server.");
1935 me[i]->connectors[j].routes.push_back(server);
1936 log(DEBUG,"*** Stored route: %s -> %s -> %s",ServerName,sourceserver,server);
1937 server = strtok(NULL," ");
1944 log(DEBUG,"Warning! routing table received from nonexistent server!");
1947 void handle_amp(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1949 log(DEBUG,"Netsplit! %s split from mesh, removing!",params);
1950 WriteOpers("*** NOTICE - Controlled netsplit: %s split from %s",params,ServerName);
1951 bool go_again = true;
1955 for (int i = 0; i < 32; i++)
1959 for (vector<ircd_connector>::iterator j = me[i]->connectors.begin(); j != me[i]->connectors.end(); j++)
1961 if (!strcasecmp(j->GetServerName().c_str(),params))
1964 j->CloseConnection();
1965 me[i]->connectors.erase(j);
1973 log(DEBUG,"Removed server. Will remove clients...");
1974 // iterate through the userlist and remove all users on this server.
1975 // because we're dealing with a mesh, we dont have to deal with anything
1976 // "down-route" from this server (nice huh)
1978 char reason[MAXBUF];
1979 snprintf(reason,MAXBUF,"%s %s",ServerName,params);
1983 for (user_hash::const_iterator u = clientlist.begin(); u != clientlist.end(); u++)
1985 if (!strcasecmp(u->second->server,params))
1987 kill_link(u->second,reason);
1998 void process_restricted_commands(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host,char* ipaddr,int port)
2000 char buffer[MAXBUF];
2007 nb_start = time(NULL);
2008 WriteOpers("Server %s is starting netburst.",tcp_host);
2009 // now broadcast this new servers address out to all servers that are linked to us,
2010 // except the newcomer. They'll all attempt to connect back to it.
2011 authcookie = rand()*rand();
2012 snprintf(buffer,MAXBUF,"~ %d",authcookie);
2013 NetSendToAll(buffer);
2017 // once stored, this authcookie permits other servers to log in
2018 // without user or password, using it.
2020 auth_cookies.push_back(atoi(params));
2021 log(DEBUG,"*** Stored auth cookie, will permit servers with auth-cookie %d",atoi(params));
2023 // connect back to a server using an authcookie
2025 handle_plus(token,params,source,reply,tcp_host);
2029 handle_dollar(token,params,source,reply,tcp_host);
2031 // node unreachable - we cant route to a server, sooooo we slit it off.
2032 // servers can generate these for themselves for an squit.
2034 handle_amp(token,params,source,reply,tcp_host);
2036 // R <server> <data>
2037 // redirect token, send all of <data> along to the given
2038 // server as this server has been found to still have a route to it
2040 handle_R(token,params,source,reply,tcp_host);
2045 reply->SendPacket("!",tcp_host);
2055 // N <TS> <NICK> <HOST> <DHOST> <IDENT> <MODES> <SERVER> :<GECOS>
2056 // introduce remote client
2058 handle_N(token,params,source,reply,tcp_host);
2060 // a <NICK> :<GECOS>
2061 // change GECOS (SETNAME)
2063 handle_a(token,params,source,reply,tcp_host);
2066 // change displayed host (SETHOST)
2068 handle_b(token,params,source,reply,tcp_host);
2070 // t <NICK> <CHANNEL> :<TOPIC>
2071 // change a channel topic
2073 handle_t(token,params,source,reply,tcp_host);
2075 // i <NICK> <CHANNEL>
2076 // invite a user to a channel
2078 handle_i(token,params,source,reply,tcp_host);
2080 // k <SOURCE> <DEST> <CHANNEL> :<REASON>
2081 // kick a user from a channel
2083 handle_k(token,params,source,reply,tcp_host);
2085 // n <NICK> <NEWNICK>
2086 // change nickname of client -- a server should only be able to
2087 // change the nicknames of clients that reside on it unless
2090 handle_n(token,params,source,reply,tcp_host);
2092 // J <NICK> <CHANLIST>
2093 // Join user to channel list, merge channel permissions
2095 handle_J(token,params,source,reply,tcp_host);
2097 // T <TS> <CHANNEL> <TOPICSETTER> :<TOPIC>
2098 // change channel topic (netburst only)
2100 handle_T(token,params,source,reply,tcp_host);
2102 // M <TARGET> <MODES> [MODE-PARAMETERS]
2103 // Server setting modes on an object
2105 handle_M(token,params,source,reply,tcp_host);
2107 // m <SOURCE> <TARGET> <MODES> [MODE-PARAMETERS]
2108 // User setting modes on an object
2110 handle_m(token,params,source,reply,tcp_host);
2112 // P <SOURCE> <TARGET> :<TEXT>
2113 // Send a private/channel message
2115 handle_P(token,params,source,reply,tcp_host);
2117 // V <SOURCE> <TARGET> :<TEXT>
2118 // Send a private/channel notice
2120 handle_V(token,params,source,reply,tcp_host);
2122 // L <SOURCE> <CHANNEL> :<REASON>
2123 // User parting a channel
2125 handle_L(token,params,source,reply,tcp_host);
2127 // Q <SOURCE> :<REASON>
2130 handle_Q(token,params,source,reply,tcp_host);
2133 // introduce non-meshable server (such as a services server)
2135 handle_H(token,params,source,reply,tcp_host);
2137 // K <SOURCE> <DEST> :<REASON>
2140 handle_K(token,params,source,reply,tcp_host);
2142 // @ <SOURCE> :<TEXT>
2145 handle_AT(token,params,source,reply,tcp_host);
2150 WriteOpers("Server %s has completed netburst. (%d secs)",tcp_host,time(NULL)-nb_start);
2151 handle_F(token,params,source,reply,tcp_host);
2153 // tell all the other servers to use this authcookie to connect back again
2154 // got '+ test3.chatspike.net 7010 -2016508415' from test.chatspike.net
2155 snprintf(buffer,MAXBUF,"+ %s %s %d %d",tcp_host,ipaddr,port,authcookie);
2156 NetSendToAllExcept(tcp_host,buffer);
2159 // end netburst with no mesh creation
2161 WriteOpers("Server %s has completed netburst. (%d secs)",tcp_host,time(NULL)-nb_start);
2162 handle_F(token,params,source,reply,tcp_host);
2164 // tell everyone else about the new server name so they just add it in the disconnected
2166 snprintf(buffer,MAXBUF,"u %s :%s",tcp_host,GetServerDescription(tcp_host).c_str());
2167 NetSendToAllExcept(tcp_host,buffer);
2170 // Send netburst now
2172 WriteOpers("Sending my netburst to %s",tcp_host);
2173 DoSync(source,tcp_host);
2174 WriteOpers("Send of netburst to %s completed",tcp_host);
2175 NetSendMyRoutingTable();
2179 WriteOpers("WARNING! Unknown datagram type '%c'",token);
2185 void handle_link_packet(char* udp_msg, char* tcp_host, serverrec *serv)
2187 if ((!strncmp(udp_msg,"USER ",5)) || (!strncmp(udp_msg,"NICK ",5)))
2189 // a user on a server port, just close their connection.
2190 RemoveServer(tcp_host);
2194 char response[10240];
2195 char token = udp_msg[0];
2196 char* old = udp_msg;
2198 if (token == ':') // leading :servername or details - strip them off (services does this, sucky)
2200 char* src = udp_msg+1;
2201 while (udp_msg[0] != ' ')
2205 char* comd = udp_msg;
2206 while (udp_msg[0] != ' ')
2211 char source[MAXBUF];
2212 char command[MAXBUF];
2213 strcpy(data,udp_msg);
2215 strcpy(command,comd);
2219 // :services-dev.chatspike.net 433 Craig Craig :Nickname is registered to someone else
2220 if (!strcmp(command,"433"))
2224 if (!strcmp(command,"NOTICE"))
2226 snprintf(udp_msg,MAXBUF,"V %s %s",source,data);
2227 log(DEBUG,"Rewrote NOTICE from services to: '%s'",udp_msg);
2230 if (!strcmp(command,"QUIT"))
2232 if ((!udp_msg) || (!strcmp(data,"")) || (strcmp(data,":")))
2234 strcpy(data,":No reason");
2236 if (!strcmp(data,":"))
2238 strcpy(data,":No reason");
2240 snprintf(udp_msg,MAXBUF,"Q %s %s",source,data);
2241 log(DEBUG,"Rewrote QUIT from services to: '%s'",udp_msg);
2244 if (!strcmp(command,"SQUIT"))
2246 snprintf(udp_msg,MAXBUF,"& %s",source);
2247 log(DEBUG,"Rewrote SQUIT from services to: '%s'",udp_msg);
2250 if (!strcmp(command,"SVSMODE"))
2252 snprintf(udp_msg,MAXBUF,"M %s",data);
2253 log(DEBUG,"Rewrote SVSMODE from services to: '%s'",udp_msg);
2256 if (!strcmp(command,"SVS2MODE"))
2258 snprintf(udp_msg,MAXBUF,"M %s",data);
2259 log(DEBUG,"Rewrote SVSMODE from services to: '%s'",udp_msg);
2262 // todo: this wont work without u:lines
2263 // in give_ops etc allow nick on a u:lined serv to do just about anything
2264 if (!strcmp(command,"MODE"))
2266 snprintf(udp_msg,MAXBUF,"m %s %s",source,data);
2267 log(DEBUG,"Rewrote MODE from services to: '%s'",udp_msg);
2270 if (!strcmp(command,"KICK"))
2272 snprintf(udp_msg,MAXBUF,"k %s %s",source,data);
2273 log(DEBUG,"Rewrote KICK from services to: '%s'",udp_msg);
2276 if (!strcmp(command,"SVSJOIN"))
2278 snprintf(udp_msg,MAXBUF,"J %s",data);
2279 NetSendToOne(tcp_host,udp_msg);
2280 char* nick = strtok(data," ");
2281 char* chan = strtok(NULL," ");
2282 log(DEBUG,"Rewrote SVSJOIN from services to: '%s'",udp_msg);
2283 userrec* u = Find(nick);
2286 add_channel(u,chan,"",true);
2294 char* params = udp_msg + 2;
2295 char finalparam[1024];
2296 strcpy(finalparam," :xxxx");
2297 if (strstr(udp_msg," :")) {
2298 strncpy(finalparam,strstr(udp_msg," :"),1024);
2303 char* cookie = strtok(params," ");
2304 char* servername = strtok(NULL," ");
2305 char* serverdesc = finalparam+2;
2307 WriteOpers("AuthCookie CONNECT from %s (%s)",servername,tcp_host);
2309 for (int u = 0; u < auth_cookies.size(); u++)
2311 if (auth_cookies[u] == atoi(cookie))
2313 WriteOpers("Allowed cookie from %s, is now part of the mesh",servername);
2316 for (int j = 0; j < 32; j++)
2320 for (int k = 0; k < me[j]->connectors.size(); k++)
2322 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host))
2324 me[j]->connectors[k].SetServerName(servername);
2325 me[j]->connectors[k].SetDescription(serverdesc);
2326 me[j]->connectors[k].SetState(STATE_CONNECTED);
2327 NetSendMyRoutingTable();
2332 WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right now! Possible intrusion attempt!",tcp_host);
2340 // bad cookie, bad bad! go sit in the corner!
2341 WriteOpers("Bad cookie from %s!",servername);
2346 // S test.chatspike.net password portn :ChatSpike InspIRCd test server
2347 char* servername = strtok(params," ");
2348 char* password = strtok(NULL," ");
2349 char* myport = strtok(NULL," ");
2350 char* revision = strtok(NULL," ");
2351 char* serverdesc = finalparam+2;
2353 WriteOpers("CONNECT from %s (%s) (their port: %d)",servername,tcp_host,atoi(myport));
2355 ircd_connector* cn = serv->FindHost(servername);
2359 WriteOpers("CONNECT aborted: Server %s already exists from %s",servername,ServerName);
2360 char buffer[MAXBUF];
2361 sprintf(buffer,"E :Server %s already exists!",servername);
2362 serv->SendPacket(buffer,tcp_host);
2363 RemoveServer(tcp_host);
2367 if (atoi(revision) != GetRevision())
2369 WriteOpers("CONNECT aborted: Could not link to %s, is an incompatible version %s, our version is %d",servername,revision,GetRevision());
2370 char buffer[MAXBUF];
2371 sprintf(buffer,"E :Version number mismatch");
2372 serv->SendPacket(buffer,tcp_host);
2373 RemoveServer(tcp_host);
2374 RemoveServer(servername);
2378 for (int j = 0; j < serv->connectors.size(); j++)
2380 if (!strcasecmp(serv->connectors[j].GetServerName().c_str(),tcp_host))
2382 serv->connectors[j].SetServerName(servername);
2383 serv->connectors[j].SetDescription(serverdesc);
2384 serv->connectors[j].SetServerPort(atoi(myport));
2389 char Link_ServerName[1024];
2390 char Link_IPAddr[1024];
2391 char Link_Port[1024];
2392 char Link_Pass[1024];
2393 char Link_SendPass[1024];
2396 // search for a corresponding <link> block in the config files
2397 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
2399 ConfValue("link","name",i,Link_ServerName,&config_f);
2400 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
2401 ConfValue("link","port",i,Link_Port,&config_f);
2402 ConfValue("link","recvpass",i,Link_Pass,&config_f);
2403 ConfValue("link","sendpass",i,Link_SendPass,&config_f);
2404 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
2405 LinkPort = atoi(Link_Port);
2406 if (!strcasecmp(Link_ServerName,servername))
2408 // we have a matching link line -
2409 // send a 'diminutive' server message back...
2410 snprintf(response,10240,"s %s %s :%s",ServerName,Link_SendPass,ServerDesc);
2411 serv->SendPacket(response,servername);
2413 for (int t = 0; t < serv->connectors.size(); t++)
2415 if (!strcasecmp(serv->connectors[t].GetServerName().c_str(),servername))
2417 serv->connectors[t].SetState(STATE_CONNECTED);
2424 char buffer[MAXBUF];
2425 sprintf(buffer,"E :Access is denied (no matching link block)");
2426 serv->SendPacket(buffer,tcp_host);
2427 WriteOpers("CONNECT from %s denied, no matching link block",servername);
2428 RemoveServer(tcp_host);
2429 RemoveServer(servername);
2434 // S test.chatspike.net password :ChatSpike InspIRCd test server
2435 char* servername = strtok(params," ");
2436 char* password = strtok(NULL," ");
2437 char* serverdesc = finalparam+2;
2439 // TODO: we should do a check here to ensure that this server is one we recently initiated a
2440 // link with, and didnt hear an 's' or 'E' back from yet (these are the only two valid responses
2441 // to an 'S' command. If we didn't recently send an 'S' to this server, theyre trying to spoof
2442 // a connect, so put out an oper alert!
2444 // for now, just accept all, we'll fix that later.
2445 WriteOpers("%s accepted our link credentials ",servername);
2447 char Link_ServerName[1024];
2448 char Link_IPAddr[1024];
2449 char Link_Port[1024];
2450 char Link_Pass[1024];
2451 char Link_SendPass[1024];
2454 // search for a corresponding <link> block in the config files
2455 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
2457 ConfValue("link","name",i,Link_ServerName,&config_f);
2458 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
2459 ConfValue("link","port",i,Link_Port,&config_f);
2460 ConfValue("link","recvpass",i,Link_Pass,&config_f);
2461 ConfValue("link","sendpass",i,Link_SendPass,&config_f);
2462 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
2463 LinkPort = atoi(Link_Port);
2464 if (!strcasecmp(Link_ServerName,servername))
2466 // matching link at this end too, we're all done!
2467 // at this point we must begin key exchange and insert this
2468 // server into our 'active' table.
2469 for (int j = 0; j < 32; j++)
2473 for (int k = 0; k < me[j]->connectors.size(); k++)
2475 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host))
2477 char buffer[MAXBUF];
2478 me[j]->connectors[k].SetDescription(serverdesc);
2479 me[j]->connectors[k].SetState(STATE_CONNECTED);
2480 sprintf(buffer,"X 0");
2481 serv->SendPacket(buffer,tcp_host);
2482 DoSync(me[j],tcp_host);
2483 NetSendMyRoutingTable();
2488 WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right noe! Possible intrusion attempt!",tcp_host);
2493 log(DEBUG,"Server names '%s' and '%s' don't match",Link_ServerName,servername);
2496 char buffer[MAXBUF];
2497 sprintf(buffer,"E :Access is denied (no matching link block)");
2498 serv->SendPacket(buffer,tcp_host);
2499 WriteOpers("CONNECT from %s denied, no matching link block",servername);
2500 RemoveServer(tcp_host);
2501 RemoveServer(servername);
2506 // U services.chatspike.net password :ChatSpike Services
2508 // non-meshed link, used by services. Everything coming from a non-meshed link is auto broadcasted.
2509 char* servername = strtok(params," ");
2510 char* password = strtok(NULL," ");
2511 char* serverdesc = finalparam+2;
2513 char Link_ServerName[1024];
2514 char Link_IPAddr[1024];
2515 char Link_Port[1024];
2516 char Link_Pass[1024];
2517 char Link_SendPass[1024];
2520 // search for a corresponding <link> block in the config files
2521 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
2523 ConfValue("link","name",i,Link_ServerName,&config_f);
2524 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
2525 ConfValue("link","port",i,Link_Port,&config_f);
2526 ConfValue("link","recvpass",i,Link_Pass,&config_f);
2527 ConfValue("link","sendpass",i,Link_SendPass,&config_f);
2528 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
2529 LinkPort = atoi(Link_Port);
2530 if (!strcasecmp(Link_ServerName,servername))
2532 // matching link at this end too, we're all done!
2533 // at this point we must begin key exchange and insert this
2534 // server into our 'active' table.
2535 for (int j = 0; j < 32; j++)
2539 for (int k = 0; k < me[j]->connectors.size(); k++)
2541 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host))
2543 char buffer[MAXBUF];
2544 me[j]->connectors[k].SetDescription(serverdesc);
2545 me[j]->connectors[k].SetServerName(servername);
2546 me[j]->connectors[k].SetState(STATE_SERVICES);
2547 sprintf(buffer,"X 0");
2548 serv->SendPacket(buffer,servername);
2549 DoSync(me[j],servername);
2550 NetSendMyRoutingTable();
2551 sprintf(buffer,"H %s",servername);
2552 NetSendToAllExcept(servername,buffer);
2557 WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right noe! Possible intrusion attempt!",tcp_host);
2562 log(DEBUG,"Server names '%s' and '%s' don't match",Link_ServerName,servername);
2565 char buffer[MAXBUF];
2566 sprintf(buffer,"E :Access is denied (no matching link block)");
2567 serv->SendPacket(buffer,tcp_host);
2568 WriteOpers("CONNECT from %s denied, no matching link block",servername);
2569 RemoveServer(tcp_host);
2570 RemoveServer(servername);
2575 char* error_message = finalparam+2;
2576 WriteOpers("ERROR from %s: %s",tcp_host,error_message);
2581 serverrec* source_server = NULL;
2583 for (int j = 0; j < 32; j++)
2587 for (int x = 0; x < me[j]->connectors.size(); x++)
2589 log(DEBUG,"Servers are: '%s' '%s'",tcp_host,me[j]->connectors[x].GetServerName().c_str());
2590 if (!strcasecmp(me[j]->connectors[x].GetServerName().c_str(),tcp_host))
2592 if ((me[j]->connectors[x].GetState() == STATE_CONNECTED) || (me[j]->connectors[x].GetState() == STATE_SERVICES))
2594 // found a valid ircd_connector.
2595 process_restricted_commands(token,params,me[j],serv,tcp_host,me[j]->connectors[x].GetServerIP(),me[j]->connectors[x].GetServerPort());
2603 log(DEBUG,"Unrecognised token or unauthenticated host in datagram from %s: %c",tcp_host,token);