2 #include "inspircd_io.h"
3 #include "inspircd_util.h"
4 #include "inspircd_config.h"
9 #include <sys/utsname.h>
14 #include <ext/hash_map>
26 #include "connection.h"
38 #define nspace __gnu_cxx
46 extern vector<Module*> modules;
47 extern vector<ircd_module*> factory;
50 extern char ServerName[MAXBUF];
51 extern char Network[MAXBUF];
52 extern char ServerDesc[MAXBUF];
53 extern char AdminName[MAXBUF];
54 extern char AdminEmail[MAXBUF];
55 extern char AdminNick[MAXBUF];
56 extern char diepass[MAXBUF];
57 extern char restartpass[MAXBUF];
58 extern char motd[MAXBUF];
59 extern char rules[MAXBUF];
60 extern char list[MAXBUF];
61 extern char PrefixQuit[MAXBUF];
62 extern char DieValue[MAXBUF];
65 extern int WHOWAS_STALE;
66 extern int WHOWAS_MAX;
68 extern time_t startup_time;
69 extern int NetBufferSize;
70 extern time_t nb_start;
72 extern std::vector<int> fd_reap;
73 extern std::vector<std::string> module_names;
75 extern char bannerBuffer[MAXBUF];
76 extern int boundPortCount;
78 extern int UDPportCount;
79 extern int ports[MAXSOCKS];
80 extern int defaultRoute;
82 extern std::vector<long> auth_cookies;
83 extern std::stringstream config_f;
85 extern serverrec* me[32];
87 extern FILE *log_file;
91 template<> struct nspace::hash<in_addr>
93 size_t operator()(const struct in_addr &a) const
96 memcpy(&q,&a,sizeof(size_t));
101 template<> struct nspace::hash<string>
103 size_t operator()(const string &s) const
106 static struct hash<const char *> strhash;
118 bool operator()(const string& s1, const string& s2) const
120 char a[MAXBUF],b[MAXBUF];
121 strcpy(a,s1.c_str());
122 strcpy(b,s2.c_str());
123 return (strcasecmp(a,b) == 0);
128 struct InAddr_HashComp
131 bool operator()(const in_addr &s1, const in_addr &s2) const
136 memcpy(&q,&s1,sizeof(size_t));
137 memcpy(&p,&s2,sizeof(size_t));
145 typedef nspace::hash_map<std::string, userrec*, nspace::hash<string>, StrHashComp> user_hash;
146 typedef nspace::hash_map<std::string, chanrec*, nspace::hash<string>, StrHashComp> chan_hash;
147 typedef nspace::hash_map<in_addr,string*, nspace::hash<in_addr>, InAddr_HashComp> address_cache;
148 typedef std::deque<command_t> command_table;
151 extern user_hash clientlist;
152 extern chan_hash chanlist;
153 extern user_hash whowas;
154 extern command_table cmdlist;
155 extern file_cache MOTD;
156 extern file_cache RULES;
157 extern address_cache IP;
160 void handle_join(char **parameters, int pcnt, userrec *user)
165 if (loop_call(handle_join,parameters,pcnt,user,0,0,1))
167 if (parameters[0][0] == '#')
169 Ptr = add_channel(user,parameters[0],parameters[1],false);
174 void handle_part(char **parameters, int pcnt, userrec *user)
180 if (loop_call(handle_part,parameters,pcnt,user,0,pcnt-2,0))
182 del_channel(user,parameters[0],parameters[1],false);
186 if (loop_call(handle_part,parameters,pcnt,user,0,pcnt-1,0))
188 del_channel(user,parameters[0],NULL,false);
192 void handle_kick(char **parameters, int pcnt, userrec *user)
194 chanrec* Ptr = FindChan(parameters[0]);
195 userrec* u = Find(parameters[1]);
199 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
203 if (!has_channel(u,Ptr))
205 WriteServ(user->fd,"442 %s %s :You're not on that channel!",user->nick, parameters[0]);
213 strncpy(reason,parameters[2],MAXBUF);
214 if (strlen(reason)>MAXKICK)
216 reason[MAXKICK-1] = '\0';
219 kick_channel(user,u,Ptr,reason);
223 strcpy(reason,user->nick);
224 kick_channel(user,u,Ptr,reason);
227 // this must be propogated so that channel membership is kept in step network-wide
230 snprintf(buffer,MAXBUF,"k %s %s %s :%s",user->nick,u->nick,Ptr->name,reason);
231 NetSendToAll(buffer);
235 void handle_die(char **parameters, int pcnt, userrec *user)
237 log(DEBUG,"die: %s",user->nick);
238 if (!strcmp(parameters[0],diepass))
240 WriteOpers("*** DIE command from %s!%s@%s, terminating...",user->nick,user->ident,user->host);
246 WriteOpers("*** Failed DIE Command from %s!%s@%s.",user->nick,user->ident,user->host);
250 void handle_restart(char **parameters, int pcnt, userrec *user)
252 log(DEBUG,"restart: %s",user->nick);
253 if (!strcmp(parameters[0],restartpass))
255 WriteOpers("*** RESTART command from %s!%s@%s, Pretending to restart till this is finished :D",user->nick,user->ident,user->host);
258 /* Will finish this later when i can be arsed :) */
262 WriteOpers("*** Failed RESTART Command from %s!%s@%s.",user->nick,user->ident,user->host);
266 void handle_kill(char **parameters, int pcnt, userrec *user)
268 userrec *u = Find(parameters[0]);
269 char killreason[MAXBUF];
271 log(DEBUG,"kill: %s %s",parameters[0],parameters[1]);
274 if (strcmp(ServerName,u->server))
277 WriteOpers("*** Remote kill by %s: %s!%s@%s (%s)",user->nick,u->nick,u->ident,u->host,parameters[1]);
278 sprintf(killreason,"[%s] Killed (%s (%s))",ServerName,user->nick,parameters[1]);
279 WriteCommonExcept(u,"QUIT :%s",killreason);
280 // K token must go to ALL servers!!!
282 snprintf(buffer,MAXBUF,"K %s %s :%s",user->nick,u->nick,killreason);
283 NetSendToAll(buffer);
285 user_hash::iterator iter = clientlist.find(u->nick);
286 if (iter != clientlist.end())
288 log(DEBUG,"deleting user hash value %d",iter->second);
289 if ((iter->second) && (user->registered == 7)) {
292 clientlist.erase(iter);
299 WriteTo(user, u, "KILL %s :%s!%s!%s (%s)", u->nick, ServerName,user->dhost,user->nick,parameters[1]);
300 WriteOpers("*** Local Kill by %s: %s!%s@%s (%s)",user->nick,u->nick,u->ident,u->host,parameters[1]);
301 sprintf(killreason,"Killed (%s (%s))",user->nick,parameters[1]);
302 kill_link(u,killreason);
307 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
311 void handle_summon(char **parameters, int pcnt, userrec *user)
313 WriteServ(user->fd,"445 %s :SUMMON has been disabled (depreciated command)",user->nick);
316 void handle_users(char **parameters, int pcnt, userrec *user)
318 WriteServ(user->fd,"445 %s :USERS has been disabled (depreciated command)",user->nick);
321 void handle_pass(char **parameters, int pcnt, userrec *user)
323 // Check to make sure they havnt registered -- Fix by FCS
324 if (user->registered == 7)
326 WriteServ(user->fd,"462 %s :You may not reregister",user->nick);
329 if (!strcasecmp(parameters[0],Passwd(user)))
331 user->haspassed = true;
335 void handle_invite(char **parameters, int pcnt, userrec *user)
337 userrec* u = Find(parameters[0]);
338 chanrec* c = FindChan(parameters[1]);
344 WriteServ(user->fd,"401 %s %s :No such nick/channel",user->nick, parameters[1]);
350 WriteServ(user->fd,"401 %s %s :No such nick/channel",user->nick, parameters[0]);
359 if (cstatus(user,c) < STATUS_HOP)
361 WriteServ(user->fd,"482 %s %s :You must be at least a half-operator to change modes on this channel",user->nick, c->name);
365 if (has_channel(u,c))
367 WriteServ(user->fd,"443 %s %s %s :Is already on channel %s",user->nick,u->nick,c->name,c->name);
370 if (!has_channel(user,c))
372 WriteServ(user->fd,"442 %s %s :You're not on that channel!",user->nick, c->name);
375 u->InviteTo(c->name);
376 WriteFrom(u->fd,user,"INVITE %s :%s",u->nick,c->name);
377 WriteServ(user->fd,"341 %s %s %s",user->nick,u->nick,c->name);
379 // i token must go to ALL servers!!!
381 snprintf(buffer,MAXBUF,"i %s %s %s",u->nick,user->nick,c->name);
382 NetSendToAll(buffer);
385 void handle_topic(char **parameters, int pcnt, userrec *user)
391 if (strlen(parameters[0]) <= CHANMAX)
393 Ptr = FindChan(parameters[0]);
398 WriteServ(user->fd,"332 %s %s :%s", user->nick, Ptr->name, Ptr->topic);
399 WriteServ(user->fd,"333 %s %s %s %d", user->nick, Ptr->name, Ptr->setby, Ptr->topicset);
403 WriteServ(user->fd,"331 %s %s :No topic is set.", user->nick, Ptr->name);
408 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
415 if (strlen(parameters[0]) <= CHANMAX)
417 Ptr = FindChan(parameters[0]);
420 if ((Ptr->topiclock) && (cstatus(user,Ptr)<STATUS_HOP))
422 WriteServ(user->fd,"482 %s %s :You must be at least a half-operator to change modes on this channel", user->nick, Ptr->name);
427 strncpy(topic,parameters[1],MAXBUF);
428 if (strlen(topic)>MAXTOPIC)
430 topic[MAXTOPIC-1] = '\0';
433 strcpy(Ptr->topic,topic);
434 strcpy(Ptr->setby,user->nick);
435 Ptr->topicset = time(NULL);
436 WriteChannel(Ptr,user,"TOPIC %s :%s",Ptr->name, Ptr->topic);
438 // t token must go to ALL servers!!!
440 snprintf(buffer,MAXBUF,"t %s %s :%s",user->nick,Ptr->name,topic);
441 NetSendToAll(buffer);
445 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
451 void handle_names(char **parameters, int pcnt, userrec *user)
455 if (loop_call(handle_names,parameters,pcnt,user,0,pcnt-1,0))
457 c = FindChan(parameters[0]);
460 /*WriteServ(user->fd,"353 %s = %s :%s", user->nick, c->name,*/
462 WriteServ(user->fd,"366 %s %s :End of /NAMES list.", user->nick, c->name);
466 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
470 void handle_privmsg(char **parameters, int pcnt, userrec *user)
475 user->idle_lastmsg = time(NULL);
477 if (loop_call(handle_privmsg,parameters,pcnt,user,0,pcnt-2,0))
479 if (parameters[0][0] == '#')
481 chan = FindChan(parameters[0]);
484 if ((chan->noexternal) && (!has_channel(user,chan)))
486 WriteServ(user->fd,"404 %s %s :Cannot send to channel (no external messages)", user->nick, chan->name);
489 if ((chan->moderated) && (cstatus(user,chan)<STATUS_VOICE))
491 WriteServ(user->fd,"404 %s %s :Cannot send to channel (+m)", user->nick, chan->name);
497 FOREACH_RESULT(OnUserPreMessage(user,chan,TYPE_CHANNEL,std::string(parameters[1])));
502 ChanExceptSender(chan, user, "PRIVMSG %s :%s", chan->name, parameters[1]);
504 // if any users of this channel are on remote servers, broadcast the packet
506 snprintf(buffer,MAXBUF,"P %s %s :%s",user->nick,chan->name,parameters[1]);
507 NetSendToCommon(user,buffer);
511 /* no such nick/channel */
512 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
517 dest = Find(parameters[0]);
520 if (strcmp(dest->awaymsg,""))
522 /* auto respond with aweh msg */
523 WriteServ(user->fd,"301 %s %s :%s",user->nick,dest->nick,dest->awaymsg);
528 FOREACH_RESULT(OnUserPreMessage(user,dest,TYPE_USER,std::string(parameters[1])));
535 if (!strcmp(dest->server,user->server))
537 // direct write, same server
538 WriteTo(user, dest, "PRIVMSG %s :%s", dest->nick, parameters[1]);
543 snprintf(buffer,MAXBUF,"P %s %s :%s",user->nick,dest->nick,parameters[1]);
544 NetSendToOne(dest->server,buffer);
549 /* no such nick/channel */
550 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
554 void handle_notice(char **parameters, int pcnt, userrec *user)
559 user->idle_lastmsg = time(NULL);
561 if (loop_call(handle_notice,parameters,pcnt,user,0,pcnt-2,0))
563 if (parameters[0][0] == '#')
565 chan = FindChan(parameters[0]);
568 if ((chan->noexternal) && (!has_channel(user,chan)))
570 WriteServ(user->fd,"404 %s %s :Cannot send to channel (no external messages)", user->nick, chan->name);
573 if ((chan->moderated) && (cstatus(user,chan)<STATUS_VOICE))
575 WriteServ(user->fd,"404 %s %s :Cannot send to channel (+m)", user->nick, chan->name);
581 FOREACH_RESULT(OnUserPreNotice(user,chan,TYPE_CHANNEL,std::string(parameters[1])));
586 ChanExceptSender(chan, user, "NOTICE %s :%s", chan->name, parameters[1]);
588 // if any users of this channel are on remote servers, broadcast the packet
590 snprintf(buffer,MAXBUF,"V %s %s :%s",user->nick,chan->name,parameters[1]);
591 NetSendToCommon(user,buffer);
595 /* no such nick/channel */
596 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
601 dest = Find(parameters[0]);
606 FOREACH_RESULT(OnUserPreNotice(user,dest,TYPE_USER,std::string(parameters[1])));
611 if (!strcmp(dest->server,user->server))
613 // direct write, same server
614 WriteTo(user, dest, "NOTICE %s :%s", dest->nick, parameters[1]);
619 snprintf(buffer,MAXBUF,"V %s %s :%s",user->nick,dest->nick,parameters[1]);
620 NetSendToOne(dest->server,buffer);
625 /* no such nick/channel */
626 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
631 void handle_info(char **parameters, int pcnt, userrec *user)
633 WriteServ(user->fd,"371 %s :The Inspire IRCd Project Has been brought to you by the following people..",user->nick);
634 WriteServ(user->fd,"371 %s :Craig Edwards, Craig McLure, and Others..",user->nick);
635 WriteServ(user->fd,"371 %s :Will finish this later when i can be arsed :p",user->nick);
636 FOREACH_MOD OnInfo(user);
637 WriteServ(user->fd,"374 %s :End of /INFO list",user->nick);
640 void handle_time(char **parameters, int pcnt, userrec *user)
643 struct tm * timeinfo;
646 timeinfo = localtime ( &rawtime );
647 WriteServ(user->fd,"391 %s %s :%s",user->nick,ServerName, asctime (timeinfo) );
651 void handle_whois(char **parameters, int pcnt, userrec *user)
656 if (loop_call(handle_whois,parameters,pcnt,user,0,pcnt-1,0))
658 dest = Find(parameters[0]);
661 // bug found by phidjit - were able to whois an incomplete connection if it had sent a NICK or USER
662 if (dest->registered == 7)
664 WriteServ(user->fd,"311 %s %s %s %s * :%s",user->nick, dest->nick, dest->ident, dest->dhost, dest->fullname);
665 if ((user == dest) || (strchr(user->modes,'o')))
667 WriteServ(user->fd,"378 %s %s :is connecting from *@%s",user->nick, dest->nick, dest->host);
669 if (strcmp(chlist(dest),""))
671 WriteServ(user->fd,"319 %s %s :%s",user->nick, dest->nick, chlist(dest));
673 WriteServ(user->fd,"312 %s %s %s :%s",user->nick, dest->nick, dest->server, GetServerDescription(dest->server).c_str());
674 if (strcmp(dest->awaymsg,""))
676 WriteServ(user->fd,"301 %s %s :%s",user->nick, dest->nick, dest->awaymsg);
678 if (strchr(dest->modes,'o'))
680 WriteServ(user->fd,"313 %s %s :is an IRC operator",user->nick, dest->nick);
682 FOREACH_MOD OnWhois(user,dest);
683 if (!strcasecmp(user->server,dest->server))
685 // idle time and signon line can only be sent if youre on the same server (according to RFC)
686 WriteServ(user->fd,"317 %s %s %d %d :seconds idle, signon time",user->nick, dest->nick, abs((dest->idle_lastmsg)-time(NULL)), dest->signon);
689 WriteServ(user->fd,"318 %s %s :End of /WHOIS list.",user->nick, dest->nick);
693 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
698 /* no such nick/channel */
699 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
703 void handle_quit(char **parameters, int pcnt, userrec *user)
705 user_hash::iterator iter = clientlist.find(user->nick);
708 if (user->registered == 7)
710 /* theres more to do here, but for now just close the socket */
713 if (parameters[0][0] == ':')
717 reason = parameters[0];
719 if (strlen(reason)>MAXQUIT)
721 reason[MAXQUIT-1] = '\0';
724 Write(user->fd,"ERROR :Closing link (%s@%s) [%s]",user->ident,user->host,parameters[0]);
725 WriteOpers("*** Client exiting: %s!%s@%s [%s]",user->nick,user->ident,user->host,parameters[0]);
726 WriteCommonExcept(user,"QUIT :%s%s",PrefixQuit,parameters[0]);
729 snprintf(buffer,MAXBUF,"Q %s :%s%s",user->nick,PrefixQuit,parameters[0]);
730 NetSendToAll(buffer);
734 Write(user->fd,"ERROR :Closing link (%s@%s) [QUIT]",user->ident,user->host);
735 WriteOpers("*** Client exiting: %s!%s@%s [Client exited]",user->nick,user->ident,user->host);
736 WriteCommonExcept(user,"QUIT :Client exited");
739 snprintf(buffer,MAXBUF,"Q %s :Client exited",user->nick);
740 NetSendToAll(buffer);
742 FOREACH_MOD OnUserQuit(user);
746 /* push the socket on a stack of sockets due to be closed at the next opportunity */
747 fd_reap.push_back(user->fd);
749 if (iter != clientlist.end())
751 clientlist.erase(iter);
752 log(DEBUG,"deleting user hash value %d",iter->second);
753 //if ((user) && (user->registered == 7)) {
758 if (user->registered == 7) {
763 void handle_who(char **parameters, int pcnt, userrec *user)
767 /* theres more to do here, but for now just close the socket */
770 if ((!strcmp(parameters[0],"0")) || (!strcmp(parameters[0],"*")))
772 if (user->chans[0].channel)
774 Ptr = user->chans[0].channel;
775 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
777 if ((common_channels(user,i->second)) && (isnick(i->second->nick)))
779 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, Ptr->name, i->second->ident, i->second->dhost, i->second->server, i->second->nick, i->second->fullname);
785 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, Ptr->name);
789 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, user->nick);
793 if (parameters[0][0] == '#')
795 Ptr = FindChan(parameters[0]);
798 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
800 if ((has_channel(i->second,Ptr)) && (isnick(i->second->nick)))
802 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, Ptr->name, i->second->ident, i->second->dhost, i->second->server, i->second->nick, i->second->fullname);
805 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, Ptr->name);
809 WriteServ(user->fd,"401 %s %s :No suck nick/channel",user->nick, parameters[0]);
814 userrec* u = Find(parameters[0]);
817 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, u->nick, u->ident, u->dhost, u->server, u->nick, u->fullname);
819 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, parameters[0]);
824 if ((!strcmp(parameters[0],"0")) || (!strcmp(parameters[0],"*")) && (!strcmp(parameters[1],"o")))
826 for (user_hash::const_iterator i = clientlist.begin(); i != clientlist.end(); i++)
828 if ((common_channels(user,i->second)) && (isnick(i->second->nick)))
830 if (strchr(i->second->modes,'o'))
832 WriteServ(user->fd,"352 %s %s %s %s %s %s Hr@ :0 %s",user->nick, user->nick, i->second->ident, i->second->dhost, i->second->server, i->second->nick, i->second->fullname);
836 WriteServ(user->fd,"315 %s %s :End of /WHO list.",user->nick, user->nick);
842 void handle_wallops(char **parameters, int pcnt, userrec *user)
844 WriteWallOps(user,false,"%s",parameters[0]);
847 void handle_list(char **parameters, int pcnt, userrec *user)
851 WriteServ(user->fd,"321 %s Channel :Users Name",user->nick);
852 for (chan_hash::const_iterator i = chanlist.begin(); i != chanlist.end(); i++)
854 if ((!i->second->c_private) && (!i->second->secret))
856 WriteServ(user->fd,"322 %s %s %d :[+%s] %s",user->nick,i->second->name,usercount_i(i->second),chanmodes(i->second),i->second->topic);
859 WriteServ(user->fd,"323 %s :End of channel list.",user->nick);
863 void handle_rehash(char **parameters, int pcnt, userrec *user)
865 WriteServ(user->fd,"382 %s %s :Rehashing",user->nick,CleanFilename(CONFIG_FILE));
867 FOREACH_MOD OnRehash();
868 WriteOpers("%s is rehashing config file %s",user->nick,CleanFilename(CONFIG_FILE));
871 void handle_lusers(char **parameters, int pcnt, userrec *user)
873 WriteServ(user->fd,"251 %s :There are %d users and %d invisible on %d servers",user->nick,usercnt()-usercount_invisible(),usercount_invisible(),servercount());
874 WriteServ(user->fd,"252 %s %d :operator(s) online",user->nick,usercount_opers());
875 WriteServ(user->fd,"253 %s %d :unknown connections",user->nick,usercount_unknown());
876 WriteServ(user->fd,"254 %s %d :channels formed",user->nick,chancount());
877 WriteServ(user->fd,"254 %s :I have %d clients and %d servers",user->nick,local_count(),count_servs());
880 void handle_admin(char **parameters, int pcnt, userrec *user)
882 WriteServ(user->fd,"256 %s :Administrative info for %s",user->nick,ServerName);
883 WriteServ(user->fd,"257 %s :Name - %s",user->nick,AdminName);
884 WriteServ(user->fd,"258 %s :Nickname - %s",user->nick,AdminNick);
885 WriteServ(user->fd,"258 %s :E-Mail - %s",user->nick,AdminEmail);
888 void handle_ping(char **parameters, int pcnt, userrec *user)
890 WriteServ(user->fd,"PONG %s :%s",ServerName,parameters[0]);
893 void handle_pong(char **parameters, int pcnt, userrec *user)
895 // set the user as alive so they survive to next ping
899 void handle_motd(char **parameters, int pcnt, userrec *user)
904 void handle_rules(char **parameters, int pcnt, userrec *user)
909 void handle_user(char **parameters, int pcnt, userrec *user)
911 if (user->registered < 3)
913 if (isident(parameters[0]) == 0) {
914 // This kinda Sucks, According to the RFC thou, its either this,
915 // or "You have already registered" :p -- Craig
916 WriteServ(user->fd,"461 %s USER :Not enough parameters",user->nick);
919 WriteServ(user->fd,"NOTICE Auth :No ident response, ident prefixed with ~");
920 strcpy(user->ident,"~"); /* we arent checking ident... but these days why bother anyway? */
921 strncat(user->ident,parameters[0],IDENTMAX);
922 strncpy(user->fullname,parameters[3],128);
923 user->registered = (user->registered | 1);
928 WriteServ(user->fd,"462 %s :You may not reregister",user->nick);
931 /* parameters 2 and 3 are local and remote hosts, ignored when sent by client connection */
932 if (user->registered == 3)
934 /* user is registered now, bit 0 = USER command, bit 1 = sent a NICK command */
939 void handle_userhost(char **parameters, int pcnt, userrec *user)
941 char Return[MAXBUF],junk[MAXBUF];
942 sprintf(Return,"302 %s :",user->nick);
943 for (int i = 0; i < pcnt; i++)
945 userrec *u = Find(parameters[i]);
948 if (strchr(u->modes,'o'))
950 sprintf(junk,"%s*=+%s@%s ",u->nick,u->ident,u->host);
955 sprintf(junk,"%s=+%s@%s ",u->nick,u->ident,u->host);
960 WriteServ(user->fd,Return);
964 void handle_ison(char **parameters, int pcnt, userrec *user)
967 sprintf(Return,"303 %s :",user->nick);
968 for (int i = 0; i < pcnt; i++)
970 userrec *u = Find(parameters[i]);
973 strcat(Return,u->nick);
977 WriteServ(user->fd,Return);
981 void handle_away(char **parameters, int pcnt, userrec *user)
985 strcpy(user->awaymsg,parameters[0]);
986 WriteServ(user->fd,"306 %s :You have been marked as being away",user->nick);
990 strcpy(user->awaymsg,"");
991 WriteServ(user->fd,"305 %s :You are no longer marked as being away",user->nick);
995 void handle_whowas(char **parameters, int pcnt, userrec* user)
997 user_hash::iterator i = whowas.find(parameters[0]);
999 if (i == whowas.end())
1001 WriteServ(user->fd,"406 %s %s :There was no such nickname",user->nick,parameters[0]);
1002 WriteServ(user->fd,"369 %s %s :End of WHOWAS",user->nick,parameters[0]);
1006 time_t rawtime = i->second->signon;
1010 timeinfo = localtime(&rawtime);
1011 strcpy(b,asctime(timeinfo));
1012 b[strlen(b)-1] = '\0';
1014 WriteServ(user->fd,"314 %s %s %s %s * :%s",user->nick,i->second->nick,i->second->ident,i->second->dhost,i->second->fullname);
1015 WriteServ(user->fd,"312 %s %s %s :%s",user->nick,i->second->nick,i->second->server,b);
1016 WriteServ(user->fd,"369 %s %s :End of WHOWAS",user->nick,parameters[0]);
1021 void handle_trace(char **parameters, int pcnt, userrec *user)
1023 for (user_hash::iterator i = clientlist.begin(); i != clientlist.end(); i++)
1027 if (isnick(i->second->nick))
1029 if (strchr(i->second->modes,'o'))
1031 WriteServ(user->fd,"205 %s :Oper 0 %s",user->nick,i->second->nick);
1035 WriteServ(user->fd,"204 %s :User 0 %s",user->nick,i->second->nick);
1040 WriteServ(user->fd,"203 %s :???? 0 [%s]",user->nick,i->second->host);
1046 void handle_modules(char **parameters, int pcnt, userrec *user)
1048 for (int i = 0; i < module_names.size(); i++)
1050 Version V = modules[i]->GetVersion();
1051 char modulename[MAXBUF];
1052 strncpy(modulename,module_names[i].c_str(),256);
1053 WriteServ(user->fd,"900 %s :0x%08lx %d.%d.%d.%d %s",user->nick,modules[i],V.Major,V.Minor,V.Revision,V.Build,CleanFilename(modulename));
1057 void handle_stats(char **parameters, int pcnt, userrec *user)
1063 if (strlen(parameters[0])>1)
1065 /* make the stats query 1 character long */
1066 parameters[0][1] = '\0';
1069 /* stats m (list number of times each command has been used, plus bytecount) */
1070 if (!strcasecmp(parameters[0],"m"))
1072 for (int i = 0; i < cmdlist.size(); i++)
1074 if (cmdlist[i].handler_function)
1076 if (cmdlist[i].use_count)
1078 /* RPL_STATSCOMMANDS */
1079 WriteServ(user->fd,"212 %s %s %d %d",user->nick,cmdlist[i].command,cmdlist[i].use_count,cmdlist[i].total_bytes);
1086 /* stats z (debug and memory info) */
1087 if (!strcasecmp(parameters[0],"z"))
1089 WriteServ(user->fd,"249 %s :Users(HASH_MAP) %d (%d bytes, %d buckets)",user->nick,clientlist.size(),clientlist.size()*sizeof(userrec),clientlist.bucket_count());
1090 WriteServ(user->fd,"249 %s :Channels(HASH_MAP) %d (%d bytes, %d buckets)",user->nick,chanlist.size(),chanlist.size()*sizeof(chanrec),chanlist.bucket_count());
1091 WriteServ(user->fd,"249 %s :Commands(VECTOR) %d (%d bytes)",user->nick,cmdlist.size(),cmdlist.size()*sizeof(command_t));
1092 WriteServ(user->fd,"249 %s :MOTD(VECTOR) %d, RULES(VECTOR) %d",user->nick,MOTD.size(),RULES.size());
1093 WriteServ(user->fd,"249 %s :address_cache(HASH_MAP) %d (%d buckets)",user->nick,IP.size(),IP.bucket_count());
1094 WriteServ(user->fd,"249 %s :Modules(VECTOR) %d (%d)",user->nick,modules.size(),modules.size()*sizeof(Module));
1095 WriteServ(user->fd,"249 %s :ClassFactories(VECTOR) %d (%d)",user->nick,factory.size(),factory.size()*sizeof(ircd_module));
1096 WriteServ(user->fd,"249 %s :Ports(STATIC_ARRAY) %d",user->nick,boundPortCount);
1100 if (!strcasecmp(parameters[0],"o"))
1102 for (int i = 0; i < ConfValueEnum("oper",&config_f); i++)
1104 char LoginName[MAXBUF];
1105 char HostName[MAXBUF];
1106 char OperType[MAXBUF];
1107 ConfValue("oper","name",i,LoginName,&config_f);
1108 ConfValue("oper","host",i,HostName,&config_f);
1109 ConfValue("oper","type",i,OperType,&config_f);
1110 WriteServ(user->fd,"243 %s O %s * %s %s 0",user->nick,HostName,LoginName,OperType);
1114 /* stats l (show user I/O stats) */
1115 if (!strcasecmp(parameters[0],"l"))
1117 WriteServ(user->fd,"211 %s :server:port nick bytes_in cmds_in bytes_out cmds_out",user->nick);
1118 for (user_hash::iterator i = clientlist.begin(); i != clientlist.end(); i++)
1120 if (isnick(i->second->nick))
1122 WriteServ(user->fd,"211 %s :%s:%d %s %d %d %d %d",user->nick,ServerName,i->second->port,i->second->nick,i->second->bytes_in,i->second->cmds_in,i->second->bytes_out,i->second->cmds_out);
1126 WriteServ(user->fd,"211 %s :%s:%d (unknown@%d) %d %d %d %d",user->nick,ServerName,i->second->port,i->second->fd,i->second->bytes_in,i->second->cmds_in,i->second->bytes_out,i->second->cmds_out);
1132 /* stats u (show server uptime) */
1133 if (!strcasecmp(parameters[0],"u"))
1135 time_t current_time = 0;
1136 current_time = time(NULL);
1137 time_t server_uptime = current_time - startup_time;
1139 stime = gmtime(&server_uptime);
1140 /* i dont know who the hell would have an ircd running for over a year nonstop, but
1141 * Craig suggested this, and it seemed a good idea so in it went */
1142 if (stime->tm_year > 70)
1144 WriteServ(user->fd,"242 %s :Server up %d years, %d days, %.2d:%.2d:%.2d",user->nick,(stime->tm_year-70),stime->tm_yday,stime->tm_hour,stime->tm_min,stime->tm_sec);
1148 WriteServ(user->fd,"242 %s :Server up %d days, %.2d:%.2d:%.2d",user->nick,stime->tm_yday,stime->tm_hour,stime->tm_min,stime->tm_sec);
1152 WriteServ(user->fd,"219 %s %s :End of /STATS report",user->nick,parameters[0]);
1153 WriteOpers("*** Notice: Stats '%s' requested by %s (%s@%s)",parameters[0],user->nick,user->ident,user->host);
1157 void handle_connect(char **parameters, int pcnt, userrec *user)
1159 char Link_ServerName[1024];
1160 char Link_IPAddr[1024];
1161 char Link_Port[1024];
1162 char Link_Pass[1024];
1166 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
1170 ConfValue("link","name",i,Link_ServerName,&config_f);
1171 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
1172 ConfValue("link","port",i,Link_Port,&config_f);
1173 ConfValue("link","sendpass",i,Link_Pass,&config_f);
1174 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
1175 LinkPort = atoi(Link_Port);
1176 if (match(Link_ServerName,parameters[0])) {
1184 WriteServ(user->fd,"NOTICE %s :*** Failed to connect to %s: No servers matching this pattern are configured for linking.",user->nick,parameters[0]);
1188 // TODO: Perform a check here to stop a server being linked twice!
1190 WriteServ(user->fd,"NOTICE %s :*** Connecting to %s (%s) port %s...",user->nick,Link_ServerName,Link_IPAddr,Link_Port);
1192 if (me[defaultRoute])
1194 me[defaultRoute]->BeginLink(Link_IPAddr,LinkPort,Link_Pass,Link_ServerName,me[defaultRoute]->port);
1199 WriteServ(user->fd,"NOTICE %s :No default route is defined for server connections on this server. You must define a server connection to be default route so that sockets can be bound to it.",user->nick);
1203 void handle_squit(char **parameters, int pcnt, userrec *user)
1205 // send out an squit across the mesh and then clear the server list (for local squit)
1208 WriteOpers("SQUIT command issued by %s",user->nick);
1209 char buffer[MAXBUF];
1210 snprintf(buffer,MAXBUF,"& %s",ServerName);
1211 NetSendToAll(buffer);
1216 WriteServ(user->fd,"NOTICE :*** Remote SQUIT not supported yet.");
1220 void handle_links(char **parameters, int pcnt, userrec *user)
1222 WriteServ(user->fd,"364 %s %s %s :0 %s",user->nick,ServerName,ServerName,ServerDesc);
1223 for (int j = 0; j < 32; j++)
1227 for (int k = 0; k < me[j]->connectors.size(); k++)
1229 WriteServ(user->fd,"364 %s %s %s :1 %s",user->nick,me[j]->connectors[k].GetServerName().c_str(),ServerName,me[j]->connectors[k].GetDescription().c_str());
1233 WriteServ(user->fd,"365 %s * :End of /LINKS list.",user->nick);
1236 void handle_map(char **parameters, int pcnt, userrec *user)
1239 snprintf(line,MAXBUF,"006 %s :%s",user->nick,ServerName);
1240 while (strlen(line) < 50)
1242 WriteServ(user->fd,"%s%d (%.2f%%)",line,local_count(),(float)(((float)local_count()/(float)usercnt())*100));
1243 for (int j = 0; j < 32; j++)
1247 for (int k = 0; k < me[j]->connectors.size(); k++)
1249 snprintf(line,MAXBUF,"006 %s :%c-%s",user->nick,islast(me[j]->connectors[k].GetServerName().c_str()),me[j]->connectors[k].GetServerName().c_str());
1250 while (strlen(line) < 50)
1252 WriteServ(user->fd,"%s%d (%.2f%%)",line,map_count(me[j]->connectors[k].GetServerName().c_str()),(float)(((float)map_count(me[j]->connectors[k].GetServerName().c_str())/(float)usercnt())*100));
1256 WriteServ(user->fd,"007 %s :End of /MAP",user->nick);
1259 bool is_uline(const char* server)
1261 char ServName[MAXBUF];
1264 for (int i = 0; i < ConfValueEnum("uline",&config_f); i++)
1266 ConfValue("uline","server",i,ServName,&config_f);
1267 if (!strcasecmp(server,ServName))
1276 void handle_oper(char **parameters, int pcnt, userrec *user)
1278 char LoginName[MAXBUF];
1279 char Password[MAXBUF];
1280 char OperType[MAXBUF];
1281 char TypeName[MAXBUF];
1282 char Hostname[MAXBUF];
1285 for (int i = 0; i < ConfValueEnum("oper",&config_f); i++)
1287 ConfValue("oper","name",i,LoginName,&config_f);
1288 ConfValue("oper","password",i,Password,&config_f);
1289 if ((!strcmp(LoginName,parameters[0])) && (!strcmp(Password,parameters[1])))
1291 /* correct oper credentials */
1292 ConfValue("oper","type",i,OperType,&config_f);
1293 WriteOpers("*** %s (%s@%s) is now an IRC operator of type %s",user->nick,user->ident,user->host,OperType);
1294 WriteServ(user->fd,"381 %s :You are now an IRC operator of type %s",user->nick,OperType);
1295 WriteServ(user->fd,"MODE %s :+o",user->nick);
1296 char global[MAXBUF];
1297 snprintf(global,MAXBUF,"M %s +o",user->nick);
1298 NetSendToAll(global);
1299 for (j =0; j < ConfValueEnum("type",&config_f); j++)
1301 ConfValue("type","name",j,TypeName,&config_f);
1302 if (!strcmp(TypeName,OperType))
1304 /* found this oper's opertype */
1305 ConfValue("type","host",j,Hostname,&config_f);
1306 ChangeDisplayedHost(user,Hostname);
1309 if (!strchr(user->modes,'o'))
1311 strcat(user->modes,"o");
1313 FOREACH_MOD OnOper(user);
1318 WriteServ(user->fd,"491 %s :Invalid oper credentials",user->nick);
1319 WriteOpers("*** WARNING! Failed oper attempt by %s!%s@%s!",user->nick,user->ident,user->host);
1322 void handle_nick(char **parameters, int pcnt, userrec *user)
1326 log(DEBUG,"not enough params for handle_nick");
1331 log(DEBUG,"invalid parameter passed to handle_nick");
1334 if (!strlen(parameters[0]))
1336 log(DEBUG,"zero length new nick passed to handle_nick");
1341 log(DEBUG,"invalid user passed to handle_nick");
1346 log(DEBUG,"invalid old nick passed to handle_nick");
1349 if (!strcasecmp(user->nick,parameters[0]))
1351 log(DEBUG,"old nick is new nick, skipping");
1356 if (strlen(parameters[0]) > 1)
1358 if (parameters[0][0] == ':')
1363 if ((Find(parameters[0])) && (Find(parameters[0]) != user))
1365 WriteServ(user->fd,"433 %s %s :Nickname is already in use.",user->nick,parameters[0]);
1369 if (isnick(parameters[0]) == 0)
1371 WriteServ(user->fd,"432 %s %s :Erroneous Nickname",user->nick,parameters[0]);
1375 if (user->registered == 7)
1378 FOREACH_RESULT(OnUserPreNick(user,parameters[0]));
1380 // if a module returns true, the nick change is silently forbidden.
1384 WriteCommon(user,"NICK %s",parameters[0]);
1386 // Q token must go to ALL servers!!!
1387 char buffer[MAXBUF];
1388 snprintf(buffer,MAXBUF,"n %s %s",user->nick,parameters[0]);
1389 NetSendToAll(buffer);
1393 /* change the nick of the user in the users_hash */
1394 user = ReHashNick(user->nick, parameters[0]);
1395 /* actually change the nick within the record */
1397 if (!user->nick) return;
1399 strncpy(user->nick, parameters[0],NICKMAX);
1401 log(DEBUG,"new nick set: %s",user->nick);
1403 if (user->registered < 3)
1404 user->registered = (user->registered | 2);
1405 if (user->registered == 3)
1407 /* user is registered now, bit 0 = USER command, bit 1 = sent a NICK command */
1410 log(DEBUG,"exit nickchange: %s",user->nick);
1415 void handle_V(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1417 char* src = strtok(params," ");
1418 char* dest = strtok(NULL," :");
1419 char* text = strtok(NULL,"\r\n");
1422 userrec* user = Find(src);
1425 userrec* dst = Find(dest);
1429 WriteTo(user, dst, "NOTICE %s :%s", dst->nick, text);
1433 chanrec* d = FindChan(dest);
1436 ChanExceptSender(d, user, "NOTICE %s :%s", d->name, text);
1444 void handle_P(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1446 char* src = strtok(params," ");
1447 char* dest = strtok(NULL," :");
1448 char* text = strtok(NULL,"\r\n");
1451 userrec* user = Find(src);
1454 userrec* dst = Find(dest);
1458 WriteTo(user, dst, "PRIVMSG %s :%s", dst->nick, text);
1462 chanrec* d = FindChan(dest);
1465 ChanExceptSender(d, user, "PRIVMSG %s :%s", d->name, text);
1472 void handle_i(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1474 char* nick = strtok(params," ");
1475 char* from = strtok(NULL," ");
1476 char* channel = strtok(NULL," ");
1477 userrec* u = Find(nick);
1478 userrec* user = Find(from);
1479 chanrec* c = FindChan(channel);
1480 if ((c) && (u) && (user))
1482 u->InviteTo(c->name);
1483 WriteFrom(u->fd,user,"INVITE %s :%s",u->nick,c->name);
1487 void handle_t(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1489 char* setby = strtok(params," ");
1490 char* channel = strtok(NULL," :");
1491 char* topic = strtok(NULL,"\r\n");
1493 userrec* u = Find(setby);
1494 chanrec* c = FindChan(channel);
1497 WriteChannelLocal(c,u,"TOPIC %s :%s",c->name,topic);
1498 strncpy(c->topic,topic,MAXTOPIC);
1499 strncpy(c->setby,u->nick,NICKMAX);
1500 c->topicset = time(NULL);
1505 void handle_T(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1507 char* tm = strtok(params," ");
1508 char* setby = strtok(NULL," ");
1509 char* channel = strtok(NULL," :");
1510 char* topic = strtok(NULL,"\r\n");
1512 time_t TS = atoi(tm);
1513 chanrec* c = FindChan(channel);
1516 // in the case of topics and TS, the *NEWER*
1517 if (TS <= c->topicset)
1519 WriteChannelLocal(c,NULL,"TOPIC %s :%s",c->name,topic);
1520 strncpy(c->topic,topic,MAXTOPIC);
1521 strncpy(c->setby,setby,NICKMAX);
1526 void handle_M(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1529 char original[MAXBUF],target[MAXBUF];
1530 strncpy(original,params,MAXBUF);
1532 char* parameter = strtok(params," ");
1533 strncpy(target,parameter,MAXBUF);
1536 if (parameter[0] == ':')
1538 pars[index++] = parameter;
1539 parameter = strtok(NULL," ");
1541 log(DEBUG,"*** MODE: %s %s",pars[0],pars[1]);
1542 merge_mode(pars,index);
1543 if (FindChan(target))
1545 WriteChannelLocal(FindChan(target), NULL, "MODE %s",original);
1549 Write(Find(target)->fd,":%s MODE %s",ServerName,original);
1553 // m is modes set by users only (not servers) valid targets are channels or users.
1555 void handle_m(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1557 // m blah #chatspike +b *!test@*4
1559 char original[MAXBUF];
1560 strncpy(original,params,MAXBUF);
1562 if (!strchr(params,' '))
1564 WriteOpers("WARNING! 'm' token in data stream without any parameters! Something fishy is going on!");
1570 char* src = strtok(params," ");
1571 userrec* user = Find(src);
1575 log(DEBUG,"Found user: %s",user->nick);
1576 char* parameter = strtok(NULL," ");
1579 pars[index++] = parameter;
1580 parameter = strtok(NULL," ");
1583 log(DEBUG,"Calling merge_mode2");
1584 merge_mode2(pars,index,user);
1589 void handle_L(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1591 char* nick = strtok(params," ");
1592 char* channel = strtok(NULL," :");
1593 char* reason = strtok(NULL,"\r\n");
1594 userrec* user = Find(nick);
1598 if (strcmp(reason,""))
1600 del_channel(user,channel,reason,true);
1604 del_channel(user,channel,NULL,true);
1609 void handle_K(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1611 char* src = strtok(params," ");
1612 char* nick = strtok(NULL," :");
1613 char* reason = strtok(NULL,"\r\n");
1614 char kreason[MAXBUF];
1617 userrec* u = Find(nick);
1618 userrec* user = Find(src);
1622 WriteTo(user, u, "KILL %s :%s!%s!%s!%s (%s)", u->nick, source->name, ServerName, user->dhost,user->nick,reason);
1623 WriteOpers("*** Remote kill from %s by %s: %s!%s@%s (%s)",source->name,user->nick,u->nick,u->ident,u->host,reason);
1624 snprintf(kreason,MAXBUF,"[%s] Killed (%s (%s))",source->name,user->nick,reason);
1625 kill_link(u,kreason);
1629 void handle_Q(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1631 char* nick = strtok(params," :");
1632 char* reason = strtok(NULL,"\r\n");
1635 userrec* user = Find(nick);
1639 if (strlen(reason)>MAXQUIT)
1641 reason[MAXQUIT-1] = '\0';
1645 WriteCommonExcept(user,"QUIT :%s",reason);
1647 user_hash::iterator iter = clientlist.find(user->nick);
1649 if (iter != clientlist.end())
1651 log(DEBUG,"deleting user hash value %d",iter->second);
1652 if ((iter->second) && (user->registered == 7)) {
1653 delete iter->second;
1655 clientlist.erase(iter);
1658 purge_empty_chans();
1662 void handle_n(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1664 char* oldnick = strtok(params," ");
1665 char* newnick = strtok(NULL," ");
1667 userrec* user = Find(oldnick);
1671 WriteCommon(user,"NICK %s",newnick);
1672 if (is_uline(tcp_host))
1675 FOREACH_RESULT(OnUserPreNick(user,newnick));
1677 // if a module returns true, the nick change couldnt be allowed
1678 kill_link(user,"Nickname collision");
1682 // broadcast this because its a services thingy
1683 char buffer[MAXBUF];
1684 snprintf(buffer,MAXBUF,"n %s %s",user->nick,newnick);
1685 NetSendToAll(buffer);
1687 user = ReHashNick(user->nick, newnick);
1689 if (!user->nick) return;
1690 strncpy(user->nick, newnick,NICKMAX);
1691 log(DEBUG,"new nick set: %s",user->nick);
1695 // k <SOURCE> <DEST> <CHANNEL> :<REASON>
1696 void handle_k(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1698 char* src = strtok(params," ");
1699 char* dest = strtok(NULL," ");
1700 char* channel = strtok(NULL," :");
1701 char* reason = strtok(NULL,"\r\n");
1703 userrec* s = Find(src);
1704 userrec* d = Find(dest);
1705 chanrec* c = FindChan(channel);
1706 if ((s) && (d) && (c))
1708 kick_channel(s,d,c,reason);
1713 if ((s) && (d) && (c))
1715 kick_channel(s,d,c,reason);
1720 void handle_AT(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1722 char* who = strtok(params," :");
1723 char* text = strtok(NULL,"\r\n");
1725 userrec* s = Find(who);
1728 WriteWallOps(s,true,text);
1732 void handle_H(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1734 log(DEBUG,"Adding ULined server %s to my map",params);
1736 s.SetState(STATE_DISCONNECTED);
1737 s.SetServerName(params);
1738 source->connectors.push_back(s);
1741 void handle_N(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1743 char* tm = strtok(params," ");
1744 char* nick = strtok(NULL," ");
1745 char* host = strtok(NULL," ");
1746 char* dhost = strtok(NULL," ");
1747 char* ident = strtok(NULL," ");
1748 char* modes = strtok(NULL," ");
1749 char* server = strtok(NULL," :");
1750 char* gecos = strtok(NULL,"\r\n");
1753 time_t TS = atoi(tm);
1754 user_hash::iterator iter = clientlist.find(nick);
1755 if (iter != clientlist.end())
1758 WriteOpers("Nickname collision: %s@%s != %s@%s",nick,server,iter->second->nick,iter->second->server);
1760 snprintf(str,MAXBUF,"Killed (Nick Collision (%s@%s < %s@%s))",nick,server,iter->second->nick,iter->second->server);
1761 WriteServ(iter->second->fd, "KILL %s :%s",iter->second->nick,str);
1762 kill_link(iter->second,str);
1764 clientlist[nick] = new userrec();
1765 // remote users have an fd of -1. This is so that our Write abstraction
1766 // routines know to route any messages to this record away to whatever server
1768 clientlist[nick]->fd = -1;
1769 strncpy(clientlist[nick]->nick, nick,NICKMAX);
1770 strncpy(clientlist[nick]->host, host,160);
1771 strncpy(clientlist[nick]->dhost, dhost,160);
1772 strncpy(clientlist[nick]->server, server,256);
1773 strncpy(clientlist[nick]->ident, ident,10); // +1 char to compensate for tilde
1774 strncpy(clientlist[nick]->fullname, gecos,128);
1775 clientlist[nick]->signon = TS;
1776 clientlist[nick]->nping = 0; // this is ignored for a remote user anyway.
1777 clientlist[nick]->lastping = 1;
1778 clientlist[nick]->port = 0; // so is this...
1779 clientlist[nick]->registered = 7; // this however we need to set for them to receive messages and appear online
1780 clientlist[nick]->idle_lastmsg = time(NULL); // this is unrealiable and wont actually be used locally
1781 for (int i = 0; i < MAXCHANS; i++)
1783 clientlist[nick]->chans[i].channel = NULL;
1784 clientlist[nick]->chans[i].uc_modes = 0;
1788 void handle_F(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1790 long tdiff = time(NULL) - atoi(params);
1792 WriteOpers("TS split for %s -> %s: %d",source->name,reply->name,tdiff);
1795 void handle_a(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1797 char* nick = strtok(params," :");
1798 char* gecos = strtok(NULL,"\r\n");
1800 userrec* user = Find(nick);
1803 strncpy(user->fullname,gecos,MAXBUF);
1806 void handle_b(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1808 char* nick = strtok(params," ");
1809 char* host = strtok(NULL," ");
1811 userrec* user = Find(nick);
1814 strncpy(user->dhost,host,160);
1817 void handle_plus(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1820 // + test3.chatspike.net 7010 -2016508415
1821 char* servername = strtok(params," ");
1822 char* ipaddr = strtok(NULL," ");
1823 char* ipport = strtok(NULL," ");
1824 char* cookie = strtok(NULL," ");
1825 log(DEBUG,"*** Connecting back to %s:%d",ipaddr,atoi(ipport));
1828 bool conn_already = false;
1829 for (int i = 0; i < 32; i++)
1833 for (int j = 0; j < me[i]->connectors.size(); j++)
1835 if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),servername))
1837 if (me[i]->connectors[j].GetServerPort() == atoi(ipport))
1839 log(DEBUG,"Already got a connection to %s:%d, ignoring +",ipaddr,atoi(ipport));
1840 conn_already = true;
1847 me[defaultRoute]->MeshCookie(ipaddr,atoi(ipport),atoi(cookie),servername);
1850 void handle_R(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1852 char* server = strtok(params," ");
1853 char* data = strtok(NULL,"\r\n");
1854 if ((!data) || (!server))
1856 log(DEBUG,"Someones playing silly buggers, attempting to send to a null server or send a null message (BUG?)");
1860 log(DEBUG,"Forwarded packet '%s' to '%s'",data,server);
1861 NetSendToOne(server,data);
1864 void handle_J(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1867 // The J token currently has no timestamp - this needs looking at
1868 // because it will allow splitriding.
1869 char* nick = strtok(params," ");
1870 char* channel = strtok(NULL," ");
1871 userrec* user = Find(nick);
1874 if ((user != NULL) && (strcmp(channel,"")))
1876 char privilage = '\0';
1877 if (channel[0] != '#')
1879 privilage = channel[0];
1882 add_channel(user,channel,"",true);
1884 // now work out the privilages they should have on each channel
1885 // and send the appropriate servermodes.
1886 for (int i = 0; i != MAXCHANS; i++)
1888 if (user->chans[i].channel)
1890 if (!strcasecmp(user->chans[i].channel->name,channel))
1892 if (privilage == '@')
1894 user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_OP;
1895 WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +o %s",channel,user->nick);
1897 if (privilage == '%')
1899 user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_HOP;
1900 WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +h %s",channel,user->nick);
1902 if (privilage == '+')
1904 user->chans[i].uc_modes = user->chans[i].uc_modes | UCMODE_VOICE;
1905 WriteChannelLocal(user->chans[i].channel, NULL, "MODE %s +v %s",channel,user->nick);
1912 channel = strtok(NULL," ");
1916 void handle_dollar(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1918 log(DEBUG,"Storing routing table...");
1919 char* sourceserver = strtok(params," ");
1920 char* server = strtok(NULL," ");
1921 for (int i = 0; i < 32; i++)
1925 for (int j = 0; j < me[i]->connectors.size(); j++)
1927 if (!strcasecmp(me[i]->connectors[j].GetServerName().c_str(),sourceserver))
1929 me[i]->connectors[j].routes.clear();
1930 log(DEBUG,"Found entry for source server.");
1934 me[i]->connectors[j].routes.push_back(server);
1935 log(DEBUG,"*** Stored route: %s -> %s -> %s",ServerName,sourceserver,server);
1936 server = strtok(NULL," ");
1943 log(DEBUG,"Warning! routing table received from nonexistent server!");
1946 void handle_amp(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host)
1948 log(DEBUG,"Netsplit! %s split from mesh, removing!",params);
1949 WriteOpers("*** NOTICE - Controlled netsplit: %s split from %s",params,ServerName);
1950 bool go_again = true;
1954 for (int i = 0; i < 32; i++)
1958 for (vector<ircd_connector>::iterator j = me[i]->connectors.begin(); j != me[i]->connectors.end(); j++)
1960 if (!strcasecmp(j->GetServerName().c_str(),params))
1963 j->CloseConnection();
1964 me[i]->connectors.erase(j);
1972 log(DEBUG,"Removed server. Will remove clients...");
1973 // iterate through the userlist and remove all users on this server.
1974 // because we're dealing with a mesh, we dont have to deal with anything
1975 // "down-route" from this server (nice huh)
1977 char reason[MAXBUF];
1978 snprintf(reason,MAXBUF,"%s %s",ServerName,params);
1982 for (user_hash::const_iterator u = clientlist.begin(); u != clientlist.end(); u++)
1984 if (!strcasecmp(u->second->server,params))
1986 kill_link(u->second,reason);
1997 void process_restricted_commands(char token,char* params,serverrec* source,serverrec* reply, char* tcp_host,char* ipaddr,int port)
1999 char buffer[MAXBUF];
2006 nb_start = time(NULL);
2007 WriteOpers("Server %s is starting netburst.",tcp_host);
2008 // now broadcast this new servers address out to all servers that are linked to us,
2009 // except the newcomer. They'll all attempt to connect back to it.
2010 authcookie = rand()*rand();
2011 snprintf(buffer,MAXBUF,"~ %d",authcookie);
2012 NetSendToAll(buffer);
2016 // once stored, this authcookie permits other servers to log in
2017 // without user or password, using it.
2019 auth_cookies.push_back(atoi(params));
2020 log(DEBUG,"*** Stored auth cookie, will permit servers with auth-cookie %d",atoi(params));
2022 // connect back to a server using an authcookie
2024 handle_plus(token,params,source,reply,tcp_host);
2028 handle_dollar(token,params,source,reply,tcp_host);
2030 // node unreachable - we cant route to a server, sooooo we slit it off.
2031 // servers can generate these for themselves for an squit.
2033 handle_amp(token,params,source,reply,tcp_host);
2035 // R <server> <data>
2036 // redirect token, send all of <data> along to the given
2037 // server as this server has been found to still have a route to it
2039 handle_R(token,params,source,reply,tcp_host);
2044 reply->SendPacket("!",tcp_host);
2054 // N <TS> <NICK> <HOST> <DHOST> <IDENT> <MODES> <SERVER> :<GECOS>
2055 // introduce remote client
2057 handle_N(token,params,source,reply,tcp_host);
2059 // a <NICK> :<GECOS>
2060 // change GECOS (SETNAME)
2062 handle_a(token,params,source,reply,tcp_host);
2065 // change displayed host (SETHOST)
2067 handle_b(token,params,source,reply,tcp_host);
2069 // t <NICK> <CHANNEL> :<TOPIC>
2070 // change a channel topic
2072 handle_t(token,params,source,reply,tcp_host);
2074 // i <NICK> <CHANNEL>
2075 // invite a user to a channel
2077 handle_i(token,params,source,reply,tcp_host);
2079 // k <SOURCE> <DEST> <CHANNEL> :<REASON>
2080 // kick a user from a channel
2082 handle_k(token,params,source,reply,tcp_host);
2084 // n <NICK> <NEWNICK>
2085 // change nickname of client -- a server should only be able to
2086 // change the nicknames of clients that reside on it unless
2089 handle_n(token,params,source,reply,tcp_host);
2091 // J <NICK> <CHANLIST>
2092 // Join user to channel list, merge channel permissions
2094 handle_J(token,params,source,reply,tcp_host);
2096 // T <TS> <CHANNEL> <TOPICSETTER> :<TOPIC>
2097 // change channel topic (netburst only)
2099 handle_T(token,params,source,reply,tcp_host);
2101 // M <TARGET> <MODES> [MODE-PARAMETERS]
2102 // Server setting modes on an object
2104 handle_M(token,params,source,reply,tcp_host);
2106 // m <SOURCE> <TARGET> <MODES> [MODE-PARAMETERS]
2107 // User setting modes on an object
2109 handle_m(token,params,source,reply,tcp_host);
2111 // P <SOURCE> <TARGET> :<TEXT>
2112 // Send a private/channel message
2114 handle_P(token,params,source,reply,tcp_host);
2116 // V <SOURCE> <TARGET> :<TEXT>
2117 // Send a private/channel notice
2119 handle_V(token,params,source,reply,tcp_host);
2121 // L <SOURCE> <CHANNEL> :<REASON>
2122 // User parting a channel
2124 handle_L(token,params,source,reply,tcp_host);
2126 // Q <SOURCE> :<REASON>
2129 handle_Q(token,params,source,reply,tcp_host);
2132 // introduce non-meshable server (such as a services server)
2134 handle_H(token,params,source,reply,tcp_host);
2136 // K <SOURCE> <DEST> :<REASON>
2139 handle_K(token,params,source,reply,tcp_host);
2141 // @ <SOURCE> :<TEXT>
2144 handle_AT(token,params,source,reply,tcp_host);
2149 WriteOpers("Server %s has completed netburst. (%d secs)",tcp_host,time(NULL)-nb_start);
2150 handle_F(token,params,source,reply,tcp_host);
2152 // tell all the other servers to use this authcookie to connect back again
2153 // got '+ test3.chatspike.net 7010 -2016508415' from test.chatspike.net
2154 snprintf(buffer,MAXBUF,"+ %s %s %d %d",tcp_host,ipaddr,port,authcookie);
2155 NetSendToAllExcept(tcp_host,buffer);
2158 // end netburst with no mesh creation
2160 WriteOpers("Server %s has completed netburst. (%d secs)",tcp_host,time(NULL)-nb_start);
2161 handle_F(token,params,source,reply,tcp_host);
2163 // tell everyone else about the new server name so they just add it in the disconnected
2165 snprintf(buffer,MAXBUF,"u %s :%s",tcp_host,GetServerDescription(tcp_host).c_str());
2166 NetSendToAllExcept(tcp_host,buffer);
2169 // Send netburst now
2171 WriteOpers("Sending my netburst to %s",tcp_host);
2172 DoSync(source,tcp_host);
2173 WriteOpers("Send of netburst to %s completed",tcp_host);
2174 NetSendMyRoutingTable();
2178 WriteOpers("WARNING! Unknown datagram type '%c'",token);
2184 void handle_link_packet(char* udp_msg, char* tcp_host, serverrec *serv)
2186 if ((!strncmp(udp_msg,"USER ",5)) || (!strncmp(udp_msg,"NICK ",5)))
2188 // a user on a server port, just close their connection.
2189 RemoveServer(tcp_host);
2193 char response[10240];
2194 char token = udp_msg[0];
2195 char* old = udp_msg;
2197 if (token == ':') // leading :servername or details - strip them off (services does this, sucky)
2199 char* src = udp_msg+1;
2200 while (udp_msg[0] != ' ')
2204 char* comd = udp_msg;
2205 while (udp_msg[0] != ' ')
2210 char source[MAXBUF];
2211 char command[MAXBUF];
2212 strcpy(data,udp_msg);
2214 strcpy(command,comd);
2218 // :services-dev.chatspike.net 433 Craig Craig :Nickname is registered to someone else
2219 if (!strcmp(command,"433"))
2223 if (!strcmp(command,"NOTICE"))
2225 snprintf(udp_msg,MAXBUF,"V %s %s",source,data);
2226 log(DEBUG,"Rewrote NOTICE from services to: '%s'",udp_msg);
2229 if (!strcmp(command,"QUIT"))
2231 if ((!udp_msg) || (!strcmp(data,"")) || (strcmp(data,":")))
2233 strcpy(data,":No reason");
2235 if (!strcmp(data,":"))
2237 strcpy(data,":No reason");
2239 snprintf(udp_msg,MAXBUF,"Q %s %s",source,data);
2240 log(DEBUG,"Rewrote QUIT from services to: '%s'",udp_msg);
2243 if (!strcmp(command,"SQUIT"))
2245 snprintf(udp_msg,MAXBUF,"& %s",source);
2246 log(DEBUG,"Rewrote SQUIT from services to: '%s'",udp_msg);
2249 if (!strcmp(command,"SVSMODE"))
2251 snprintf(udp_msg,MAXBUF,"M %s",data);
2252 log(DEBUG,"Rewrote SVSMODE from services to: '%s'",udp_msg);
2255 if (!strcmp(command,"SVS2MODE"))
2257 snprintf(udp_msg,MAXBUF,"M %s",data);
2258 log(DEBUG,"Rewrote SVSMODE from services to: '%s'",udp_msg);
2261 // todo: this wont work without u:lines
2262 // in give_ops etc allow nick on a u:lined serv to do just about anything
2263 if (!strcmp(command,"MODE"))
2265 snprintf(udp_msg,MAXBUF,"m %s %s",source,data);
2266 log(DEBUG,"Rewrote MODE from services to: '%s'",udp_msg);
2269 if (!strcmp(command,"KICK"))
2271 snprintf(udp_msg,MAXBUF,"k %s %s",source,data);
2272 log(DEBUG,"Rewrote KICK from services to: '%s'",udp_msg);
2275 if (!strcmp(command,"SVSJOIN"))
2277 snprintf(udp_msg,MAXBUF,"J %s %s",source,data);
2278 log(DEBUG,"Rewrote SVSJOIN from services to: '%s'",udp_msg);
2279 userrec* u = Find(source);
2282 add_channel(user,data,"",true);
2290 char* params = udp_msg + 2;
2291 char finalparam[1024];
2292 strcpy(finalparam," :xxxx");
2293 if (strstr(udp_msg," :")) {
2294 strncpy(finalparam,strstr(udp_msg," :"),1024);
2299 char* cookie = strtok(params," ");
2300 char* servername = strtok(NULL," ");
2301 char* serverdesc = finalparam+2;
2303 WriteOpers("AuthCookie CONNECT from %s (%s)",servername,tcp_host);
2305 for (int u = 0; u < auth_cookies.size(); u++)
2307 if (auth_cookies[u] == atoi(cookie))
2309 WriteOpers("Allowed cookie from %s, is now part of the mesh",servername);
2312 for (int j = 0; j < 32; j++)
2316 for (int k = 0; k < me[j]->connectors.size(); k++)
2318 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host))
2320 me[j]->connectors[k].SetServerName(servername);
2321 me[j]->connectors[k].SetDescription(serverdesc);
2322 me[j]->connectors[k].SetState(STATE_CONNECTED);
2323 NetSendMyRoutingTable();
2328 WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right now! Possible intrusion attempt!",tcp_host);
2336 // bad cookie, bad bad! go sit in the corner!
2337 WriteOpers("Bad cookie from %s!",servername);
2342 // S test.chatspike.net password portn :ChatSpike InspIRCd test server
2343 char* servername = strtok(params," ");
2344 char* password = strtok(NULL," ");
2345 char* myport = strtok(NULL," ");
2346 char* revision = strtok(NULL," ");
2347 char* serverdesc = finalparam+2;
2349 WriteOpers("CONNECT from %s (%s) (their port: %d)",servername,tcp_host,atoi(myport));
2351 ircd_connector* cn = serv->FindHost(servername);
2355 WriteOpers("CONNECT aborted: Server %s already exists from %s",servername,ServerName);
2356 char buffer[MAXBUF];
2357 sprintf(buffer,"E :Server %s already exists!",servername);
2358 serv->SendPacket(buffer,tcp_host);
2359 RemoveServer(tcp_host);
2363 if (atoi(revision) != GetRevision())
2365 WriteOpers("CONNECT aborted: Could not link to %s, is an incompatible version %s, our version is %d",servername,revision,GetRevision());
2366 char buffer[MAXBUF];
2367 sprintf(buffer,"E :Version number mismatch");
2368 serv->SendPacket(buffer,tcp_host);
2369 RemoveServer(tcp_host);
2370 RemoveServer(servername);
2374 for (int j = 0; j < serv->connectors.size(); j++)
2376 if (!strcasecmp(serv->connectors[j].GetServerName().c_str(),tcp_host))
2378 serv->connectors[j].SetServerName(servername);
2379 serv->connectors[j].SetDescription(serverdesc);
2380 serv->connectors[j].SetServerPort(atoi(myport));
2385 char Link_ServerName[1024];
2386 char Link_IPAddr[1024];
2387 char Link_Port[1024];
2388 char Link_Pass[1024];
2389 char Link_SendPass[1024];
2392 // search for a corresponding <link> block in the config files
2393 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
2395 ConfValue("link","name",i,Link_ServerName,&config_f);
2396 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
2397 ConfValue("link","port",i,Link_Port,&config_f);
2398 ConfValue("link","recvpass",i,Link_Pass,&config_f);
2399 ConfValue("link","sendpass",i,Link_SendPass,&config_f);
2400 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
2401 LinkPort = atoi(Link_Port);
2402 if (!strcasecmp(Link_ServerName,servername))
2404 // we have a matching link line -
2405 // send a 'diminutive' server message back...
2406 snprintf(response,10240,"s %s %s :%s",ServerName,Link_SendPass,ServerDesc);
2407 serv->SendPacket(response,servername);
2409 for (int t = 0; t < serv->connectors.size(); t++)
2411 if (!strcasecmp(serv->connectors[t].GetServerName().c_str(),servername))
2413 serv->connectors[t].SetState(STATE_CONNECTED);
2420 char buffer[MAXBUF];
2421 sprintf(buffer,"E :Access is denied (no matching link block)");
2422 serv->SendPacket(buffer,tcp_host);
2423 WriteOpers("CONNECT from %s denied, no matching link block",servername);
2424 RemoveServer(tcp_host);
2425 RemoveServer(servername);
2430 // S test.chatspike.net password :ChatSpike InspIRCd test server
2431 char* servername = strtok(params," ");
2432 char* password = strtok(NULL," ");
2433 char* serverdesc = finalparam+2;
2435 // TODO: we should do a check here to ensure that this server is one we recently initiated a
2436 // link with, and didnt hear an 's' or 'E' back from yet (these are the only two valid responses
2437 // to an 'S' command. If we didn't recently send an 'S' to this server, theyre trying to spoof
2438 // a connect, so put out an oper alert!
2440 // for now, just accept all, we'll fix that later.
2441 WriteOpers("%s accepted our link credentials ",servername);
2443 char Link_ServerName[1024];
2444 char Link_IPAddr[1024];
2445 char Link_Port[1024];
2446 char Link_Pass[1024];
2447 char Link_SendPass[1024];
2450 // search for a corresponding <link> block in the config files
2451 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
2453 ConfValue("link","name",i,Link_ServerName,&config_f);
2454 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
2455 ConfValue("link","port",i,Link_Port,&config_f);
2456 ConfValue("link","recvpass",i,Link_Pass,&config_f);
2457 ConfValue("link","sendpass",i,Link_SendPass,&config_f);
2458 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
2459 LinkPort = atoi(Link_Port);
2460 if (!strcasecmp(Link_ServerName,servername))
2462 // matching link at this end too, we're all done!
2463 // at this point we must begin key exchange and insert this
2464 // server into our 'active' table.
2465 for (int j = 0; j < 32; j++)
2469 for (int k = 0; k < me[j]->connectors.size(); k++)
2471 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host))
2473 char buffer[MAXBUF];
2474 me[j]->connectors[k].SetDescription(serverdesc);
2475 me[j]->connectors[k].SetState(STATE_CONNECTED);
2476 sprintf(buffer,"X 0");
2477 serv->SendPacket(buffer,tcp_host);
2478 DoSync(me[j],tcp_host);
2479 NetSendMyRoutingTable();
2484 WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right noe! Possible intrusion attempt!",tcp_host);
2489 log(DEBUG,"Server names '%s' and '%s' don't match",Link_ServerName,servername);
2492 char buffer[MAXBUF];
2493 sprintf(buffer,"E :Access is denied (no matching link block)");
2494 serv->SendPacket(buffer,tcp_host);
2495 WriteOpers("CONNECT from %s denied, no matching link block",servername);
2496 RemoveServer(tcp_host);
2497 RemoveServer(servername);
2502 // U services.chatspike.net password :ChatSpike Services
2504 // non-meshed link, used by services. Everything coming from a non-meshed link is auto broadcasted.
2505 char* servername = strtok(params," ");
2506 char* password = strtok(NULL," ");
2507 char* serverdesc = finalparam+2;
2509 char Link_ServerName[1024];
2510 char Link_IPAddr[1024];
2511 char Link_Port[1024];
2512 char Link_Pass[1024];
2513 char Link_SendPass[1024];
2516 // search for a corresponding <link> block in the config files
2517 for (int i = 0; i < ConfValueEnum("link",&config_f); i++)
2519 ConfValue("link","name",i,Link_ServerName,&config_f);
2520 ConfValue("link","ipaddr",i,Link_IPAddr,&config_f);
2521 ConfValue("link","port",i,Link_Port,&config_f);
2522 ConfValue("link","recvpass",i,Link_Pass,&config_f);
2523 ConfValue("link","sendpass",i,Link_SendPass,&config_f);
2524 log(DEBUG,"(%d) Comparing against name='%s', ipaddr='%s', port='%s', recvpass='%s'",i,Link_ServerName,Link_IPAddr,Link_Port,Link_Pass);
2525 LinkPort = atoi(Link_Port);
2526 if (!strcasecmp(Link_ServerName,servername))
2528 // matching link at this end too, we're all done!
2529 // at this point we must begin key exchange and insert this
2530 // server into our 'active' table.
2531 for (int j = 0; j < 32; j++)
2535 for (int k = 0; k < me[j]->connectors.size(); k++)
2537 if (!strcasecmp(me[j]->connectors[k].GetServerName().c_str(),tcp_host))
2539 char buffer[MAXBUF];
2540 me[j]->connectors[k].SetDescription(serverdesc);
2541 me[j]->connectors[k].SetServerName(servername);
2542 me[j]->connectors[k].SetState(STATE_SERVICES);
2543 sprintf(buffer,"X 0");
2544 serv->SendPacket(buffer,servername);
2545 DoSync(me[j],servername);
2546 NetSendMyRoutingTable();
2547 sprintf(buffer,"H %s",servername);
2548 NetSendToAllExcept(servername,buffer);
2553 WriteOpers("\2WARNING!\2 %s sent us an authentication packet but we are not authenticating with this server right noe! Possible intrusion attempt!",tcp_host);
2558 log(DEBUG,"Server names '%s' and '%s' don't match",Link_ServerName,servername);
2561 char buffer[MAXBUF];
2562 sprintf(buffer,"E :Access is denied (no matching link block)");
2563 serv->SendPacket(buffer,tcp_host);
2564 WriteOpers("CONNECT from %s denied, no matching link block",servername);
2565 RemoveServer(tcp_host);
2566 RemoveServer(servername);
2571 char* error_message = finalparam+2;
2572 WriteOpers("ERROR from %s: %s",tcp_host,error_message);
2577 serverrec* source_server = NULL;
2579 for (int j = 0; j < 32; j++)
2583 for (int x = 0; x < me[j]->connectors.size(); x++)
2585 log(DEBUG,"Servers are: '%s' '%s'",tcp_host,me[j]->connectors[x].GetServerName().c_str());
2586 if (!strcasecmp(me[j]->connectors[x].GetServerName().c_str(),tcp_host))
2588 if ((me[j]->connectors[x].GetState() == STATE_CONNECTED) || (me[j]->connectors[x].GetState() == STATE_SERVICES))
2590 // found a valid ircd_connector.
2591 process_restricted_commands(token,params,me[j],serv,tcp_host,me[j]->connectors[x].GetServerIP(),me[j]->connectors[x].GetServerPort());
2599 log(DEBUG,"Unrecognised token or unauthenticated host in datagram from %s: %c",tcp_host,token);