2 * InspIRCd -- Internet Relay Chat Daemon
4 * Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
5 * Copyright (C) 2008 Robin Burchell <robin+git@viroteck.net>
7 * This file is part of InspIRCd. InspIRCd is free software: you can
8 * redistribute it and/or modify it under the terms of the GNU General Public
9 * License as published by the Free Software Foundation, version 2.
11 * This program is distributed in the hope that it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
13 * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
16 * You should have received a copy of the GNU General Public License
17 * along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "modules/ssl.h"
27 #include "treeserver.h"
28 #include "treesocket.h"
32 * Some server somewhere in the network introducing another server.
35 CmdResult CommandServer::HandleServer(TreeServer* ParentOfThis, std::vector<std::string>& params)
37 const std::string& servername = params[0];
38 const std::string& sid = params[1];
39 const std::string& description = params.back();
40 TreeSocket* socket = ParentOfThis->GetSocket();
42 if (!InspIRCd::IsSID(sid))
44 socket->SendError("Invalid format server ID: "+sid+"!");
47 TreeServer* CheckDupe = Utils->FindServer(servername);
50 socket->SendError("Server "+servername+" already exists!");
51 ServerInstance->SNO->WriteToSnoMask('L', "Server \2"+CheckDupe->GetName()+"\2 being introduced from \2" + ParentOfThis->GetName() + "\2 denied, already exists. Closing link with " + ParentOfThis->GetName());
54 CheckDupe = Utils->FindServer(sid);
57 socket->SendError("Server ID "+sid+" already exists! You may want to specify the server ID for the server manually with <server:id> so they do not conflict.");
58 ServerInstance->SNO->WriteToSnoMask('L', "Server \2"+servername+"\2 being introduced from \2" + ParentOfThis->GetName() + "\2 denied, server ID already exists on the network. Closing link with " + ParentOfThis->GetName());
63 Link* lnk = Utils->FindLink(servername);
65 TreeServer* Node = new TreeServer(servername, description, sid, ParentOfThis, ParentOfThis->GetSocket(), lnk ? lnk->Hidden : false);
67 HandleExtra(Node, params);
69 ServerInstance->SNO->WriteToSnoMask('L', "Server \002"+ParentOfThis->GetName()+"\002 introduced server \002"+servername+"\002 ("+description+")");
73 void CommandServer::HandleExtra(TreeServer* newserver, const std::vector<std::string>& params)
75 for (std::vector<std::string>::const_iterator i = params.begin() + 2; i != params.end() - 1; ++i)
77 const std::string& prop = *i;
78 std::string::size_type p = prop.find('=');
80 std::string key = prop;
82 if (p != std::string::npos)
85 val.assign(prop, p+1, std::string::npos);
89 newserver->BeginBurst(ConvToUInt64(val));
93 Link* TreeSocket::AuthRemote(const parameterlist& params)
95 if (params.size() < 5)
97 SendError("Protocol error - Not enough parameters for SERVER command");
101 irc::string servername = params[0].c_str();
102 const std::string& sname = params[0];
103 const std::string& password = params[1];
104 const std::string& sid = params[3];
105 const std::string& description = params.back();
107 this->SendCapabilities(2);
109 if (!ServerInstance->IsSID(sid))
111 this->SendError("Invalid format server ID: "+sid+"!");
115 for (std::vector<reference<Link> >::iterator i = Utils->LinkBlocks.begin(); i < Utils->LinkBlocks.end(); i++)
118 if (x->Name != servername && x->Name != "*") // open link allowance
121 if (!ComparePass(*x, password))
123 ServerInstance->SNO->WriteToSnoMask('l',"Invalid password on link: %s", x->Name.c_str());
127 if (!CheckDuplicate(sname, sid))
130 ServerInstance->SNO->WriteToSnoMask('l',"Verified server connection " + linkID + " ("+description+")");
132 const SSLIOHook* const ssliohook = SSLIOHook::IsSSL(this);
135 std::string ciphersuite;
136 ssliohook->GetCiphersuite(ciphersuite);
137 ServerInstance->SNO->WriteToSnoMask('l', "Negotiated ciphersuite %s on link %s", ciphersuite.c_str(), x->Name.c_str());
143 this->SendError("Mismatched server name or password (check the other server's snomask output for details - e.g. umode +s +Ll)");
144 ServerInstance->SNO->WriteToSnoMask('l',"Server connection from \2"+sname+"\2 denied, invalid link credentials");
149 * This is used after the other side of a connection has accepted our credentials.
150 * They are then introducing themselves to us, BEFORE either of us burst. -- w
152 bool TreeSocket::Outbound_Reply_Server(parameterlist ¶ms)
154 const Link* x = AuthRemote(params);
158 * They're in WAIT_AUTH_2 (having accepted our credentials).
159 * Set our state to CONNECTED (since everything's peachy so far) and send our
160 * netburst to them, which will trigger their CONNECTED state, and BURST in reply.
162 * While we're at it, create a treeserver object so we know about them.
165 FinishAuth(params[0], params[3], params.back(), x->Hidden);
173 bool TreeSocket::CheckDuplicate(const std::string& sname, const std::string& sid)
175 // Check if the server name is not in use by a server that's already fully connected
176 TreeServer* CheckDupe = Utils->FindServer(sname);
179 std::string pname = CheckDupe->GetParent() ? CheckDupe->GetParent()->GetName() : "<ourself>";
180 SendError("Server "+sname+" already exists on server "+pname+"!");
181 ServerInstance->SNO->WriteToSnoMask('l',"Server connection from \2"+sname+"\2 denied, already exists on server "+pname);
185 // Check if the id is not in use by a server that's already fully connected
186 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Looking for dupe SID %s", sid.c_str());
187 CheckDupe = Utils->FindServerID(sid);
191 this->SendError("Server ID "+CheckDupe->GetID()+" already exists on server "+CheckDupe->GetName()+"! You may want to specify the server ID for the server manually with <server:id> so they do not conflict.");
192 ServerInstance->SNO->WriteToSnoMask('l',"Server connection from \2"+sname+"\2 denied, server ID '"+CheckDupe->GetID()+
193 "' already exists on server "+CheckDupe->GetName());
201 * Someone else is attempting to connect to us if this is called. Validate their credentials etc.
204 bool TreeSocket::Inbound_Server(parameterlist ¶ms)
206 const Link* x = AuthRemote(params);
209 // Save these for later, so when they accept our credentials (indicated by BURST) we remember them
210 this->capab->hidden = x->Hidden;
211 this->capab->sid = params[3];
212 this->capab->description = params.back();
213 this->capab->name = params[0];
215 // Send our details: Our server name and description and hopcount of 0,
216 // along with the sendpass from this block.
217 this->WriteLine("SERVER "+ServerInstance->Config->ServerName+" "+this->MakePass(x->SendPass, this->GetTheirChallenge())+" 0 "+ServerInstance->Config->GetSID()+" :"+ServerInstance->Config->ServerDesc);
219 // move to the next state, we are now waiting for THEM.
220 this->LinkState = WAIT_AUTH_2;
227 CommandServer::Builder::Builder(TreeServer* server)
228 : CmdBuilder(server->GetParent()->GetID(), "SERVER")
230 push(server->GetName());
231 push(server->GetID());
232 if (server->IsBursting())
233 push_property("burst", ConvToStr(server->StartBurst));
234 push_last(server->GetDesc());