2 * InspIRCd -- Internet Relay Chat Daemon
4 * Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
5 * Copyright (C) 2008 Robin Burchell <robin+git@viroteck.net>
7 * This file is part of InspIRCd. InspIRCd is free software: you can
8 * redistribute it and/or modify it under the terms of the GNU General Public
9 * License as published by the Free Software Foundation, version 2.
11 * This program is distributed in the hope that it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
13 * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
16 * You should have received a copy of the GNU General Public License
17 * along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "modules/ssl.h"
27 #include "treeserver.h"
28 #include "treesocket.h"
32 * Some server somewhere in the network introducing another server.
35 CmdResult CommandServer::HandleServer(TreeServer* ParentOfThis, std::vector<std::string>& params)
37 const std::string& servername = params[0];
38 const std::string& sid = params[1];
39 const std::string& description = params.back();
40 TreeSocket* socket = ParentOfThis->GetSocket();
42 if (!InspIRCd::IsSID(sid))
44 socket->SendError("Invalid format server ID: "+sid+"!");
47 TreeServer* CheckDupe = Utils->FindServer(servername);
50 socket->SendError("Server "+servername+" already exists!");
51 ServerInstance->SNO->WriteToSnoMask('L', "Server \2"+CheckDupe->GetName()+"\2 being introduced from \2" + ParentOfThis->GetName() + "\2 denied, already exists. Closing link with " + ParentOfThis->GetName());
54 CheckDupe = Utils->FindServer(sid);
57 socket->SendError("Server ID "+sid+" already exists! You may want to specify the server ID for the server manually with <server:id> so they do not conflict.");
58 ServerInstance->SNO->WriteToSnoMask('L', "Server \2"+servername+"\2 being introduced from \2" + ParentOfThis->GetName() + "\2 denied, server ID already exists on the network. Closing link with " + ParentOfThis->GetName());
63 Link* lnk = Utils->FindLink(servername);
65 TreeServer* Node = new TreeServer(servername, description, sid, ParentOfThis, ParentOfThis->GetSocket(), lnk ? lnk->Hidden : false);
67 HandleExtra(Node, params);
69 ServerInstance->SNO->WriteToSnoMask('L', "Server \002"+ParentOfThis->GetName()+"\002 introduced server \002"+servername+"\002 ("+description+")");
73 void CommandServer::HandleExtra(TreeServer* newserver, const std::vector<std::string>& params)
75 for (std::vector<std::string>::const_iterator i = params.begin() + 2; i != params.end() - 1; ++i)
77 const std::string& prop = *i;
78 std::string::size_type p = prop.find('=');
80 std::string key = prop;
82 if (p != std::string::npos)
85 val.assign(prop, p+1, std::string::npos);
89 newserver->BeginBurst(ConvToNum<uint64_t>(val));
93 Link* TreeSocket::AuthRemote(const parameterlist& params)
95 if (params.size() < 5)
97 SendError("Protocol error - Not enough parameters for SERVER command");
101 const std::string& sname = params[0];
102 const std::string& password = params[1];
103 const std::string& sid = params[3];
104 const std::string& description = params.back();
106 this->SendCapabilities(2);
108 if (!ServerInstance->IsSID(sid))
110 this->SendError("Invalid format server ID: "+sid+"!");
114 for (std::vector<reference<Link> >::iterator i = Utils->LinkBlocks.begin(); i < Utils->LinkBlocks.end(); i++)
117 if ((!stdalgo::string::equalsci(x->Name, sname)) && (x->Name != "*")) // open link allowance
120 if (!ComparePass(*x, password))
122 ServerInstance->SNO->WriteToSnoMask('l',"Invalid password on link: %s", x->Name.c_str());
126 if (!CheckDuplicate(sname, sid))
129 ServerInstance->SNO->WriteToSnoMask('l',"Verified server connection " + linkID + " ("+description+")");
131 const SSLIOHook* const ssliohook = SSLIOHook::IsSSL(this);
134 std::string ciphersuite;
135 ssliohook->GetCiphersuite(ciphersuite);
136 ServerInstance->SNO->WriteToSnoMask('l', "Negotiated ciphersuite %s on link %s", ciphersuite.c_str(), x->Name.c_str());
142 this->SendError("Mismatched server name or password (check the other server's snomask output for details - e.g. umode +s +Ll)");
143 ServerInstance->SNO->WriteToSnoMask('l',"Server connection from \2"+sname+"\2 denied, invalid link credentials");
148 * This is used after the other side of a connection has accepted our credentials.
149 * They are then introducing themselves to us, BEFORE either of us burst. -- w
151 bool TreeSocket::Outbound_Reply_Server(parameterlist ¶ms)
153 const Link* x = AuthRemote(params);
157 * They're in WAIT_AUTH_2 (having accepted our credentials).
158 * Set our state to CONNECTED (since everything's peachy so far) and send our
159 * netburst to them, which will trigger their CONNECTED state, and BURST in reply.
161 * While we're at it, create a treeserver object so we know about them.
164 FinishAuth(params[0], params[3], params.back(), x->Hidden);
172 bool TreeSocket::CheckDuplicate(const std::string& sname, const std::string& sid)
174 // Check if the server name is not in use by a server that's already fully connected
175 TreeServer* CheckDupe = Utils->FindServer(sname);
178 std::string pname = CheckDupe->GetParent() ? CheckDupe->GetParent()->GetName() : "<ourself>";
179 SendError("Server "+sname+" already exists on server "+pname+"!");
180 ServerInstance->SNO->WriteToSnoMask('l',"Server connection from \2"+sname+"\2 denied, already exists on server "+pname);
184 // Check if the id is not in use by a server that's already fully connected
185 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Looking for dupe SID %s", sid.c_str());
186 CheckDupe = Utils->FindServerID(sid);
190 this->SendError("Server ID "+CheckDupe->GetID()+" already exists on server "+CheckDupe->GetName()+"! You may want to specify the server ID for the server manually with <server:id> so they do not conflict.");
191 ServerInstance->SNO->WriteToSnoMask('l',"Server connection from \2"+sname+"\2 denied, server ID '"+CheckDupe->GetID()+
192 "' already exists on server "+CheckDupe->GetName());
200 * Someone else is attempting to connect to us if this is called. Validate their credentials etc.
203 bool TreeSocket::Inbound_Server(parameterlist ¶ms)
205 const Link* x = AuthRemote(params);
208 // Save these for later, so when they accept our credentials (indicated by BURST) we remember them
209 this->capab->hidden = x->Hidden;
210 this->capab->sid = params[3];
211 this->capab->description = params.back();
212 this->capab->name = params[0];
214 // Send our details: Our server name and description and hopcount of 0,
215 // along with the sendpass from this block.
216 this->WriteLine("SERVER "+ServerInstance->Config->ServerName+" "+this->MakePass(x->SendPass, this->GetTheirChallenge())+" 0 "+ServerInstance->Config->GetSID()+" :"+ServerInstance->Config->ServerDesc);
218 // move to the next state, we are now waiting for THEM.
219 this->LinkState = WAIT_AUTH_2;
226 CommandServer::Builder::Builder(TreeServer* server)
227 : CmdBuilder(server->GetParent()->GetID(), "SERVER")
229 push(server->GetName());
230 push(server->GetID());
231 if (server->IsBursting())
232 push_property("burst", ConvToStr(server->StartBurst));
233 push_last(server->GetDesc());