1 /* +------------------------------------+
2 * | Inspire Internet Relay Chat Daemon |
3 * +------------------------------------+
5 * InspIRCd: (C) 2002-2007 InspIRCd Development Team
6 * See: http://www.inspircd.org/wiki/index.php/Credits
8 * This program is free but copyrighted software; see
9 * the file COPYING for details.
11 * ---------------------------------------------------
15 #include "commands/cmd_whois.h"
16 #include "commands/cmd_stats.h"
20 #include "transport.h"
22 #include "socketengine.h"
24 #include "m_spanningtree/main.h"
25 #include "m_spanningtree/utils.h"
26 #include "m_spanningtree/treeserver.h"
27 #include "m_spanningtree/link.h"
28 #include "m_spanningtree/treesocket.h"
29 #include "m_spanningtree/resolvers.h"
30 #include "m_spanningtree/handshaketimer.h"
32 /* $ModDep: m_spanningtree/timesynctimer.h m_spanningtree/resolvers.h m_spanningtree/main.h m_spanningtree/utils.h m_spanningtree/treeserver.h m_spanningtree/link.h m_spanningtree/treesocket.h m_hash.h */
35 /** Because most of the I/O gubbins are encapsulated within
36 * InspSocket, we just call the superclass constructor for
37 * most of the action, and append a few of our own values
40 TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, std::string host, int port, bool listening, unsigned long maxtime, Module* HookMod)
41 : InspSocket(SI, host, port, listening, maxtime), Utils(Util), Hook(HookMod)
44 this->LinkState = LISTENER;
45 theirchallenge.clear();
47 if (listening && Hook)
48 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
51 TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, std::string host, int port, bool listening, unsigned long maxtime, const std::string &ServerName, const std::string &bindto, Module* HookMod)
52 : InspSocket(SI, host, port, listening, maxtime, bindto), Utils(Util), Hook(HookMod)
55 theirchallenge.clear();
57 this->LinkState = CONNECTING;
59 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
62 /** When a listening socket gives us a new file descriptor,
63 * we must associate it with a socket without creating a new
64 * connection. This constructor is used for this purpose.
66 TreeSocket::TreeSocket(SpanningTreeUtilities* Util, InspIRCd* SI, int newfd, char* ip, Module* HookMod)
67 : InspSocket(SI, newfd, ip), Utils(Util), Hook(HookMod)
69 this->LinkState = WAIT_AUTH_1;
70 theirchallenge.clear();
73 /* If we have a transport module hooked to the parent, hook the same module to this
74 * socket, and set a timer waiting for handshake before we send CAPAB etc.
77 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
79 Instance->Timers->AddTimer(new HandshakeTimer(Instance, this, &(Utils->LinkBlocks[0]), this->Utils, 1));
82 ServerState TreeSocket::GetLinkState()
84 return this->LinkState;
87 Module* TreeSocket::GetHook()
92 TreeSocket::~TreeSocket()
95 InspSocketUnhookRequest(this, (Module*)Utils->Creator, Hook).Send();
97 Utils->DelBurstingServer(this);
100 const std::string& TreeSocket::GetOurChallenge()
102 return this->ourchallenge;
105 void TreeSocket::SetOurChallenge(const std::string &c)
107 this->ourchallenge = c;
110 const std::string& TreeSocket::GetTheirChallenge()
112 return this->theirchallenge;
115 void TreeSocket::SetTheirChallenge(const std::string &c)
117 this->theirchallenge = c;
120 std::string TreeSocket::MakePass(const std::string &password, const std::string &challenge)
122 /* This is a simple (maybe a bit hacky?) HMAC algorithm, thanks to jilles for
123 * suggesting the use of HMAC to secure the password against various attacks.
125 * Note: If m_sha256.so is not loaded, we MUST fall back to plaintext with no
126 * HMAC challenge/response.
128 Module* sha256 = Instance->FindModule("m_sha256.so");
129 if (Utils->ChallengeResponse && sha256 && !challenge.empty())
131 /* XXX: This is how HMAC is supposed to be done:
133 * sha256( (pass xor 0x5c) + sha256((pass xor 0x36) + m) )
135 * Note that we are encoding the hex hash, not the binary
136 * output of the hash which is slightly different to standard.
138 * Don't ask me why its always 0x5c and 0x36... it just is.
140 std::string hmac1, hmac2;
142 for (size_t n = 0; n < password.length(); n++)
144 hmac1 += static_cast<char>(password[n] ^ 0x5C);
145 hmac2 += static_cast<char>(password[n] ^ 0x36);
149 HashResetRequest(Utils->Creator, sha256).Send();
150 hmac2 = HashSumRequest(Utils->Creator, sha256, hmac2).Send();
152 HashResetRequest(Utils->Creator, sha256).Send();
153 std::string hmac = hmac1 + hmac2;
154 hmac = HashSumRequest(Utils->Creator, sha256, hmac).Send();
156 return "HMAC-SHA256:"+ hmac;
158 else if (!challenge.empty() && !sha256)
159 Instance->Log(DEFAULT,"Not authenticating to server using SHA256/HMAC because we don't have m_sha256 loaded!");
164 /** When an outbound connection finishes connecting, we receive
165 * this event, and must send our SERVER string to the other
166 * side. If the other side is happy, as outlined in the server
167 * to server docs on the inspircd.org site, the other side
168 * will then send back its own server string.
170 bool TreeSocket::OnConnected()
172 if (this->LinkState == CONNECTING)
174 /* we do not need to change state here. */
175 for (std::vector<Link>::iterator x = Utils->LinkBlocks.begin(); x < Utils->LinkBlocks.end(); x++)
177 if (x->Name == this->myhost)
179 Utils->Creator->RemoteMessage(NULL,"Connection to \2%s\2[%s] started.", myhost.c_str(), (x->HiddenFromStats ? "<hidden>" : this->GetIP().c_str()));
182 InspSocketHookRequest(this, (Module*)Utils->Creator, Hook).Send();
183 Utils->Creator->RemoteMessage(NULL,"Connection to \2%s\2[%s] using transport \2%s\2", myhost.c_str(), (x->HiddenFromStats ? "<hidden>" : this->GetIP().c_str()),
186 this->OutboundPass = x->SendPass;
189 /* found who we're supposed to be connecting to, send the neccessary gubbins. */
191 Instance->Timers->AddTimer(new HandshakeTimer(Instance, this, &(*x), this->Utils, 1));
193 this->SendCapabilities();
199 /* There is a (remote) chance that between the /CONNECT and the connection
200 * being accepted, some muppet has removed the <link> block and rehashed.
201 * If that happens the connection hangs here until it's closed. Unlikely
202 * and rather harmless.
204 this->Utils->Creator->RemoteMessage(NULL,"Connection to \2%s\2 lost link tag(!)", myhost.c_str());
208 void TreeSocket::OnError(InspSocketError e)
212 if (this->LinkState == LISTENER)
218 Utils->Creator->RemoteMessage(NULL,"Connection failed: Connection to \002%s\002 refused", myhost.c_str());
219 MyLink = Utils->FindLink(myhost);
221 Utils->DoFailOver(MyLink);
224 Utils->Creator->RemoteMessage(NULL,"Connection failed: Could not create socket");
227 Utils->Creator->RemoteMessage(NULL,"Connection failed: Error binding socket to address or port");
230 Utils->Creator->RemoteMessage(NULL,"Connection failed: I/O error on connection");
232 case I_ERR_NOMOREFDS:
233 Utils->Creator->RemoteMessage(NULL,"Connection failed: Operating system is out of file descriptors!");
236 if ((errno) && (errno != EINPROGRESS) && (errno != EAGAIN))
237 Utils->Creator->RemoteMessage(NULL,"Connection to \002%s\002 failed with OS error: %s", myhost.c_str(), strerror(errno));
242 int TreeSocket::OnDisconnect()
244 /* For the same reason as above, we don't
245 * handle OnDisconnect()
250 /** Recursively send the server tree with distances as hops.
251 * This is used during network burst to inform the other server
252 * (and any of ITS servers too) of what servers we know about.
253 * If at any point any of these servers already exist on the other
254 * end, our connection may be terminated. The hopcounts given
255 * by this function are relative, this doesn't matter so long as
256 * they are all >1, as all the remote servers re-calculate them
257 * to be relative too, with themselves as hop 0.
259 void TreeSocket::SendServers(TreeServer* Current, TreeServer* s, int hops)
262 for (unsigned int q = 0; q < Current->ChildCount(); q++)
264 TreeServer* recursive_server = Current->GetChild(q);
265 if (recursive_server != s)
267 snprintf(command,1024,":%s SERVER %s * %d %s :%s",Current->GetName().c_str(),recursive_server->GetName().c_str(),hops,
268 recursive_server->GetID().c_str(),
269 recursive_server->GetDesc().c_str());
270 this->WriteLine(command);
271 this->WriteLine(":"+recursive_server->GetName()+" VERSION :"+recursive_server->GetVersion());
272 /* down to next level */
273 this->SendServers(recursive_server, s, hops+1);
278 std::string TreeSocket::MyCapabilities()
280 std::vector<std::string> modlist;
281 std::string capabilities;
282 for (int i = 0; i <= this->Instance->GetModuleCount(); i++)
284 if (this->Instance->modules[i]->GetVersion().Flags & VF_COMMON)
285 modlist.push_back(this->Instance->Config->module_names[i]);
287 sort(modlist.begin(),modlist.end());
288 for (unsigned int i = 0; i < modlist.size(); i++)
291 capabilities = capabilities + ",";
292 capabilities = capabilities + modlist[i];
297 std::string TreeSocket::RandString(unsigned int length)
299 char* randombuf = new char[length+1];
304 int fd = open("/dev/urandom", O_RDONLY, 0);
310 read(fd, randombuf, length);
316 for (unsigned int i = 0; i < length; i++)
317 randombuf[i] = rand();
320 for (unsigned int i = 0; i < length; i++)
322 char randchar = static_cast<char>((randombuf[i] & 0x7F) | 0x21);
323 out += (randchar == '=' ? '_' : randchar);
330 void TreeSocket::SendCapabilities()
336 irc::commasepstream modulelist(MyCapabilities());
337 this->WriteLine("CAPAB START");
339 /* Send module names, split at 509 length */
341 std::string line = "CAPAB MODULES ";
342 while (modulelist.GetToken(item))
344 if (line.length() + item.length() + 1 > 509)
346 this->WriteLine(line);
347 line = "CAPAB MODULES ";
350 if (line != "CAPAB MODULES ")
355 if (line != "CAPAB MODULES ")
356 this->WriteLine(line);
363 #ifdef SUPPORT_IP6LINKS
367 /* Do we have sha256 available? If so, we send a challenge */
368 if (Utils->ChallengeResponse && (Instance->FindModule("m_sha256.so")))
370 this->SetOurChallenge(RandString(20));
371 extra = " CHALLENGE=" + this->GetOurChallenge();
374 this->WriteLine("CAPAB CAPABILITIES :NICKMAX="+ConvToStr(NICKMAX)+" HALFOP="+ConvToStr(this->Instance->Config->AllowHalfop)+" CHANMAX="+ConvToStr(CHANMAX)+" MAXMODES="+ConvToStr(MAXMODES)+" IDENTMAX="+ConvToStr(IDENTMAX)+" MAXQUIT="+ConvToStr(MAXQUIT)+" MAXTOPIC="+ConvToStr(MAXTOPIC)+" MAXKICK="+ConvToStr(MAXKICK)+" MAXGECOS="+ConvToStr(MAXGECOS)+" MAXAWAY="+ConvToStr(MAXAWAY)+" IP6NATIVE="+ConvToStr(ip6)+" IP6SUPPORT="+ConvToStr(ip6support)+" PROTOCOL="+ConvToStr(ProtocolVersion)+extra+" PREFIX="+Instance->Modes->BuildPrefixes()+" CHANMODES="+Instance->Modes->ChanModes());
376 this->WriteLine("CAPAB END");
379 /* Check a comma seperated list for an item */
380 bool TreeSocket::HasItem(const std::string &list, const std::string &item)
382 irc::commasepstream seplist(list);
385 while (seplist.GetToken(item2))
393 /* Isolate and return the elements that are different between two comma seperated lists */
394 std::string TreeSocket::ListDifference(const std::string &one, const std::string &two)
396 irc::commasepstream list_one(one);
399 while (list_one.GetToken(item))
401 if (!HasItem(two, item))
410 void TreeSocket::SendError(const std::string &errormessage)
412 /* Display the error locally as well as sending it remotely */
413 this->WriteLine("ERROR :"+errormessage);
414 Utils->Creator->RemoteMessage(NULL, "Sent \2ERROR\2 to %s: %s", (this->InboundServerName.empty() ? "<unknown>" : this->InboundServerName.c_str()), errormessage.c_str());
415 /* One last attempt to make sure the error reaches its target */
416 this->FlushWriteBuffer();
419 bool TreeSocket::Capab(const std::deque<std::string> ¶ms)
421 if (params.size() < 1)
423 this->SendError("Invalid number of parameters for CAPAB - Mismatched version");
426 if (params[0] == "START")
428 this->ModuleList.clear();
429 this->CapKeys.clear();
431 else if (params[0] == "END")
435 OurSID += (char)((Instance->Config->sid / 100) + 48);
436 OurSID += (char)((Instance->Config->sid / 10) % 10 + 48);
437 OurSID += (char)(Instance->Config->sid % 10 + 48);
441 #ifdef SUPPORT_IP6LINKS
444 /* Compare ModuleList and check CapKeys...
445 * Maybe this could be tidier? -- Brain
447 if ((this->ModuleList != this->MyCapabilities()) && (this->ModuleList.length()))
449 std::string diff = ListDifference(this->ModuleList, this->MyCapabilities());
452 diff = "your server:" + ListDifference(this->MyCapabilities(), this->ModuleList);
456 diff = "this server:" + diff;
458 if (diff.length() == 12)
459 reason = "Module list in CAPAB is not alphabetically ordered, cannot compare lists.";
461 reason = "Modules loaded on these servers are not correctly matched, these modules are not loaded on " + diff;
464 cap_validation valid_capab[] = {
465 {"Maximum nickname lengths differ or remote nickname length not specified", "NICKMAX", NICKMAX},
466 {"Maximum ident lengths differ or remote ident length not specified", "IDENTMAX", IDENTMAX},
467 {"Maximum channel lengths differ or remote channel length not specified", "CHANMAX", CHANMAX},
468 {"Maximum modes per line differ or remote modes per line not specified", "MAXMODES", MAXMODES},
469 {"Maximum quit lengths differ or remote quit length not specified", "MAXQUIT", MAXQUIT},
470 {"Maximum topic lengths differ or remote topic length not specified", "MAXTOPIC", MAXTOPIC},
471 {"Maximum kick lengths differ or remote kick length not specified", "MAXKICK", MAXKICK},
472 {"Maximum GECOS (fullname) lengths differ or remote GECOS length not specified", "MAXGECOS", MAXGECOS},
473 {"Maximum awaymessage lengths differ or remote awaymessage length not specified", "MAXAWAY", MAXAWAY},
477 if (((this->CapKeys.find("IP6SUPPORT") == this->CapKeys.end()) && (ip6support)) || ((this->CapKeys.find("IP6SUPPORT") != this->CapKeys.end()) && (this->CapKeys.find("IP6SUPPORT")->second != ConvToStr(ip6support))))
478 reason = "We don't both support linking to IPV6 servers";
479 if (((this->CapKeys.find("IP6NATIVE") != this->CapKeys.end()) && (this->CapKeys.find("IP6NATIVE")->second == "1")) && (!ip6support))
480 reason = "The remote server is IPV6 native, and we don't support linking to IPV6 servers";
481 if (((this->CapKeys.find("PROTOCOL") == this->CapKeys.end()) || ((this->CapKeys.find("PROTOCOL") != this->CapKeys.end()) && (this->CapKeys.find("PROTOCOL")->second != ConvToStr(ProtocolVersion)))))
483 if (this->CapKeys.find("PROTOCOL") != this->CapKeys.end())
484 reason = "Mismatched protocol versions "+this->CapKeys.find("PROTOCOL")->second+" and "+ConvToStr(ProtocolVersion);
486 reason = "Protocol version not specified";
489 if(this->CapKeys.find("PREFIX") != this->CapKeys.end() && this->CapKeys.find("PREFIX")->second != this->Instance->Modes->BuildPrefixes())
490 reason = "One or more of the prefixes on the remote server are invalid on this server.";
492 if (((this->CapKeys.find("HALFOP") == this->CapKeys.end()) && (Instance->Config->AllowHalfop)) || ((this->CapKeys.find("HALFOP") != this->CapKeys.end()) && (this->CapKeys.find("HALFOP")->second != ConvToStr(Instance->Config->AllowHalfop))))
493 reason = "We don't both have halfop support enabled/disabled identically";
495 for (int x = 0; valid_capab[x].size; ++x)
497 if (((this->CapKeys.find(valid_capab[x].key) == this->CapKeys.end()) || ((this->CapKeys.find(valid_capab[x].key) != this->CapKeys.end()) &&
498 (this->CapKeys.find(valid_capab[x].key)->second != ConvToStr(valid_capab[x].size)))))
499 reason = valid_capab[x].reason;
502 /* Challenge response, store their challenge for our password */
503 std::map<std::string,std::string>::iterator n = this->CapKeys.find("CHALLENGE");
504 if (Utils->ChallengeResponse && (n != this->CapKeys.end()) && (Instance->FindModule("m_sha256.so")))
506 /* Challenge-response is on now */
507 this->SetTheirChallenge(n->second);
508 if (!this->GetTheirChallenge().empty() && (this->LinkState == CONNECTING))
510 this->WriteLine(std::string("SERVER ")+this->Instance->Config->ServerName+" "+this->MakePass(OutboundPass, this->GetTheirChallenge())+" 0 "+
511 OurSID+" :"+this->Instance->Config->ServerDesc);
516 /* They didnt specify a challenge or we don't have m_sha256.so, we use plaintext */
517 if (this->LinkState == CONNECTING)
518 this->WriteLine(std::string("SERVER ")+this->Instance->Config->ServerName+" "+OutboundPass+" 0 "+OurSID+" :"+this->Instance->Config->ServerDesc);
523 this->SendError("CAPAB negotiation failed: "+reason);
527 else if ((params[0] == "MODULES") && (params.size() == 2))
529 if (!this->ModuleList.length())
531 this->ModuleList.append(params[1]);
535 this->ModuleList.append(",");
536 this->ModuleList.append(params[1]);
540 else if ((params[0] == "CAPABILITIES") && (params.size() == 2))
542 irc::tokenstream capabs(params[1]);
545 while ((more = capabs.GetToken(item)))
547 /* Process each key/value pair */
548 std::string::size_type equals = item.rfind('=');
549 if (equals != std::string::npos)
551 std::string var = item.substr(0, equals);
552 std::string value = item.substr(equals+1, item.length());
553 CapKeys[var] = value;
560 /** This function forces this server to quit, removing this server
561 * and any users on it (and servers and users below that, etc etc).
562 * It's very slow and pretty clunky, but luckily unless your network
563 * is having a REAL bad hair day, this function shouldnt be called
564 * too many times a month ;-)
566 void TreeSocket::SquitServer(std::string &from, TreeServer* Current)
568 /* recursively squit the servers attached to 'Current'.
569 * We're going backwards so we don't remove users
570 * while we still need them ;)
572 for (unsigned int q = 0; q < Current->ChildCount(); q++)
574 TreeServer* recursive_server = Current->GetChild(q);
575 this->SquitServer(from,recursive_server);
577 /* Now we've whacked the kids, whack self */
579 num_lost_users += Current->QuitUsers(from);
582 /** This is a wrapper function for SquitServer above, which
583 * does some validation first and passes on the SQUIT to all
584 * other remaining servers.
586 void TreeSocket::Squit(TreeServer* Current, const std::string &reason)
588 if ((Current) && (Current != Utils->TreeRoot))
590 Event rmode((char*)Current->GetName().c_str(), (Module*)Utils->Creator, "lost_server");
591 rmode.Send(Instance);
593 std::deque<std::string> params;
594 params.push_back(Current->GetName());
595 params.push_back(":"+reason);
596 Utils->DoOneToAllButSender(Current->GetParent()->GetName(),"SQUIT",params,Current->GetName());
597 if (Current->GetParent() == Utils->TreeRoot)
599 this->Instance->SNO->WriteToSnoMask('l',"Server \002"+Current->GetName()+"\002 split: "+reason);
603 this->Instance->SNO->WriteToSnoMask('l',"Server \002"+Current->GetName()+"\002 split from server \002"+Current->GetParent()->GetName()+"\002 with reason: "+reason);
605 num_lost_servers = 0;
607 std::string from = Current->GetParent()->GetName()+" "+Current->GetName();
608 SquitServer(from, Current);
610 Current->GetParent()->DelChild(Current);
612 this->Instance->SNO->WriteToSnoMask('l',"Netsplit complete, lost \002%d\002 users on \002%d\002 servers.", num_lost_users, num_lost_servers);
615 Instance->Log(DEFAULT,"Squit from unknown server");
618 /** FMODE command - server mode with timestamp checks */
619 bool TreeSocket::ForceMode(const std::string &source, std::deque<std::string> ¶ms)
621 /* Chances are this is a 1.0 FMODE without TS */
622 if (params.size() < 3)
624 /* No modes were in the command, probably a channel with no modes set on it */
629 std::string sourceserv;
630 /* Are we dealing with an FMODE from a user, or from a server? */
631 userrec* who = this->Instance->FindNick(source);
634 /* FMODE from a user, set sourceserv to the users server name */
635 sourceserv = who->server;
639 /* FMODE from a server, use a fake user to receive mode feedback */
640 who = this->Instance->FakeClient;
641 smode = true; /* Setting this flag tells us we should free the userrec later */
642 sourceserv = source; /* Set sourceserv to the actual source string */
644 const char* modelist[64];
647 memset(&modelist,0,sizeof(modelist));
648 for (unsigned int q = 0; (q < params.size()) && (q < 64); q++)
652 /* The timestamp is in this position.
653 * We don't want to pass that up to the
654 * server->client protocol!
656 TS = atoi(params[q].c_str());
660 /* Everything else is fine to append to the modelist */
661 modelist[n++] = params[q].c_str();
665 /* Extract the TS value of the object, either userrec or chanrec */
666 userrec* dst = this->Instance->FindNick(params[0]);
667 chanrec* chan = NULL;
675 chan = this->Instance->FindChan(params[0]);
681 /* Oops, channel doesnt exist! */
687 Instance->Log(DEFAULT,"*** BUG? *** TS of 0 sent to FMODE. Are some services authors smoking craq, or is it 1970 again?. Dropped.");
688 Instance->SNO->WriteToSnoMask('d', "WARNING: The server %s is sending FMODE with a TS of zero. Total craq. Mode was dropped.", sourceserv.c_str());
692 /* TS is equal or less: Merge the mode changes into ours and pass on.
696 if ((TS < ourTS) && (!dst))
697 Instance->Log(DEFAULT,"*** BUG *** Channel TS sent in FMODE to %s is %lu which is not equal to %lu!", params[0].c_str(), TS, ourTS);
701 this->Instance->SendMode(modelist, n, who);
705 this->Instance->CallCommandHandler("MODE", modelist, n, who);
707 /* HOT POTATO! PASS IT ON! */
708 Utils->DoOneToAllButSender(source,"FMODE",params,sourceserv);
710 /* If the TS is greater than ours, we drop the mode and dont pass it anywhere.
715 /** FTOPIC command */
716 bool TreeSocket::ForceTopic(const std::string &source, std::deque<std::string> ¶ms)
718 if (params.size() != 4)
720 time_t ts = atoi(params[1].c_str());
721 std::string nsource = source;
722 chanrec* c = this->Instance->FindChan(params[0]);
725 if ((ts >= c->topicset) || (!*c->topic))
727 std::string oldtopic = c->topic;
728 strlcpy(c->topic,params[3].c_str(),MAXTOPIC);
729 strlcpy(c->setby,params[2].c_str(),127);
731 /* if the topic text is the same as the current topic,
732 * dont bother to send the TOPIC command out, just silently
733 * update the set time and set nick.
735 if (oldtopic != params[3])
737 userrec* user = this->Instance->FindNick(source);
740 c->WriteChannelWithServ(Instance->Config->ServerName, "TOPIC %s :%s", c->name, c->topic);
744 c->WriteChannel(user, "TOPIC %s :%s", c->name, c->topic);
745 nsource = user->server;
747 /* all done, send it on its way */
748 params[3] = ":" + params[3];
749 Utils->DoOneToAllButSender(source,"FTOPIC",params,nsource);
757 /** FJOIN, similar to TS6 SJOIN, but not quite. */
758 bool TreeSocket::ForceJoin(const std::string &source, std::deque<std::string> ¶ms)
760 /* 1.1 FJOIN works as follows:
762 * Each FJOIN is sent along with a timestamp, and the side with the lowest
763 * timestamp 'wins'. From this point on we will refer to this side as the
764 * winner. The side with the higher timestamp loses, from this point on we
765 * will call this side the loser or losing side. This should be familiar to
766 * anyone who's dealt with dreamforge or TS6 before.
768 * When two sides of a split heal and this occurs, the following things
771 * If the timestamps are exactly equal, both sides merge their privilages
772 * and users, as in InspIRCd 1.0 and ircd2.8. The channels have not been
773 * re-created during a split, this is safe to do.
775 * If the timestamps are NOT equal, the losing side removes all of its
776 * modes from the channel, before introducing new users into the channel
777 * which are listed in the FJOIN command's parameters. The losing side then
778 * LOWERS its timestamp value of the channel to match that of the winning
779 * side, and the modes of the users of the winning side are merged in with
782 * The winning side on the other hand will ignore all user modes from the
783 * losing side, so only its own modes get applied. Life is simple for those
784 * who succeed at internets. :-)
786 * NOTE: Unlike TS6 and dreamforge and other protocols which have SJOIN,
787 * FJOIN does not contain the simple-modes such as +iklmnsp. Why not,
788 * you ask? Well, quite simply because we don't need to. They'll be sent
789 * after the FJOIN by FMODE, and FMODE is timestamped, so in the event
790 * the losing side sends any modes for the channel which shouldnt win,
791 * they wont as their timestamp will be too high :-)
794 if (params.size() < 3)
797 irc::modestacker modestack(true); /* Modes to apply from the users in the user list */
798 userrec* who = NULL; /* User we are currently checking */
799 std::string channel = params[0]; /* Channel name, as a string */
800 time_t TS = atoi(params[1].c_str()); /* Timestamp given to us for remote side */
801 irc::tokenstream users(params[2]); /* Users from the user list */
802 bool apply_other_sides_modes = true; /* True if we are accepting the other side's modes */
803 chanrec* chan = this->Instance->FindChan(channel); /* The channel we're sending joins to */
804 time_t ourTS = chan ? chan->age : Instance->Time(true)+600; /* The TS of our side of the link */
805 bool created = !chan; /* True if the channel doesnt exist here yet */
806 std::string item; /* One item in the list of nicks */
808 params[2] = ":" + params[2];
809 Utils->DoOneToAllButSender(source,"FJOIN",params,source);
813 Instance->Log(DEFAULT,"*** BUG? *** TS of 0 sent to FJOIN. Are some services authors smoking craq, or is it 1970 again?. Dropped.");
814 Instance->SNO->WriteToSnoMask('d', "WARNING: The server %s is sending FJOIN with a TS of zero. Total craq. Command was dropped.", source.c_str());
818 /* If our TS is less than theirs, we dont accept their modes */
820 apply_other_sides_modes = false;
822 /* Our TS greater than theirs, clear all our modes from the channel, accept theirs. */
825 std::deque<std::string> param_list;
826 if (Utils->AnnounceTSChange && chan)
827 chan->WriteChannelWithServ(Instance->Config->ServerName, "NOTICE %s :TS for %s changed from %lu to %lu", chan->name, chan->name, ourTS, TS);
832 param_list.push_back(channel);
833 this->RemoveStatus(Instance->Config->ServerName, param_list);
837 /* Now, process every 'prefixes,nick' pair */
838 while (users.GetToken(item))
840 const char* usr = item.c_str();
843 const char* permissions = usr;
844 /* Iterate through all the prefix values, convert them from prefixes to mode letters */
846 while ((*permissions) && (*permissions != ','))
848 ModeHandler* mh = Instance->Modes->FindPrefix(*permissions);
850 modes = modes + mh->GetModeChar();
853 this->SendError(std::string("Invalid prefix '")+(*permissions)+"' in FJOIN");
859 /* Advance past the comma, to the nick */
862 /* Check the user actually exists */
863 who = this->Instance->FindUUID(usr);
866 /* Check that the user's 'direction' is correct */
867 TreeServer* route_back_again = Utils->BestRouteTo(who->server);
868 if ((!route_back_again) || (route_back_again->GetSocket() != this))
871 /* Add any permissions this user had to the mode stack */
872 for (std::string::iterator x = modes.begin(); x != modes.end(); ++x)
873 modestack.Push(*x, who->nick);
875 chanrec::JoinUser(this->Instance, who, channel.c_str(), true, "", TS);
879 Instance->Log(SPARSE,"Warning! Invalid user %s in FJOIN to channel %s IGNORED", usr, channel.c_str());
885 /* Flush mode stacker if we lost the FJOIN or had equal TS */
886 if (apply_other_sides_modes)
888 std::deque<std::string> stackresult;
889 const char* mode_junk[MAXMODES+2];
890 mode_junk[0] = channel.c_str();
892 while (modestack.GetStackedLine(stackresult))
894 for (size_t j = 0; j < stackresult.size(); j++)
896 mode_junk[j+1] = stackresult[j].c_str();
898 Instance->SendMode(mode_junk, stackresult.size() + 1, Instance->FakeClient);
906 * Yes, this function looks a little ugly.
907 * However, in some circumstances we may not have a userrec, so we need to do things this way.
908 * Returns 1 if colliding local client, 2 if colliding remote, 3 if colliding both.
909 * Sends SVSNICKs as appropriate and forces nickchanges too.
911 int TreeSocket::DoCollision(userrec *u, time_t remotets, const char *remoteident, const char *remoteip, const char *remoteuid)
914 * Under old protocol rules, we would have had to kill both clients.
915 * Really, this sucks.
916 * These days, we have UID. And, so what we do is, force nick change client(s)
917 * involved according to timestamp rules.
921 * Force nick change on OLDER timestamped client
923 * Force nick change on NEWER timestamped client
927 * This stops abusive use of collisions, simplifies problems with loops, and so on.
930 bool bChangeLocal = true;
931 bool bChangeRemote = true;
933 /* for brevity, don't use the userrec */
934 time_t localts = u->age;
935 const char *localident = u->ident;
936 const char *localip = u->GetIPString();
938 /* mmk. let's do this again. */
939 if (remotets == localts)
941 /* equal. fuck them both! do nada, let the handler at the bottom figure this out. */
945 /* fuck. now it gets complex. */
947 /* first, let's see if ident@host matches. */
948 bool SamePerson = !strcmp(localident, remoteident)
949 && !strcmp(localip, remoteip);
952 * if ident@ip is equal, and theirs is newer, or
953 * ident@ip differ, and ours is newer
955 if((SamePerson && remotets < localts) ||
956 (!SamePerson && remotets > localts))
958 /* remote needs to change */
959 bChangeLocal = false;
963 /* ours needs to change */
964 bChangeRemote = false;
971 u->ForceNickChange(u->uuid);
979 * Cheat a little here. Instead of a dedicated command to change UID,
980 * use SVSNICK and accept their client with it's UID (as we know the SVSNICK will
981 * not fail under any circumstances -- UIDs are netwide exclusive).
983 * This means that each side of a collide will generate one extra NICK back to where
984 * they have just linked (and where it got the SVSNICK from), however, it will
985 * be dropped harmlessly as it will come in as :928AAAB NICK 928AAAB, and we already
986 * have 928AAAB's nick set to that.
989 userrec *remote = this->Instance->FindUUID(remoteuid);
993 /* buh.. nick change collide. force change their nick. */
994 remote->ForceNickChange(remote->uuid);
998 /* user has not been introduced yet, just inform their server */
999 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" SVSNICK "+remoteuid+" " + remoteuid);
1009 bool TreeSocket::ParseUID(const std::string &source, std::deque<std::string> ¶ms)
1011 /** Do we have enough parameters:
1012 * UID uuid age nick host dhost ident +modestr ip.string :gecos
1014 if (params.size() != 9)
1016 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[0]+" :Invalid client introduction ("+params[0]+"?)");
1020 time_t age = ConvToInt(params[1]);
1021 const char* tempnick = params[2].c_str();
1024 /* XXX probably validate UID length too -- w00t */
1025 cmd_validation valid[] = { {"Nickname", 2, NICKMAX}, {"Hostname", 3, 64}, {"Displayed hostname", 4, 64}, {"Ident", 5, IDENTMAX}, {"GECOS", 7, MAXGECOS}, {"", 0, 0} };
1027 TreeServer* remoteserver = Utils->FindServer(source);
1031 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[0]+" :Invalid client introduction (Unknown server "+source+")");
1035 /* Check parameters for validity before introducing the client, discovered by dmb */
1038 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[0]+" :Invalid client introduction (Invalid TS?)");
1042 for (size_t x = 0; valid[x].length; ++x)
1044 if (params[valid[x].param].length() > valid[x].length)
1046 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" KILL "+params[0]+" :Invalid client introduction (" + valid[x].item + " > " + ConvToStr(valid[x].length) + ")");
1052 /* check for collision */
1053 user_hash::iterator iter = this->Instance->clientlist->find(tempnick);
1055 if (iter != this->Instance->clientlist->end())
1060 Instance->Log(DEBUG,"*** Collision on %s", tempnick);
1061 int collide = this->DoCollision(iter->second, age, params[5].c_str(), params[7].c_str(), params[0].c_str());
1065 /* remote client changed, make sure we change their nick for the hash too */
1066 tempnick = params[0].c_str();
1070 /* IMPORTANT NOTE: For remote users, we pass the UUID in the constructor. This automatically
1071 * sets it up in the UUID hash for us.
1073 userrec* _new = NULL;
1076 _new = new userrec(this->Instance, params[0]);
1078 catch (CoreException &e)
1080 /** TODO: SQUIT the server here, the remote server is fucking with us
1081 * and has sent us the same UID twice!
1084 (*(this->Instance->clientlist))[tempnick] = _new;
1085 _new->SetFd(FD_MAGIC_NUMBER);
1086 strlcpy(_new->nick, tempnick, NICKMAX - 1);
1087 strlcpy(_new->host, params[3].c_str(),64);
1088 strlcpy(_new->dhost, params[4].c_str(),64);
1089 _new->server = this->Instance->FindServerNamePtr(source.c_str());
1090 strlcpy(_new->ident, params[5].c_str(),IDENTMAX);
1091 strlcpy(_new->fullname, params[8].c_str(),MAXGECOS);
1092 _new->registered = REG_ALL;
1096 /* we need to remove the + from the modestring, so we can do our stuff */
1097 std::string::size_type pos_after_plus = params[6].find_first_not_of('+');
1098 if (pos_after_plus != std::string::npos)
1099 params[6] = params[6].substr(pos_after_plus);
1101 for (std::string::iterator v = params[6].begin(); v != params[6].end(); v++)
1103 /* For each mode thats set, increase counter */
1104 ModeHandler* mh = Instance->Modes->FindMode(*v, MODETYPE_USER);
1108 mh->OnModeChange(_new, _new, NULL, empty, true);
1109 _new->SetMode(*v, true);
1114 /* now we've done with modes processing, put the + back for remote servers */
1115 params[6] = "+" + params[6];
1117 #ifdef SUPPORT_IP6LINKS
1118 if (params[7].find_first_of(":") != std::string::npos)
1119 _new->SetSockAddr(AF_INET6, params[7].c_str(), 0);
1122 _new->SetSockAddr(AF_INET, params[7].c_str(), 0);
1124 Instance->AddGlobalClone(_new);
1126 bool dosend = !(((this->Utils->quiet_bursts) && (this->bursting || Utils->FindRemoteBurstServer(remoteserver))) || (this->Instance->SilentULine(_new->server)));
1129 this->Instance->SNO->WriteToSnoMask('C',"Client connecting at %s: %s!%s@%s [%s] [%s]",_new->server,_new->nick,_new->ident,_new->host, _new->GetIPString(), _new->fullname);
1131 params[8] = ":" + params[8];
1132 Utils->DoOneToAllButSender(source, "UID", params, source);
1134 // Increment the Source Servers User Count..
1135 TreeServer* SourceServer = Utils->FindServer(source);
1138 SourceServer->AddUserCount();
1141 FOREACH_MOD_I(Instance,I_OnPostConnect,OnPostConnect(_new));
1146 /** Send one or more FJOINs for a channel of users.
1147 * If the length of a single line is more than 480-NICKMAX
1148 * in length, it is split over multiple lines.
1150 void TreeSocket::SendFJoins(TreeServer* Current, chanrec* c)
1154 std::string individual_halfops = std::string(":")+this->Instance->Config->ServerName+" FMODE "+c->name+" "+ConvToStr(c->age);
1156 size_t dlen, curlen;
1157 dlen = curlen = snprintf(list,MAXBUF,":%s FJOIN %s %lu",this->Instance->Config->ServerName,c->name,(unsigned long)c->age);
1159 char* ptr = list + dlen;
1161 CUList *ulist = c->GetUsers();
1165 for (CUList::iterator i = ulist->begin(); i != ulist->end(); i++)
1167 // The first parameter gets a : before it
1168 size_t ptrlen = snprintf(ptr, MAXBUF, " %s%s,%s", !numusers ? ":" : "", c->GetAllPrefixChars(i->first), i->first->uuid);
1175 if (curlen > (480-NICKMAX))
1177 buffer.append(list).append("\r\n");
1178 dlen = curlen = snprintf(list,MAXBUF,":%s FJOIN %s %lu",this->Instance->Config->ServerName,c->name,(unsigned long)c->age);
1186 buffer.append(list).append("\r\n");
1188 buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(c->ChanModes(true)).append("\r\n");
1191 for (BanList::iterator b = c->bans.begin(); b != c->bans.end(); b++)
1193 int size = strlen(b->data) + 2;
1194 int currsize = linesize + size;
1195 if (currsize <= 350)
1198 params.append(" ").append(b->data);
1201 if ((params.length() >= MAXMODES) || (currsize > 350))
1203 /* Wrap at MAXMODES */
1204 buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(modes).append(params).append("\r\n");
1211 /* Only send these if there are any */
1213 buffer.append(":").append(this->Instance->Config->ServerName).append(" FMODE ").append(c->name).append(" ").append(ConvToStr(c->age)).append(" +").append(modes).append(params);
1215 this->WriteLine(buffer);
1218 /** Send G, Q, Z and E lines */
1219 void TreeSocket::SendXLines(TreeServer* Current)
1223 std::string n = this->Instance->Config->ServerName;
1224 const char* sn = n.c_str();
1225 /* Yes, these arent too nice looking, but they get the job done */
1226 for (std::vector<ZLine*>::iterator i = Instance->XLines->zlines.begin(); i != Instance->XLines->zlines.end(); i++)
1228 snprintf(data,MAXBUF,":%s ADDLINE Z %s %s %lu %lu :%s\r\n",sn,(*i)->ipaddr,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1229 buffer.append(data);
1231 for (std::vector<QLine*>::iterator i = Instance->XLines->qlines.begin(); i != Instance->XLines->qlines.end(); i++)
1233 snprintf(data,MAXBUF,":%s ADDLINE Q %s %s %lu %lu :%s\r\n",sn,(*i)->nick,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1234 buffer.append(data);
1236 for (std::vector<GLine*>::iterator i = Instance->XLines->glines.begin(); i != Instance->XLines->glines.end(); i++)
1238 snprintf(data,MAXBUF,":%s ADDLINE G %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1239 buffer.append(data);
1241 for (std::vector<ELine*>::iterator i = Instance->XLines->elines.begin(); i != Instance->XLines->elines.end(); i++)
1243 snprintf(data,MAXBUF,":%s ADDLINE E %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1244 buffer.append(data);
1246 for (std::vector<ZLine*>::iterator i = Instance->XLines->pzlines.begin(); i != Instance->XLines->pzlines.end(); i++)
1248 snprintf(data,MAXBUF,":%s ADDLINE Z %s %s %lu %lu :%s\r\n",sn,(*i)->ipaddr,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1249 buffer.append(data);
1251 for (std::vector<QLine*>::iterator i = Instance->XLines->pqlines.begin(); i != Instance->XLines->pqlines.end(); i++)
1253 snprintf(data,MAXBUF,":%s ADDLINE Q %s %s %lu %lu :%s\r\n",sn,(*i)->nick,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1254 buffer.append(data);
1256 for (std::vector<GLine*>::iterator i = Instance->XLines->pglines.begin(); i != Instance->XLines->pglines.end(); i++)
1258 snprintf(data,MAXBUF,":%s ADDLINE G %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1259 buffer.append(data);
1261 for (std::vector<ELine*>::iterator i = Instance->XLines->pelines.begin(); i != Instance->XLines->pelines.end(); i++)
1263 snprintf(data,MAXBUF,":%s ADDLINE E %s@%s %s %lu %lu :%s\r\n",sn,(*i)->identmask,(*i)->hostmask,(*i)->source,(unsigned long)(*i)->set_time,(unsigned long)(*i)->duration,(*i)->reason);
1264 buffer.append(data);
1267 if (!buffer.empty())
1268 this->WriteLine(buffer);
1271 /** Send channel modes and topics */
1272 void TreeSocket::SendChannelModes(TreeServer* Current)
1275 std::deque<std::string> list;
1276 std::string n = this->Instance->Config->ServerName;
1277 const char* sn = n.c_str();
1278 Instance->Log(DEBUG,"Sending channels and modes, %d to send", this->Instance->chanlist->size());
1279 for (chan_hash::iterator c = this->Instance->chanlist->begin(); c != this->Instance->chanlist->end(); c++)
1281 SendFJoins(Current, c->second);
1282 if (*c->second->topic)
1284 snprintf(data,MAXBUF,":%s FTOPIC %s %lu %s :%s",sn,c->second->name,(unsigned long)c->second->topicset,c->second->setby,c->second->topic);
1285 this->WriteLine(data);
1287 FOREACH_MOD_I(this->Instance,I_OnSyncChannel,OnSyncChannel(c->second,(Module*)Utils->Creator,(void*)this));
1289 c->second->GetExtList(list);
1290 for (unsigned int j = 0; j < list.size(); j++)
1292 FOREACH_MOD_I(this->Instance,I_OnSyncChannelMetaData,OnSyncChannelMetaData(c->second,(Module*)Utils->Creator,(void*)this,list[j]));
1297 /** send all users and their oper state/modes */
1298 void TreeSocket::SendUsers(TreeServer* Current)
1301 std::deque<std::string> list;
1302 std::string dataline;
1303 for (user_hash::iterator u = this->Instance->clientlist->begin(); u != this->Instance->clientlist->end(); u++)
1305 if (u->second->registered == REG_ALL)
1307 snprintf(data,MAXBUF,":%s UID %s %lu %s %s %s %s +%s %s :%s", u->second->server, u->second->uuid, (unsigned long)u->second->age,u->second->nick,u->second->host,u->second->dhost,u->second->ident,u->second->FormatModes(),u->second->GetIPString(),u->second->fullname);
1308 this->WriteLine(data);
1309 if (*u->second->oper)
1311 snprintf(data,MAXBUF,":%s OPERTYPE %s", u->second->uuid, u->second->oper);
1312 this->WriteLine(data);
1314 if (*u->second->awaymsg)
1316 snprintf(data,MAXBUF,":%s AWAY :%s", u->second->uuid, u->second->awaymsg);
1317 this->WriteLine(data);
1322 for (user_hash::iterator u = this->Instance->clientlist->begin(); u != this->Instance->clientlist->end(); u++)
1324 FOREACH_MOD_I(this->Instance,I_OnSyncUser,OnSyncUser(u->second,(Module*)Utils->Creator,(void*)this));
1326 u->second->GetExtList(list);
1327 for (unsigned int j = 0; j < list.size(); j++)
1329 FOREACH_MOD_I(this->Instance,I_OnSyncUserMetaData,OnSyncUserMetaData(u->second,(Module*)Utils->Creator,(void*)this,list[j]));
1334 /** This function is called when we want to send a netburst to a local
1335 * server. There is a set order we must do this, because for example
1336 * users require their servers to exist, and channels require their
1337 * users to exist. You get the idea.
1339 void TreeSocket::DoBurst(TreeServer* s)
1341 std::string name = s->GetName();
1342 std::string burst = "BURST "+ConvToStr(Instance->Time(true));
1343 std::string endburst = "ENDBURST";
1344 this->Instance->SNO->WriteToSnoMask('l',"Bursting to \2%s\2 (Authentication: %s).", name.c_str(), this->GetTheirChallenge().empty() ? "plaintext password" : "SHA256-HMAC challenge-response");
1345 this->WriteLine(burst);
1346 /* send our version string */
1347 this->WriteLine(std::string(":")+this->Instance->Config->ServerName+" VERSION :"+this->Instance->GetVersionString());
1348 /* Send server tree */
1349 this->SendServers(Utils->TreeRoot,s,1);
1350 /* Send users and their oper status */
1352 /* Send everything else (channel modes, xlines etc) */
1353 this->SendChannelModes(s);
1354 this->SendXLines(s);
1355 FOREACH_MOD_I(this->Instance,I_OnSyncOtherMetaData,OnSyncOtherMetaData((Module*)Utils->Creator,(void*)this));
1356 this->WriteLine(endburst);
1357 this->Instance->SNO->WriteToSnoMask('l',"Finished bursting to \2"+name+"\2.");
1360 /** This function is called when we receive data from a remote
1361 * server. We buffer the data in a std::string (it doesnt stay
1362 * there for long), reading using InspSocket::Read() which can
1363 * read up to 16 kilobytes in one operation.
1365 * IF THIS FUNCTION RETURNS FALSE, THE CORE CLOSES AND DELETES
1366 * THE SOCKET OBJECT FOR US.
1368 bool TreeSocket::OnDataReady()
1370 char* data = this->Read();
1371 /* Check that the data read is a valid pointer and it has some content */
1374 this->in_buffer.append(data);
1375 /* While there is at least one new line in the buffer,
1376 * do something useful (we hope!) with it.
1378 while (in_buffer.find("\n") != std::string::npos)
1380 std::string ret = in_buffer.substr(0,in_buffer.find("\n")-1);
1381 in_buffer = in_buffer.substr(in_buffer.find("\n")+1,in_buffer.length()-in_buffer.find("\n"));
1382 /* Use rfind here not find, as theres more
1383 * chance of the \r being near the end of the
1384 * string, not the start.
1386 if (ret.find("\r") != std::string::npos)
1387 ret = in_buffer.substr(0,in_buffer.find("\r")-1);
1388 /* Process this one, abort if it
1389 * didnt return true.
1391 if (!this->ProcessLine(ret))
1398 /* EAGAIN returns an empty but non-NULL string, so this
1399 * evaluates to TRUE for EAGAIN but to FALSE for EOF.
1401 return (data && !*data);