]> git.netwichtig.de Git - user/henk/code/inspircd.git/blob - src/modules/m_spanningtree/treesocket2.cpp
m_spanningtree Extract logic that finds the source user for an incoming command into...
[user/henk/code/inspircd.git] / src / modules / m_spanningtree / treesocket2.cpp
1 /*
2  * InspIRCd -- Internet Relay Chat Daemon
3  *
4  *   Copyright (C) 2007-2008, 2012 Robin Burchell <robin+git@viroteck.net>
5  *   Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
6  *   Copyright (C) 2007-2008 Craig Edwards <craigedwards@brainbox.cc>
7  *   Copyright (C) 2008 Pippijn van Steenhoven <pip88nl@gmail.com>
8  *   Copyright (C) 2008 Thomas Stagner <aquanight@inspircd.org>
9  *   Copyright (C) 2007 Dennis Friis <peavey@inspircd.org>
10  *
11  * This file is part of InspIRCd.  InspIRCd is free software: you can
12  * redistribute it and/or modify it under the terms of the GNU General Public
13  * License as published by the Free Software Foundation, version 2.
14  *
15  * This program is distributed in the hope that it will be useful, but WITHOUT
16  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
17  * FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
18  * details.
19  *
20  * You should have received a copy of the GNU General Public License
21  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
22  */
23
24
25 #include "inspircd.h"
26
27 #include "main.h"
28 #include "utils.h"
29 #include "treeserver.h"
30 #include "treesocket.h"
31 #include "resolvers.h"
32 #include "commands.h"
33
34 /* Handle ERROR command */
35 void TreeSocket::Error(parameterlist &params)
36 {
37         std::string msg = params.size() ? params[0] : "";
38         SetError("received ERROR " + msg);
39 }
40
41 void TreeSocket::Split(const std::string& line, std::string& prefix, std::string& command, parameterlist& params)
42 {
43         irc::tokenstream tokens(line);
44
45         if (!tokens.GetToken(prefix))
46                 return;
47
48         if (prefix[0] == ':')
49         {
50                 prefix = prefix.substr(1);
51
52                 if (prefix.empty())
53                 {
54                         this->SendError("BUG (?) Empty prefix received: " + line);
55                         return;
56                 }
57                 if (!tokens.GetToken(command))
58                 {
59                         this->SendError("BUG (?) Empty command received: " + line);
60                         return;
61                 }
62         }
63         else
64         {
65                 command = prefix;
66                 prefix.clear();
67         }
68         if (command.empty())
69                 this->SendError("BUG (?) Empty command received: " + line);
70
71         std::string param;
72         while (tokens.GetToken(param))
73         {
74                 params.push_back(param);
75         }
76 }
77
78 void TreeSocket::ProcessLine(std::string &line)
79 {
80         std::string prefix;
81         std::string command;
82         parameterlist params;
83
84         ServerInstance->Logs->Log(MODNAME, LOG_RAWIO, "S[%d] I %s", this->GetFd(), line.c_str());
85
86         Split(line, prefix, command, params);
87
88         if (command.empty())
89                 return;
90
91         switch (this->LinkState)
92         {
93                 case WAIT_AUTH_1:
94                         /*
95                          * State WAIT_AUTH_1:
96                          *  Waiting for SERVER command from remote server. Server initiating
97                          *  the connection sends the first SERVER command, listening server
98                          *  replies with theirs if its happy, then if the initiator is happy,
99                          *  it starts to send its net sync, which starts the merge, otherwise
100                          *  it sends an ERROR.
101                          */
102                         if (command == "PASS")
103                         {
104                                 /*
105                                  * Ignore this silently. Some services packages insist on sending PASS, even
106                                  * when it is not required (i.e. by us). We have to ignore this here, otherwise
107                                  * as it's an unknown command (effectively), it will cause the connection to be
108                                  * closed, which probably isn't what people want. -- w00t
109                                  */
110                         }
111                         else if (command == "SERVER")
112                         {
113                                 this->Inbound_Server(params);
114                         }
115                         else if (command == "ERROR")
116                         {
117                                 this->Error(params);
118                         }
119                         else if (command == "USER")
120                         {
121                                 this->SendError("Client connections to this port are prohibited.");
122                         }
123                         else if (command == "CAPAB")
124                         {
125                                 this->Capab(params);
126                         }
127                         else
128                         {
129                                 this->SendError("Invalid command in negotiation phase: " + command);
130                         }
131                 break;
132                 case WAIT_AUTH_2:
133                         /*
134                          * State WAIT_AUTH_2:
135                          *  We have sent SERVER to the other side of the connection. Now we're waiting for them to start BURST.
136                          *  The other option at this stage of things, of course, is for them to close our connection thanks
137                          *  to invalid credentials.. -- w
138                          */
139                         if (command == "SERVER")
140                         {
141                                 /*
142                                  * Connection is either attempting to re-auth itself (stupid) or sending netburst without sending BURST.
143                                  * Both of these aren't allowable, so block them here. -- w
144                                  */
145                                 this->SendError("You may not re-authenticate or commence netburst without sending BURST.");
146                         }
147                         else if (command == "BURST")
148                         {
149                                 if (params.size())
150                                 {
151                                         time_t them = ConvToInt(params[0]);
152                                         time_t delta = them - ServerInstance->Time();
153                                         if ((delta < -600) || (delta > 600))
154                                         {
155                                                 ServerInstance->SNO->WriteGlobalSno('l',"\2ERROR\2: Your clocks are out by %d seconds (this is more than five minutes). Link aborted, \2PLEASE SYNC YOUR CLOCKS!\2",abs((long)delta));
156                                                 SendError("Your clocks are out by "+ConvToStr(abs((long)delta))+" seconds (this is more than five minutes). Link aborted, PLEASE SYNC YOUR CLOCKS!");
157                                                 return;
158                                         }
159                                         else if ((delta < -30) || (delta > 30))
160                                         {
161                                                 ServerInstance->SNO->WriteGlobalSno('l',"\2WARNING\2: Your clocks are out by %d seconds. Please consider synching your clocks.", abs((long)delta));
162                                         }
163                                 }
164
165                                 // Check for duplicate server name/sid again, it's possible that a new
166                                 // server was introduced while we were waiting for them to send BURST.
167                                 // (we do not reserve their server name/sid when they send SERVER, we do it now)
168                                 if (!CheckDuplicate(capab->name, capab->sid))
169                                         return;
170
171                                 this->LinkState = CONNECTED;
172                                 Utils->timeoutlist.erase(this);
173
174                                 linkID = capab->name;
175
176                                 MyRoot = new TreeServer(capab->name, capab->description, capab->sid, Utils->TreeRoot, this, capab->hidden);
177                                 Utils->TreeRoot->AddChild(MyRoot);
178
179                                 MyRoot->bursting = true;
180                                 this->DoBurst(MyRoot);
181
182                                 CommandServer::Builder(MyRoot).Forward(MyRoot);
183                                 CmdBuilder(MyRoot->GetID(), "BURST").insert(params).Forward(MyRoot);
184                         }
185                         else if (command == "ERROR")
186                         {
187                                 this->Error(params);
188                         }
189                         else if (command == "CAPAB")
190                         {
191                                 this->Capab(params);
192                         }
193
194                 break;
195                 case CONNECTING:
196                         /*
197                          * State CONNECTING:
198                          *  We're connecting (OUTGOING) to another server. They are in state WAIT_AUTH_1 until they verify
199                          *  our credentials, when they proceed into WAIT_AUTH_2 and send SERVER to us. We then send BURST
200                          *  + our netburst, which will put them into CONNECTED state. -- w
201                          */
202                         if (command == "SERVER")
203                         {
204                                 // Our credentials have been accepted, send netburst. (this puts US into the CONNECTED state)
205                                 this->Outbound_Reply_Server(params);
206                         }
207                         else if (command == "ERROR")
208                         {
209                                 this->Error(params);
210                         }
211                         else if (command == "CAPAB")
212                         {
213                                 this->Capab(params);
214                         }
215                 break;
216                 case CONNECTED:
217                         /*
218                          * State CONNECTED:
219                          *  Credentials have been exchanged, we've gotten their 'BURST' (or sent ours).
220                          *  Anything from here on should be accepted a little more reasonably.
221                          */
222                         this->ProcessConnectedLine(prefix, command, params);
223                 break;
224                 case DYING:
225                 break;
226         }
227 }
228
229 User* TreeSocket::FindSource(const std::string& prefix, const std::string& command)
230 {
231         // Empty prefix means the source is the directly connected server that sent this command
232         if (prefix.empty())
233                 return MyRoot->ServerUser;
234
235         // If the prefix string is a uuid or a sid FindUUID() returns the appropriate User object
236         User* who = ServerInstance->FindUUID(prefix);
237         if (who)
238                 return who;
239
240         // Some implementations wrongly send a server name as prefix occasionally, handle that too for now
241         TreeServer* const server = Utils->FindServer(prefix);
242         if (server)
243                 return server->ServerUser;
244
245         /* It is important that we don't close the link here, unknown prefix can occur
246          * due to various race conditions such as the KILL message for a user somehow
247          * crossing the users QUIT further upstream from the server. Thanks jilles!
248          */
249
250         if ((prefix.length() == UIDGenerator::UUID_LENGTH) && (isdigit(prefix[0])) &&
251                 ((command == "FMODE") || (command == "MODE") || (command == "KICK") || (command == "TOPIC") || (command == "KILL") || (command == "ADDLINE") || (command == "DELLINE")))
252         {
253                 /* Special case, we cannot drop these commands as they've been committed already on a
254                  * part of the network by the time we receive them, so in this scenario pretend the
255                  * command came from a server to avoid desync.
256                  */
257
258                 who = ServerInstance->FindUUID(prefix.substr(0, 3));
259                 if (who)
260                         return who;
261                 return this->MyRoot->ServerUser;
262         }
263
264         // Unknown prefix
265         return NULL;
266 }
267
268 void TreeSocket::ProcessConnectedLine(std::string& prefix, std::string& command, parameterlist& params)
269 {
270         User* who = FindSource(prefix, command);
271         if (!who)
272         {
273                 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Command '%s' from unknown prefix '%s'! Dropping entire command.", command.c_str(), prefix.c_str());
274                 return;
275         }
276
277         /*
278          * Check for fake direction here, and drop any instances that are found.
279          * What is fake direction? Imagine the following server setup:
280          *    0AA <-> 0AB <-> 0AC
281          * Fake direction would be 0AC sending a message to 0AB claiming to be from
282          * 0AA, or something similar. Basically, a message taking a path that *cannot*
283          * be correct.
284          *
285          * When would this be seen?
286          * Well, hopefully never. It could be caused by race conditions, bugs, or
287          * "miscreant" servers, though, so let's check anyway. -- w
288          *
289          * We also check here for totally invalid prefixes (prefixes that are neither
290          * a valid SID or a valid UUID, so that invalid UUID or SID never makes it
291          * to the higher level functions. -- B
292          */
293         TreeServer* const server = TreeServer::Get(who);
294         if (server->GetSocket() != this)
295         {
296                 ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Protocol violation: Fake direction '%s' from connection '%s'", prefix.c_str(), linkID.c_str());
297                 return;
298         }
299
300         // Translate commands coming from servers using an older protocol
301         if (proto_version < ProtocolVersion)
302         {
303                 if (!PreProcessOldProtocolMessage(who, command, params))
304                         return;
305         }
306
307         ServerCommand* scmd = Utils->Creator->CmdManager.GetHandler(command);
308         CommandBase* cmdbase = scmd;
309         Command* cmd = NULL;
310         if (!scmd)
311         {
312                 // Not a special server-to-server command
313                 cmd = ServerInstance->Parser.GetHandler(command);
314                 if (!cmd)
315                 {
316                         if (command == "ERROR")
317                         {
318                                 this->Error(params);
319                                 return;
320                         }
321
322                         throw ProtocolException("Unknown command");
323                 }
324                 cmdbase = cmd;
325         }
326
327         if (params.size() < cmdbase->min_params)
328                 throw ProtocolException("Insufficient parameters");
329
330         if ((!params.empty()) && (params.back().empty()) && (!cmdbase->allow_empty_last_param))
331         {
332                 // the last param is empty and the command handler doesn't allow that, check if there will be enough params if we drop the last
333                 if (params.size()-1 < cmdbase->min_params)
334                         return;
335                 params.pop_back();
336         }
337
338         CmdResult res;
339         if (scmd)
340                 res = scmd->Handle(who, params);
341         else
342         {
343                 res = cmd->Handle(params, who);
344                 if (res == CMD_INVALID)
345                         throw ProtocolException("Error in command handler");
346         }
347
348         if (res == CMD_SUCCESS)
349                 Utils->RouteCommand(server->GetRoute(), cmdbase, params, who);
350 }
351
352 void TreeSocket::OnTimeout()
353 {
354         ServerInstance->SNO->WriteGlobalSno('l', "CONNECT: Connection to \002%s\002 timed out.", linkID.c_str());
355 }
356
357 void TreeSocket::Close()
358 {
359         if (fd != -1)
360                 ServerInstance->GlobalCulls.AddItem(this);
361         this->BufferedSocket::Close();
362         SetError("Remote host closed connection");
363
364         // Connection closed.
365         // If the connection is fully up (state CONNECTED)
366         // then propogate a netsplit to all peers.
367         if (MyRoot)
368                 Squit(MyRoot,getError());
369
370         if (!ConnectionFailureShown)
371         {
372                 ConnectionFailureShown = true;
373                 ServerInstance->SNO->WriteGlobalSno('l', "Connection to '\2%s\2' failed.",linkID.c_str());
374
375                 time_t server_uptime = ServerInstance->Time() - this->age;
376                 if (server_uptime)
377                 {
378                         std::string timestr = ModuleSpanningTree::TimeToStr(server_uptime);
379                         ServerInstance->SNO->WriteGlobalSno('l', "Connection to '\2%s\2' was established for %s", linkID.c_str(), timestr.c_str());
380                 }
381         }
382 }