2 * InspIRCd -- Internet Relay Chat Daemon
4 * Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
5 * Copyright (C) 2007-2008 Robin Burchell <robin+git@viroteck.net>
6 * Copyright (C) 2005-2008 Craig Edwards <craigedwards@brainbox.cc>
7 * Copyright (C) 2007 Dennis Friis <peavey@inspircd.org>
8 * Copyright (C) 2006 Oliver Lupton <oliverlupton@gmail.com>
10 * This file is part of InspIRCd. InspIRCd is free software: you can
11 * redistribute it and/or modify it under the terms of the GNU General Public
12 * License as published by the Free Software Foundation, version 2.
14 * This program is distributed in the hope that it will be useful, but WITHOUT
15 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
16 * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
19 * You should have received a copy of the GNU General Public License
20 * along with this program. If not, see <http://www.gnu.org/licenses/>.
26 bool InspIRCd::BindPort(ConfigTag* tag, const irc::sockets::sockaddrs& sa, std::vector<ListenSocket*>& old_ports)
28 for (std::vector<ListenSocket*>::iterator n = old_ports.begin(); n != old_ports.end(); ++n)
30 if ((**n).bind_sa == sa)
32 // Replace tag, we know addr and port match, but other info (type, ssl) may not.
33 ServerInstance->Logs->Log("SOCKET", LOG_DEFAULT, "Replacing listener on %s from old tag at %s with new tag from %s",
34 sa.str().c_str(), (*n)->bind_tag->getTagLocation().c_str(), tag->getTagLocation().c_str());
36 (*n)->ResetIOHookProvider();
43 ListenSocket* ll = new ListenSocket(tag, sa);
46 ServerInstance->Logs->Log("SOCKET", LOG_DEFAULT, "Failed to listen on %s from tag at %s: %s",
47 sa.str().c_str(), tag->getTagLocation().c_str(), strerror(errno));
52 ServerInstance->Logs->Log("SOCKET", LOG_DEFAULT, "Added a listener on %s from tag at %s", sa.str().c_str(), tag->getTagLocation().c_str());
57 int InspIRCd::BindPorts(FailedPortList& failed_ports)
60 std::vector<ListenSocket*> old_ports(ports.begin(), ports.end());
62 ConfigTagList tags = ServerInstance->Config->ConfTags("bind");
63 for (ConfigIter i = tags.first; i != tags.second; ++i)
65 ConfigTag* tag = i->second;
67 // Are we creating a TCP/IP listener?
68 const std::string address = tag->getString("address");
69 const std::string portlist = tag->getString("port");
70 if (!address.empty() || !portlist.empty())
72 // InspIRCd supports IPv4 and IPv6 natively; no 4in6 required.
73 if (strncasecmp(address.c_str(), "::ffff:", 7) == 0)
74 this->Logs->Log("SOCKET", LOG_DEFAULT, "Using 4in6 (::ffff:) isn't recommended. You should bind IPv4 addresses directly instead.");
76 // A TCP listener with no ports is not very useful.
78 this->Logs->Log("SOCKET", LOG_DEFAULT, "TCP listener on %s at %s has no ports specified!",
79 address.empty() ? "*" : address.c_str(), tag->getTagLocation().c_str());
81 irc::portparser portrange(portlist, false);
82 for (int port; (port = portrange.GetToken()); )
84 irc::sockets::sockaddrs bindspec;
85 if (!irc::sockets::aptosa(address, port, bindspec))
88 if (!BindPort(tag, bindspec, old_ports))
89 failed_ports.push_back(std::make_pair(bindspec, errno));
97 // Are we creating a UNIX listener?
98 const std::string path = tag->getString("path");
101 // UNIX socket paths are length limited to less than PATH_MAX.
102 irc::sockets::sockaddrs bindspec;
103 if (path.length() > std::min(ServerInstance->Config->Limits.MaxHost, sizeof(bindspec.un.sun_path)))
105 this->Logs->Log("SOCKET", LOG_DEFAULT, "UNIX listener on %s at %s specified a path that is too long!",
106 path.c_str(), tag->getTagLocation().c_str());
110 // Create the bindspec manually (aptosa doesn't work with AF_UNIX yet).
111 memset(&bindspec, 0, sizeof(bindspec));
112 bindspec.un.sun_family = AF_UNIX;
113 memcpy(&bindspec.un.sun_path, path.c_str(), sizeof(bindspec.un.sun_path));
115 if (!BindPort(tag, bindspec, old_ports))
116 failed_ports.push_back(std::make_pair(bindspec, errno));
123 std::vector<ListenSocket*>::iterator n = ports.begin();
124 for (std::vector<ListenSocket*>::iterator o = old_ports.begin(); o != old_ports.end(); ++o)
126 while (n != ports.end() && *n != *o)
128 if (n == ports.end())
130 this->Logs->Log("SOCKET", LOG_DEFAULT, "Port bindings slipped out of vector, aborting close!");
134 this->Logs->Log("SOCKET", LOG_DEFAULT, "Port binding %s was removed from the config file, closing.",
135 (**n).bind_sa.str().c_str());
138 // this keeps the iterator valid, pointing to the next element
145 bool irc::sockets::aptosa(const std::string& addr, int port, irc::sockets::sockaddrs& sa)
147 memset(&sa, 0, sizeof(sa));
148 if (addr.empty() || addr.c_str()[0] == '*')
150 if (ServerInstance->Config->WildcardIPv6)
152 sa.in6.sin6_family = AF_INET6;
153 sa.in6.sin6_port = htons(port);
157 sa.in4.sin_family = AF_INET;
158 sa.in4.sin_port = htons(port);
162 else if (inet_pton(AF_INET, addr.c_str(), &sa.in4.sin_addr) > 0)
164 sa.in4.sin_family = AF_INET;
165 sa.in4.sin_port = htons(port);
168 else if (inet_pton(AF_INET6, addr.c_str(), &sa.in6.sin6_addr) > 0)
170 sa.in6.sin6_family = AF_INET6;
171 sa.in6.sin6_port = htons(port);
177 int irc::sockets::sockaddrs::family() const
182 int irc::sockets::sockaddrs::port() const
187 return ntohs(in4.sin_port);
190 return ntohs(in6.sin6_port);
196 // If we have reached this point then we have encountered a bug.
197 ServerInstance->Logs->Log("SOCKET", LOG_DEBUG, "BUG: irc::sockets::sockaddrs::port(): socket type %d is unknown!", family());
201 std::string irc::sockets::sockaddrs::addr() const
206 char ip4addr[INET_ADDRSTRLEN];
207 if (!inet_ntop(AF_INET, (void*)&in4.sin_addr, ip4addr, sizeof(ip4addr)))
212 char ip6addr[INET6_ADDRSTRLEN];
213 if (!inet_ntop(AF_INET6, (void*)&in6.sin6_addr, ip6addr, sizeof(ip6addr)))
214 return "0:0:0:0:0:0:0:0";
221 // If we have reached this point then we have encountered a bug.
222 ServerInstance->Logs->Log("SOCKET", LOG_DEBUG, "BUG: irc::sockets::sockaddrs::addr(): socket type %d is unknown!", family());
226 std::string irc::sockets::sockaddrs::str() const
231 char ip4addr[INET_ADDRSTRLEN];
232 if (!inet_ntop(AF_INET, (void*)&in4.sin_addr, ip4addr, sizeof(ip4addr)))
233 strcpy(ip4addr, "0.0.0.0");
234 return InspIRCd::Format("%s:%u", ip4addr, ntohs(in4.sin_port));
237 char ip6addr[INET6_ADDRSTRLEN];
238 if (!inet_ntop(AF_INET6, (void*)&in6.sin6_addr, ip6addr, sizeof(ip6addr)))
239 strcpy(ip6addr, "0:0:0:0:0:0:0:0");
240 return InspIRCd::Format("[%s]:%u", ip6addr, ntohs(in6.sin6_port));
246 // If we have reached this point then we have encountered a bug.
247 ServerInstance->Logs->Log("SOCKET", LOG_DEBUG, "BUG: irc::sockets::sockaddrs::str(): socket type %d is unknown!", family());
251 socklen_t irc::sockets::sockaddrs::sa_size() const
265 // If we have reached this point then we have encountered a bug.
266 ServerInstance->Logs->Log("SOCKET", LOG_DEBUG, "BUG: irc::sockets::sockaddrs::sa_size(): socket type %d is unknown!", family());
270 bool irc::sockets::sockaddrs::operator==(const irc::sockets::sockaddrs& other) const
272 if (family() != other.family())
278 return (in4.sin_port == other.in4.sin_port) && (in4.sin_addr.s_addr == other.in4.sin_addr.s_addr);
281 return (in6.sin6_port == other.in6.sin6_port) && !memcmp(in6.sin6_addr.s6_addr, other.in6.sin6_addr.s6_addr, 16);
284 return !strcmp(un.sun_path, other.un.sun_path);
287 // If we have reached this point then we have encountered a bug.
288 ServerInstance->Logs->Log("SOCKET", LOG_DEBUG, "BUG: irc::sockets::sockaddrs::operator==(): socket type %d is unknown!", family());
289 return !memcmp(this, &other, sizeof(*this));
292 static void sa2cidr(irc::sockets::cidr_mask& cidr, const irc::sockets::sockaddrs& sa, unsigned char range)
294 const unsigned char* base;
295 unsigned char target_byte;
297 memset(cidr.bits, 0, sizeof(cidr.bits));
299 cidr.type = sa.family();
303 // XXX: UNIX sockets don't support CIDR. This fix is non-ideal but I can't
304 // really think of another way to handle it.
309 cidr.length = range > 32 ? 32 : range;
310 target_byte = sizeof(sa.in4.sin_addr);
311 base = (unsigned char*)&sa.in4.sin_addr;
315 cidr.length = range > 128 ? 128 : range;
316 target_byte = sizeof(sa.in6.sin6_addr);
317 base = (unsigned char*)&sa.in6.sin6_addr;
321 // If we have reached this point then we have encountered a bug.
322 ServerInstance->Logs->Log("SOCKET", LOG_DEBUG, "BUG: sa2cidr(): socket type %d is unknown!", cidr.type);
327 unsigned int border = cidr.length / 8;
328 unsigned int bitmask = (0xFF00 >> (range & 7)) & 0xFF;
329 for(unsigned int i=0; i < target_byte; i++)
332 cidr.bits[i] = base[i];
333 else if (i == border)
334 cidr.bits[i] = base[i] & bitmask;
340 irc::sockets::cidr_mask::cidr_mask(const irc::sockets::sockaddrs& sa, unsigned char range)
342 sa2cidr(*this, sa, range);
345 irc::sockets::cidr_mask::cidr_mask(const std::string& mask)
347 std::string::size_type bits_chars = mask.rfind('/');
348 irc::sockets::sockaddrs sa;
350 if (bits_chars == std::string::npos)
352 irc::sockets::aptosa(mask, 0, sa);
353 sa2cidr(*this, sa, 128);
357 unsigned char range = ConvToNum<unsigned char>(mask.substr(bits_chars + 1));
358 irc::sockets::aptosa(mask.substr(0, bits_chars), 0, sa);
359 sa2cidr(*this, sa, range);
363 std::string irc::sockets::cidr_mask::str() const
365 irc::sockets::sockaddrs sa;
366 sa.sa.sa_family = type;
373 base = (unsigned char*)&sa.in4.sin_addr;
378 base = (unsigned char*)&sa.in6.sin6_addr;
383 return sa.un.sun_path;
386 // If we have reached this point then we have encountered a bug.
387 ServerInstance->Logs->Log("SOCKET", LOG_DEBUG, "BUG: irc::sockets::cidr_mask::str(): socket type %d is unknown!", type);
391 memcpy(base, bits, len);
392 return sa.addr() + "/" + ConvToStr((int)length);
395 bool irc::sockets::cidr_mask::operator==(const cidr_mask& other) const
397 return type == other.type && length == other.length &&
398 0 == memcmp(bits, other.bits, 16);
401 bool irc::sockets::cidr_mask::operator<(const cidr_mask& other) const
403 if (type != other.type)
404 return type < other.type;
405 if (length != other.length)
406 return length < other.length;
407 return memcmp(bits, other.bits, 16) < 0;
410 bool irc::sockets::cidr_mask::match(const irc::sockets::sockaddrs& addr) const
412 if (addr.family() != type)
414 irc::sockets::cidr_mask tmp(addr, length);