]> git.netwichtig.de Git - user/henk/code/inspircd.git/blobdiff - src/modules/m_connectban.cpp
Allow disabling connectban for specific connect classes.
[user/henk/code/inspircd.git] / src / modules / m_connectban.cpp
index 9506bc2fecb16df06ce2fff86a10cd999e82bf8a..b4b16f5394420a442fd5c6f957253065253c1cc2 100644 (file)
-/*       +------------------------------------+
- *       | Inspire Internet Relay Chat Daemon |
- *       +------------------------------------+
+/*
+ * InspIRCd -- Internet Relay Chat Daemon
  *
- *  InspIRCd: (C) 2002-2009 InspIRCd Development Team
- * See: http://wiki.inspircd.org/Credits
+ *   Copyright (C) 2019 Matt Schatz <genius3000@g3k.solutions>
+ *   Copyright (C) 2014 Googolplexed <googol@googolplexed.net>
+ *   Copyright (C) 2013, 2017-2020 Sadie Powell <sadie@witchery.services>
+ *   Copyright (C) 2012-2014 Attila Molnar <attilamolnar@hush.com>
+ *   Copyright (C) 2012, 2019 Robby <robby@chatbelgie.be>
+ *   Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
+ *   Copyright (C) 2008, 2010 Craig Edwards <brain@inspircd.org>
+ *   Copyright (C) 2008 Robin Burchell <robin+git@viroteck.net>
  *
- * This program is free but copyrighted software; see
- *            the file COPYING for details.
+ * This file is part of InspIRCd.  InspIRCd is free software: you can
+ * redistribute it and/or modify it under the terms of the GNU General Public
+ * License as published by the Free Software Foundation, version 2.
  *
- * ---------------------------------------------------
+ * This program is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
+ * FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
+ * details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <http://www.gnu.org/licenses/>.
  */
 
+
 #include "inspircd.h"
 #include "xline.h"
+#include "modules/webirc.h"
 
-/* $ModDesc: Throttles the connections of any users who try connect flood */
-
-class ModuleConnectBan : public Module
+class ModuleConnectBan
+       : public Module
+       , public WebIRC::EventListener
 {
- private:
-       clonemap connects;
+       typedef std::map<irc::sockets::cidr_mask, unsigned int> ConnectMap;
+       ConnectMap connects;
        unsigned int threshold;
        unsigned int banduration;
        unsigned int ipv4_cidr;
        unsigned int ipv6_cidr;
- public:
-       ModuleConnectBan()      {
-               Implementation eventlist[] = { I_OnUserConnect, I_OnGarbageCollect, I_OnRehash };
-               ServerInstance->Modules->Attach(eventlist, this, 3);
-               OnRehash(NULL);
-       }
+       std::string banmessage;
 
-       virtual ~ModuleConnectBan()
+       unsigned char GetRange(LocalUser* user)
        {
-       }
+               int family = user->client_sa.family();
+               switch (family)
+               {
+                       case AF_INET:
+                               return ipv4_cidr;
 
-       virtual Version GetVersion()
-       {
-               return Version("Throttles the connections of any users who try connect flood", VF_VENDOR);
+                       case AF_INET6:
+                               return ipv6_cidr;
+
+                       case AF_UNIX:
+                               // Ranges for UNIX sockets are ignored entirely.
+                               return 0;
+               }
+
+               // If we have reached this point then we have encountered a bug.
+               ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "BUG: ModuleConnectBan::GetRange(): socket type %d is unknown!", family);
+               return 0;
        }
 
-       virtual void OnRehash(User* user)
+       static bool IsExempt(LocalUser* user)
        {
-               ConfigReader Conf;
-               std::string duration;
-
-               ipv4_cidr = Conf.ReadInteger("connectban", "ipv4cidr", 0, true);
-               if (ipv4_cidr == 0)
-                       ipv4_cidr = 32;
+               // E-lined and already banned users shouldn't be hit.
+               if (user->exempt || user->quitting)
+                       return true;
 
-               ipv6_cidr = Conf.ReadInteger("connectban", "ipv6cidr", 0, true);
-               if (ipv6_cidr == 0)
-                       ipv6_cidr = 128;
+               // Users in an exempt class shouldn't be hit.
+               return user->GetClass() && !user->GetClass()->config->getBool("useconnectban", true);
+       }
 
-               threshold = Conf.ReadInteger("connectban", "threshold", 0, true);
+ public:
+       ModuleConnectBan()
+               : WebIRC::EventListener(this)
+       {
+       }
 
-               if (threshold == 0)
-                       threshold = 10;
+       void Prioritize() CXX11_OVERRIDE
+       {
+               Module* corexline = ServerInstance->Modules->Find("core_xline");
+               ServerInstance->Modules->SetPriority(this, I_OnSetUserIP, PRIORITY_AFTER, corexline);
+       }
 
-               duration = Conf.ReadValue("connectban", "duration", 0, true);
+       Version GetVersion() CXX11_OVERRIDE
+       {
+               return Version("Z-lines IP addresses which make excessive connections to the server.", VF_VENDOR);
+       }
 
-               if (duration.empty())
-                       duration = "10m";
+       void ReadConfig(ConfigStatus& status) CXX11_OVERRIDE
+       {
+               ConfigTag* tag = ServerInstance->Config->ConfValue("connectban");
 
-               banduration = ServerInstance->Duration(duration);
+               ipv4_cidr = tag->getUInt("ipv4cidr", 32, 1, 32);
+               ipv6_cidr = tag->getUInt("ipv6cidr", 128, 1, 128);
+               threshold = tag->getUInt("threshold", 10, 1);
+               banduration = tag->getDuration("duration", 10*60, 1);
+               banmessage = tag->getString("banmessage", "Your IP range has been attempting to connect too many times in too short a duration. Wait a while, and you will be able to connect.");
        }
 
-       virtual void OnUserConnect(LocalUser *u)
+       void OnWebIRCAuth(LocalUser* user, const WebIRC::FlagMap* flags) CXX11_OVERRIDE
        {
-               int range = 32;
-               clonemap::iterator i;
+               if (IsExempt(user))
+                       return;
+
+               // HACK: Lower the connection attempts for the gateway IP address. The user
+               // will be rechecked for connect spamming shortly after when their IP address
+               // is changed and OnSetUserIP is called.
+               irc::sockets::cidr_mask mask(user->client_sa, GetRange(user));
+               ConnectMap::iterator iter = connects.find(mask);
+               if (iter != connects.end() && iter->second)
+                       iter->second--;
+       }
 
-               switch (u->client_sa.sa.sa_family)
-               {
-                       case AF_INET6:
-                               range = ipv6_cidr;
-                       break;
-                       case AF_INET:
-                               range = ipv4_cidr;
-                       break;
-               }
+       void OnSetUserIP(LocalUser* u) CXX11_OVERRIDE
+       {
+               if (IsExempt(u))
+                       return;
 
-               i = connects.find(u->GetCIDRMask(range));
+               irc::sockets::cidr_mask mask(u->client_sa, GetRange(u));
+               ConnectMap::iterator i = connects.find(mask);
 
                if (i != connects.end())
                {
@@ -89,28 +127,30 @@ class ModuleConnectBan : public Module
 
                        if (i->second >= threshold)
                        {
-                               // Create zline for set duration.
-                               ZLine* zl = new ZLine(ServerInstance->Time(), banduration, ServerInstance->Config->ServerName.c_str(), "Connect flooding", u->GetCIDRMask(range));
-                               if (ServerInstance->XLines->AddLine(zl,NULL))
-                                       ServerInstance->XLines->ApplyLines();
-                               else
+                               // Create Z-line for set duration.
+                               ZLine* zl = new ZLine(ServerInstance->Time(), banduration, ServerInstance->Config->ServerName, banmessage, mask.str());
+                               if (!ServerInstance->XLines->AddLine(zl, NULL))
+                               {
                                        delete zl;
-
-                               ServerInstance->SNO->WriteGlobalSno('x',"Module m_connectban added Z:line on *@%s to expire on %s: Connect flooding", 
-                                       u->GetCIDRMask(range), ServerInstance->TimeString(zl->expiry).c_str());
-                               ServerInstance->SNO->WriteGlobalSno('a', "Connect flooding from IP range %s (%d)", u->GetCIDRMask(range), threshold);
+                                       return;
+                               }
+                               ServerInstance->XLines->ApplyLines();
+                               std::string maskstr = mask.str();
+                               ServerInstance->SNO->WriteGlobalSno('x', "Z-line added by module m_connectban on %s to expire in %s (on %s): Connect flooding",
+                                       maskstr.c_str(), InspIRCd::DurationString(zl->duration).c_str(), InspIRCd::TimeString(zl->expiry).c_str());
+                               ServerInstance->SNO->WriteGlobalSno('a', "Connect flooding from IP range %s (%d)", maskstr.c_str(), threshold);
                                connects.erase(i);
                        }
                }
                else
                {
-                       connects[u->GetCIDRMask(range)] = 1;
+                       connects[mask] = 1;
                }
        }
 
-       virtual void OnGarbageCollect()
+       void OnGarbageCollect() CXX11_OVERRIDE
        {
-               ServerInstance->Logs->Log("m_connectban",DEBUG, "Clearing map.");
+               ServerInstance->Logs->Log(MODNAME, LOG_DEBUG, "Clearing map.");
                connects.clear();
        }
 };