]> git.netwichtig.de Git - user/henk/code/inspircd.git/blobdiff - src/modules/m_sslmodes.cpp
Add support for blocking tag messages with the deaf mode.
[user/henk/code/inspircd.git] / src / modules / m_sslmodes.cpp
index 0e06aa3148c26455437643a8109678705850ff16..bc5cb56752314693c108ad697e0f9500454d2403 100644 (file)
@@ -1 +1,251 @@
-/*       +------------------------------------+\r *       | Inspire Internet Relay Chat Daemon |\r *       +------------------------------------+\r *\r *  InspIRCd: (C) 2002-2007 InspIRCd Development Team\r * See: http://www.inspircd.org/wiki/index.php/Credits\r *\r * This program is free but copyrighted software; see\r *            the file COPYING for details.\r *\r * ---------------------------------------------------\r */\r\r#include "inspircd.h"\r#include "users.h"\r#include "channels.h"\r#include "modules.h"\r\r/* $ModDesc: Provides support for unreal-style channel mode +z */\r\rstatic char* dummy;\r\r/** Handle channel mode +z\r */\rclass SSLMode : public ModeHandler\r{\r public:\r SSLMode(InspIRCd* Instance) : ModeHandler(Instance, 'z', 0, 0, false, MODETYPE_CHANNEL, false) { }\r\r    ModeAction OnModeChange(userrec* source, userrec* dest, chanrec* channel, std::string &parameter, bool adding)\r {\r              if (adding)\r            {\r                      if (!channel->IsModeSet('z'))\r                  {\r                              if (IS_LOCAL(source))\r                          {\r                                      CUList* userlist = channel->GetUsers();\r                                        for(CUList::iterator i = userlist->begin(); i != userlist->end(); i++)\r                                 {\r                                              if(!i->first->GetExt("ssl", dummy))\r                                            {\r                                                      source->WriteServ("490 %s %s :all members of the channel must be connected via SSL", source->nick, channel->name);\r                                                     return MODEACTION_DENY;\r                                                }\r                                      }\r                              }\r                              channel->SetMode('z',true);\r                            return MODEACTION_ALLOW;\r                       }\r                      else\r                   {\r                              return MODEACTION_DENY;\r                        }\r              }\r              else\r           {\r                      if (channel->IsModeSet('z'))\r                   {\r                              channel->SetMode('z',false);\r                           return MODEACTION_ALLOW;\r                       }\r\r                     return MODEACTION_DENY;\r                }\r      }\r};\r\rclass ModuleSSLModes : public Module\r{\r   \r       SSLMode* sslm;\r \r public:\r      ModuleSSLModes(InspIRCd* Me)\r           : Module(Me)\r   {\r              \r\r              sslm = new SSLMode(ServerInstance);\r            if (!ServerInstance->AddMode(sslm, 'z'))\r                       throw ModuleException("Could not add new modes!");\r     }\r\r     void Implements(char* List)\r    {\r              List[I_OnUserPreJoin] = 1;\r     }\r\r     virtual int OnUserPreJoin(userrec* user, chanrec* chan, const char* cname, std::string &privs)\r {\r              if(chan && chan->IsModeSet('z'))\r               {\r                      if(user->GetExt("ssl", dummy))\r                 {\r                              // Let them in\r                         return 0;\r                      }\r                      else\r                   {\r                              // Deny\r                                user->WriteServ( "489 %s %s :Cannot join channel; SSL users only (+z)", user->nick, cname);\r                            return 1;\r                      }\r              }\r              \r               return 0;\r      }\r\r     virtual ~ModuleSSLModes()\r      {\r              ServerInstance->Modes->DelMode(sslm);\r          DELETE(sslm);\r  }\r      \r       virtual Version GetVersion()\r   {\r              return Version(1, 1, 0, 0, VF_COMMON | VF_VENDOR, API_VERSION);\r        }\r};\r\r\rclass ModuleSSLModesFactory : public ModuleFactory\r{\r public:\r   ModuleSSLModesFactory()\r        {\r      }\r      \r       ~ModuleSSLModesFactory()\r       {\r      }\r      \r       virtual Module* CreateModule(InspIRCd* Me)\r     {\r              return new ModuleSSLModes(Me);\r }\r      \r};\r\r\rextern "C" DllExport void * init_module( void )\r{\r        return new ModuleSSLModesFactory;\r}\r
\ No newline at end of file
+/*
+ * InspIRCd -- Internet Relay Chat Daemon
+ *
+ *   Copyright (C) 2020 Matt Schatz <genius3000@g3k.solutions>
+ *   Copyright (C) 2013, 2017-2020 Sadie Powell <sadie@witchery.services>
+ *   Copyright (C) 2013 Shawn Smith <ShawnSmith0828@gmail.com>
+ *   Copyright (C) 2012-2014 Attila Molnar <attilamolnar@hush.com>
+ *   Copyright (C) 2012 Robby <robby@chatbelgie.be>
+ *   Copyright (C) 2009-2010 Daniel De Graaf <danieldg@inspircd.org>
+ *   Copyright (C) 2009 Uli Schlachter <psychon@inspircd.org>
+ *   Copyright (C) 2008 Robin Burchell <robin+git@viroteck.net>
+ *   Copyright (C) 2007 Dennis Friis <peavey@inspircd.org>
+ *   Copyright (C) 2006-2007, 2010 Craig Edwards <brain@inspircd.org>
+ *
+ * This file is part of InspIRCd.  InspIRCd is free software: you can
+ * redistribute it and/or modify it under the terms of the GNU General Public
+ * License as published by the Free Software Foundation, version 2.
+ *
+ * This program is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
+ * FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
+ * details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <http://www.gnu.org/licenses/>.
+ */
+
+
+#include "inspircd.h"
+#include "modules/ctctags.h"
+#include "modules/ssl.h"
+
+enum
+{
+       // From UnrealIRCd.
+       ERR_SECUREONLYCHAN = 489,
+       ERR_ALLMUSTSSL = 490
+};
+
+/** Handle channel mode +z
+ */
+class SSLMode : public ModeHandler
+{
+ private:
+       UserCertificateAPI& API;
+
+ public:
+       SSLMode(Module* Creator, UserCertificateAPI& api)
+               : ModeHandler(Creator, "sslonly", 'z', PARAM_NONE, MODETYPE_CHANNEL)
+               , API(api)
+       {
+       }
+
+       ModeAction OnModeChange(User* source, User* dest, Channel* channel, std::string& parameter, bool adding) CXX11_OVERRIDE
+       {
+               if (adding)
+               {
+                       if (!channel->IsModeSet(this))
+                       {
+                               if (IS_LOCAL(source))
+                               {
+                                       if (!API)
+                                       {
+                                               source->WriteNumeric(ERR_ALLMUSTSSL, channel->name, "Unable to determine whether all members of the channel are connected via TLS (SSL)");
+                                               return MODEACTION_DENY;
+                                       }
+
+                                       unsigned long nonssl = 0;
+                                       const Channel::MemberMap& userlist = channel->GetUsers();
+                                       for (Channel::MemberMap::const_iterator i = userlist.begin(); i != userlist.end(); ++i)
+                                       {
+                                               ssl_cert* cert = API->GetCertificate(i->first);
+                                               if (!cert && !i->first->server->IsULine())
+                                                       nonssl++;
+                                       }
+
+                                       if (nonssl)
+                                       {
+                                               source->WriteNumeric(ERR_ALLMUSTSSL, channel->name, InspIRCd::Format("All members of the channel must be connected via TLS (SSL) (%lu/%lu are non-TLS (SSL))",
+                                                       nonssl, static_cast<unsigned long>(userlist.size())));
+                                               return MODEACTION_DENY;
+                                       }
+                               }
+                               channel->SetMode(this, true);
+                               return MODEACTION_ALLOW;
+                       }
+                       else
+                       {
+                               return MODEACTION_DENY;
+                       }
+               }
+               else
+               {
+                       if (channel->IsModeSet(this))
+                       {
+                               channel->SetMode(this, false);
+                               return MODEACTION_ALLOW;
+                       }
+
+                       return MODEACTION_DENY;
+               }
+       }
+};
+
+/** Handle user mode +z
+*/
+class SSLModeUser : public ModeHandler
+{
+ private:
+       UserCertificateAPI& API;
+
+ public:
+       SSLModeUser(Module* Creator, UserCertificateAPI& api)
+               : ModeHandler(Creator, "sslqueries", 'z', PARAM_NONE, MODETYPE_USER)
+               , API(api)
+       {
+               if (!ServerInstance->Config->ConfValue("sslmodes")->getBool("enableumode"))
+                       DisableAutoRegister();
+       }
+
+       ModeAction OnModeChange(User* user, User* dest, Channel* channel, std::string& parameter, bool adding) CXX11_OVERRIDE
+       {
+               if (adding)
+               {
+                       if (!dest->IsModeSet(this))
+                       {
+                               if (!API || !API->GetCertificate(user))
+                                       return MODEACTION_DENY;
+
+                               dest->SetMode(this, true);
+                               return MODEACTION_ALLOW;
+                       }
+               }
+               else
+               {
+                       if (dest->IsModeSet(this))
+                       {
+                               dest->SetMode(this, false);
+                               return MODEACTION_ALLOW;
+                       }
+               }
+
+               return MODEACTION_DENY;
+       }
+};
+
+class ModuleSSLModes
+       : public Module
+       , public CTCTags::EventListener
+{
+ private:
+       UserCertificateAPI api;
+       SSLMode sslm;
+       SSLModeUser sslquery;
+
+ public:
+       ModuleSSLModes()
+               : CTCTags::EventListener(this)
+               , api(this)
+               , sslm(this, api)
+               , sslquery(this, api)
+       {
+       }
+
+       ModResult OnUserPreJoin(LocalUser* user, Channel* chan, const std::string& cname, std::string& privs, const std::string& keygiven) CXX11_OVERRIDE
+       {
+               if(chan && chan->IsModeSet(sslm))
+               {
+                       if (!api)
+                       {
+                               user->WriteNumeric(ERR_SECUREONLYCHAN, cname, "Cannot join channel; unable to determine if you are a TLS (SSL) user (+z is set)");
+                               return MOD_RES_DENY;
+                       }
+
+                       if (!api->GetCertificate(user))
+                       {
+                               user->WriteNumeric(ERR_SECUREONLYCHAN, cname, "Cannot join channel; TLS (SSL) users only (+z is set)");
+                               return MOD_RES_DENY;
+                       }
+               }
+
+               return MOD_RES_PASSTHRU;
+       }
+
+       ModResult HandleMessage(User* user, const MessageTarget& msgtarget)
+       {
+               if (msgtarget.type != MessageTarget::TYPE_USER)
+                       return MOD_RES_PASSTHRU;
+
+               User* target = msgtarget.Get<User>();
+
+               /* If one or more of the parties involved is a ulined service, we won't stop it. */
+               if (user->server->IsULine() || target->server->IsULine())
+                       return MOD_RES_PASSTHRU;
+
+               /* If the target is +z */
+               if (target->IsModeSet(sslquery))
+               {
+                       if (!api || !api->GetCertificate(user))
+                       {
+                               /* The sending user is not on an SSL connection */
+                               user->WriteNumeric(Numerics::CannotSendTo(target, "messages", &sslquery));
+                               return MOD_RES_DENY;
+                       }
+               }
+               /* If the user is +z */
+               else if (user->IsModeSet(sslquery))
+               {
+                       if (!api || !api->GetCertificate(target))
+                       {
+                               user->WriteNumeric(Numerics::CannotSendTo(target, "messages", &sslquery, true));
+                               return MOD_RES_DENY;
+                       }
+               }
+
+               return MOD_RES_PASSTHRU;
+       }
+
+       ModResult OnUserPreMessage(User* user, const MessageTarget& target, MessageDetails& details) CXX11_OVERRIDE
+       {
+               return HandleMessage(user, target);
+       }
+
+       ModResult OnUserPreTagMessage(User* user, const MessageTarget& target, CTCTags::TagMessageDetails& details) CXX11_OVERRIDE
+       {
+               return HandleMessage(user, target);
+       }
+
+       ModResult OnCheckBan(User *user, Channel *c, const std::string& mask) CXX11_OVERRIDE
+       {
+               if ((mask.length() > 2) && (mask[0] == 'z') && (mask[1] == ':'))
+               {
+                       const std::string fp = api ? api->GetFingerprint(user) : "";
+                       if (!fp.empty() && InspIRCd::Match(fp, mask.substr(2)))
+                               return MOD_RES_DENY;
+               }
+               return MOD_RES_PASSTHRU;
+       }
+
+       void On005Numeric(std::map<std::string, std::string>& tokens) CXX11_OVERRIDE
+       {
+               tokens["EXTBAN"].push_back('z');
+       }
+
+       Version GetVersion() CXX11_OVERRIDE
+       {
+               return Version("Adds channel mode z (sslonly) which prevents users who are not connecting using TLS (SSL) from joining the channel and user mode z (sslqueries) to prevent messages from non-TLS (SSL) users.", VF_VENDOR);
+       }
+};
+
+MODULE_INIT(ModuleSSLModes)