2016-08-13 05:05:54 +02:00
|
|
|
using namespace ircd;
|
|
|
|
|
2016-03-09 08:29:41 +01:00
|
|
|
static const char ip_cloaking_desc[] = "Very old IP cloaking mechanism";
|
|
|
|
|
2016-03-07 10:08:40 +01:00
|
|
|
/* if you're modifying this module, you'll probably want to change this */
|
2007-07-06 09:48:28 +02:00
|
|
|
#define KEY 0x13748cfa
|
|
|
|
|
|
|
|
static int
|
|
|
|
_modinit(void)
|
|
|
|
{
|
|
|
|
/* add the usermode to the available slot */
|
|
|
|
user_modes['h'] = find_umode_slot();
|
|
|
|
construct_umodebuf();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
_moddeinit(void)
|
|
|
|
{
|
|
|
|
/* disable the umode and remove it from the available list */
|
|
|
|
user_modes['h'] = 0;
|
|
|
|
construct_umodebuf();
|
|
|
|
}
|
|
|
|
|
|
|
|
static void check_umode_change(void *data);
|
|
|
|
static void check_new_user(void *data);
|
|
|
|
mapi_hfn_list_av1 ip_cloaking_hfnlist[] = {
|
|
|
|
{ "umode_changed", (hookfn) check_umode_change },
|
|
|
|
{ "new_local_user", (hookfn) check_new_user },
|
|
|
|
{ NULL, NULL }
|
|
|
|
};
|
|
|
|
|
2016-03-07 10:08:40 +01:00
|
|
|
DECLARE_MODULE_AV2(ip_cloaking, _modinit, _moddeinit, NULL, NULL,
|
|
|
|
ip_cloaking_hfnlist, NULL, NULL, ip_cloaking_desc);
|
2007-07-06 09:48:28 +02:00
|
|
|
|
|
|
|
static void
|
2016-08-22 03:57:43 +02:00
|
|
|
distribute_hostchange(client::client *client_p, char *newhost)
|
2007-07-06 09:48:28 +02:00
|
|
|
{
|
2012-02-18 06:16:03 +01:00
|
|
|
if (newhost != client_p->orighost)
|
|
|
|
sendto_one_numeric(client_p, RPL_HOSTHIDDEN, "%s :is now your hidden host",
|
2012-05-24 13:06:20 +02:00
|
|
|
newhost);
|
2007-07-06 09:48:28 +02:00
|
|
|
else
|
2012-02-18 06:16:03 +01:00
|
|
|
sendto_one_numeric(client_p, RPL_HOSTHIDDEN, "%s :hostname reset",
|
2012-05-24 13:06:20 +02:00
|
|
|
newhost);
|
2007-07-06 09:48:28 +02:00
|
|
|
|
|
|
|
sendto_server(NULL, NULL,
|
|
|
|
CAP_EUID | CAP_TS6, NOCAPS, ":%s CHGHOST %s :%s",
|
2012-05-24 13:06:20 +02:00
|
|
|
use_id(&me), use_id(client_p), newhost);
|
2007-07-06 09:48:28 +02:00
|
|
|
sendto_server(NULL, NULL,
|
|
|
|
CAP_TS6, CAP_EUID, ":%s ENCAP * CHGHOST %s :%s",
|
2012-05-24 13:06:20 +02:00
|
|
|
use_id(&me), use_id(client_p), newhost);
|
2012-02-18 06:16:03 +01:00
|
|
|
|
|
|
|
change_nick_user_host(client_p, client_p->name, client_p->username, newhost, 0, "Changing host");
|
|
|
|
|
|
|
|
if (newhost != client_p->orighost)
|
2016-08-23 04:33:36 +02:00
|
|
|
set_dyn_spoof(*client_p);
|
2007-07-06 09:48:28 +02:00
|
|
|
else
|
2016-08-23 04:33:36 +02:00
|
|
|
clear_dyn_spoof(*client_p);
|
2007-07-06 09:48:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
do_host_cloak(const char *inbuf, char *outbuf, int ipmask)
|
|
|
|
{
|
2015-04-20 07:55:20 +02:00
|
|
|
unsigned int cyc;
|
2007-07-06 09:48:28 +02:00
|
|
|
unsigned int hosthash = 1, hosthash2 = 1;
|
2014-03-03 05:25:47 +01:00
|
|
|
unsigned int maxcycle = strlen(inbuf);
|
2007-07-06 09:48:28 +02:00
|
|
|
int len1;
|
|
|
|
const char *rest, *next;
|
|
|
|
|
|
|
|
for (cyc = 0; cyc < maxcycle - 2; cyc += 2)
|
|
|
|
hosthash *= (unsigned int) inbuf[cyc];
|
|
|
|
|
|
|
|
/* safety: decrement ourselves two steps back */
|
|
|
|
for (cyc = maxcycle - 1; cyc >= 1; cyc -= 2)
|
|
|
|
hosthash2 *= (unsigned int) inbuf[cyc];
|
|
|
|
|
|
|
|
/* lets do some bitshifting -- this pretty much destroys the IP
|
|
|
|
* sequence, while still providing a checksum. exactly what
|
|
|
|
* we're shooting for. --nenolod
|
|
|
|
*/
|
|
|
|
hosthash += (hosthash2 / KEY);
|
|
|
|
hosthash2 += (hosthash / KEY);
|
|
|
|
|
|
|
|
if (ipmask == 0)
|
|
|
|
{
|
2016-02-10 02:25:32 +01:00
|
|
|
snprintf(outbuf, HOSTLEN, "%s-%X%X",
|
2007-07-06 09:48:28 +02:00
|
|
|
ServerInfo.network_name, hosthash2, hosthash);
|
|
|
|
len1 = strlen(outbuf);
|
|
|
|
rest = strchr(inbuf, '.');
|
|
|
|
if (rest == NULL)
|
|
|
|
rest = ".";
|
|
|
|
/* try to avoid truncation -- jilles */
|
|
|
|
while (len1 + strlen(rest) >= HOSTLEN && (next = strchr(rest + 1, '.')) != NULL)
|
|
|
|
rest = next;
|
2008-04-20 06:44:04 +02:00
|
|
|
rb_strlcat(outbuf, rest, HOSTLEN);
|
2007-07-06 09:48:28 +02:00
|
|
|
}
|
|
|
|
else
|
2016-02-10 02:25:32 +01:00
|
|
|
snprintf(outbuf, HOSTLEN, "%X%X.%s",
|
2007-07-06 09:48:28 +02:00
|
|
|
hosthash2, hosthash, ServerInfo.network_name);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
check_umode_change(void *vdata)
|
|
|
|
{
|
|
|
|
hook_data_umode_changed *data = (hook_data_umode_changed *)vdata;
|
2016-08-22 03:57:43 +02:00
|
|
|
client::client *source_p = data->client;
|
2007-07-06 09:48:28 +02:00
|
|
|
|
2016-08-23 04:33:36 +02:00
|
|
|
if (!my(*source_p))
|
2007-07-06 09:48:28 +02:00
|
|
|
return;
|
|
|
|
|
|
|
|
/* didn't change +h umode, we don't need to do anything */
|
2016-08-24 00:25:09 +02:00
|
|
|
if (!((data->oldumodes ^ source_p->mode) & user_modes['h']))
|
2007-07-06 09:48:28 +02:00
|
|
|
return;
|
|
|
|
|
2016-08-24 00:25:09 +02:00
|
|
|
if (source_p->mode & user_modes['h'])
|
2007-07-06 09:48:28 +02:00
|
|
|
{
|
2016-08-23 04:33:36 +02:00
|
|
|
if (is_ip_spoof(*source_p) || source_p->localClient->mangledhost == NULL || (is_dyn_spoof(*source_p) && strcmp(source_p->host, source_p->localClient->mangledhost)))
|
2007-07-06 09:48:28 +02:00
|
|
|
{
|
2016-08-24 00:25:09 +02:00
|
|
|
source_p->mode &= umode(~user_modes['h']);
|
2007-07-06 09:48:28 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (strcmp(source_p->host, source_p->localClient->mangledhost))
|
|
|
|
{
|
2012-02-18 06:16:03 +01:00
|
|
|
distribute_hostchange(source_p, source_p->localClient->mangledhost);
|
2007-07-06 09:48:28 +02:00
|
|
|
}
|
|
|
|
else /* not really nice, but we need to send this numeric here */
|
|
|
|
sendto_one_numeric(source_p, RPL_HOSTHIDDEN, "%s :is now your hidden host",
|
|
|
|
source_p->host);
|
|
|
|
}
|
2016-08-24 00:25:09 +02:00
|
|
|
else if (!(source_p->mode & user_modes['h']))
|
2007-07-06 09:48:28 +02:00
|
|
|
{
|
|
|
|
if (source_p->localClient->mangledhost != NULL &&
|
|
|
|
!strcmp(source_p->host, source_p->localClient->mangledhost))
|
|
|
|
{
|
2012-02-18 06:16:03 +01:00
|
|
|
distribute_hostchange(source_p, source_p->orighost);
|
2007-07-06 09:48:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
check_new_user(void *vdata)
|
|
|
|
{
|
2016-08-22 03:57:43 +02:00
|
|
|
client::client *source_p = (client::client *)vdata;
|
2007-07-06 09:48:28 +02:00
|
|
|
|
2016-08-23 04:33:36 +02:00
|
|
|
if (is_ip_spoof(*source_p))
|
2007-07-06 09:48:28 +02:00
|
|
|
{
|
2016-08-24 00:25:09 +02:00
|
|
|
source_p->mode &= umode(~user_modes['h']);
|
2007-07-06 09:48:28 +02:00
|
|
|
return;
|
|
|
|
}
|
2016-07-13 07:17:21 +02:00
|
|
|
source_p->localClient->mangledhost = (char *)rb_malloc(HOSTLEN);
|
2007-07-06 09:48:28 +02:00
|
|
|
if (!irccmp(source_p->orighost, source_p->sockhost))
|
|
|
|
do_host_cloak(source_p->orighost, source_p->localClient->mangledhost, 1);
|
|
|
|
else
|
|
|
|
do_host_cloak(source_p->orighost, source_p->localClient->mangledhost, 0);
|
2016-08-23 04:33:36 +02:00
|
|
|
if (is_dyn_spoof(*source_p))
|
2016-08-24 00:25:09 +02:00
|
|
|
source_p->mode &= umode(~user_modes['h']);
|
|
|
|
if (source_p->mode & user_modes['h'])
|
2007-07-06 09:48:28 +02:00
|
|
|
{
|
2008-04-20 06:40:40 +02:00
|
|
|
rb_strlcpy(source_p->host, source_p->localClient->mangledhost, sizeof(source_p->host));
|
2007-07-06 09:48:28 +02:00
|
|
|
if (irccmp(source_p->host, source_p->orighost))
|
2016-08-23 04:33:36 +02:00
|
|
|
set_dyn_spoof(*source_p);
|
2007-07-06 09:48:28 +02:00
|
|
|
}
|
|
|
|
}
|