2015-12-10 09:25:22 +01:00
|
|
|
/*
|
|
|
|
* Hostmask extban type: bans all users matching a given hostmask, used for stacked extbans
|
|
|
|
* -- kaniini
|
|
|
|
*/
|
|
|
|
|
2016-07-01 05:04:00 +02:00
|
|
|
#include <ircd/stdinc.h>
|
|
|
|
#include <ircd/modules.h>
|
|
|
|
#include <ircd/client.h>
|
|
|
|
#include <ircd/ircd.h>
|
2015-12-10 09:25:22 +01:00
|
|
|
|
2016-03-09 08:29:41 +01:00
|
|
|
static const char extb_desc[] = "Hostmask ($m) extban type";
|
|
|
|
|
2015-12-10 09:25:22 +01:00
|
|
|
static int _modinit(void);
|
|
|
|
static void _moddeinit(void);
|
|
|
|
static int eb_hostmask(const char *data, struct Client *client_p, struct Channel *chptr, long mode_type);
|
|
|
|
|
2016-03-07 07:31:41 +01:00
|
|
|
DECLARE_MODULE_AV2(extb_hostmask, _modinit, _moddeinit, NULL, NULL, NULL, NULL, NULL, extb_desc);
|
2015-12-10 09:25:22 +01:00
|
|
|
|
|
|
|
static int
|
|
|
|
_modinit(void)
|
|
|
|
{
|
|
|
|
extban_table['m'] = eb_hostmask;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
_moddeinit(void)
|
|
|
|
{
|
|
|
|
extban_table['m'] = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
eb_hostmask(const char *banstr, struct Client *client_p, struct Channel *chptr, long mode_type)
|
|
|
|
{
|
|
|
|
char src_host[NICKLEN + USERLEN + HOSTLEN + 6];
|
|
|
|
char src_iphost[NICKLEN + USERLEN + HOSTLEN + 6];
|
|
|
|
char src_althost[NICKLEN + USERLEN + HOSTLEN + 6];
|
|
|
|
char src_ip4host[NICKLEN + USERLEN + HOSTLEN + 6];
|
|
|
|
struct sockaddr_in ip4;
|
|
|
|
char *s = src_host, *s2 = src_iphost, *s3 = NULL, *s4 = NULL;
|
|
|
|
|
2016-02-10 02:25:32 +01:00
|
|
|
sprintf(src_host, "%s!%s@%s", client_p->name, client_p->username, client_p->host);
|
|
|
|
sprintf(src_iphost, "%s!%s@%s", client_p->name, client_p->username, client_p->sockhost);
|
2015-12-10 09:25:22 +01:00
|
|
|
|
|
|
|
/* handle hostmangling if necessary */
|
|
|
|
if (client_p->localClient->mangledhost != NULL)
|
|
|
|
{
|
|
|
|
if (!strcmp(client_p->host, client_p->localClient->mangledhost))
|
2016-02-10 02:25:32 +01:00
|
|
|
sprintf(src_althost, "%s!%s@%s", client_p->name, client_p->username, client_p->orighost);
|
2015-12-10 09:25:22 +01:00
|
|
|
else if (!IsDynSpoof(client_p))
|
2016-02-10 02:25:32 +01:00
|
|
|
sprintf(src_althost, "%s!%s@%s", client_p->name, client_p->username, client_p->localClient->mangledhost);
|
2015-12-10 09:25:22 +01:00
|
|
|
|
|
|
|
s3 = src_althost;
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef RB_IPV6
|
|
|
|
/* handle Teredo if necessary */
|
2016-04-08 10:49:23 +02:00
|
|
|
if (GET_SS_FAMILY(&client_p->localClient->ip) == AF_INET6 && rb_ipv4_from_ipv6((const struct sockaddr_in6 *) &client_p->localClient->ip, &ip4))
|
2015-12-10 09:25:22 +01:00
|
|
|
{
|
2016-02-10 02:25:32 +01:00
|
|
|
sprintf(src_ip4host, "%s!%s@", client_p->name, client_p->username);
|
2015-12-10 09:25:22 +01:00
|
|
|
s4 = src_ip4host + strlen(src_ip4host);
|
|
|
|
rb_inet_ntop_sock((struct sockaddr *)&ip4,
|
|
|
|
s4, src_ip4host + sizeof src_ip4host - s4);
|
|
|
|
s4 = src_ip4host;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return match(banstr, s) || match(banstr, s2) || (s3 != NULL && match(banstr, s3)) || (s4 != NULL && match(banstr, s4)) ? EXTBAN_MATCH : EXTBAN_NOMATCH;
|
|
|
|
}
|