mirror of
https://github.com/matrix-construct/construct
synced 2024-11-05 05:18:54 +01:00
61b517ca3c
* To benefit from the precompiled-header (PCH) it MUST provide "the first C token." Advantages: Never worry about the include stack again. Remember, this means one less thing for random module developers, community people learning C++, and new developers to deal with. It should reduce the learning curve and barrier for participation. Disadvantages: Makes overall compilation a bit slower, especially without any additional work to improve it again. There are several opportunities, places where the PCH is probably being ignored, etc that can be addressed.
837 lines
23 KiB
C++
837 lines
23 KiB
C++
/*
|
|
* ircd-ratbox: A slightly useful ircd.
|
|
* m_kline.c: Bans/unbans a user.
|
|
*
|
|
* Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
|
|
* Copyright (C) 1996-2002 Hybrid Development Team
|
|
* Copyright (C) 2002-2005 ircd-ratbox development team
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
|
|
* USA
|
|
*/
|
|
|
|
using namespace ircd;
|
|
|
|
static const char kline_desc[] = "Provides the KLINE facility to ban users via hostmask";
|
|
|
|
static void mo_kline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
|
|
static void ms_kline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
|
|
static void me_kline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
|
|
static void mo_unkline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
|
|
static void ms_unkline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
|
|
static void me_unkline(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
|
|
|
|
struct Message kline_msgtab = {
|
|
"KLINE", 0, 0, 0, 0,
|
|
{mg_unreg, mg_not_oper, {ms_kline, 5}, {ms_kline, 5}, {me_kline, 5}, {mo_kline, 3}}
|
|
};
|
|
|
|
struct Message unkline_msgtab = {
|
|
"UNKLINE", 0, 0, 0, 0,
|
|
{mg_unreg, mg_not_oper, {ms_unkline, 4}, {ms_unkline, 4}, {me_unkline, 3}, {mo_unkline, 2}}
|
|
};
|
|
|
|
mapi_clist_av1 kline_clist[] = { &kline_msgtab, &unkline_msgtab, NULL };
|
|
|
|
DECLARE_MODULE_AV2(kline, NULL, NULL, kline_clist, NULL, NULL, NULL, NULL, kline_desc);
|
|
|
|
/* Local function prototypes */
|
|
static bool find_user_host(struct Client *source_p, const char *userhost, char *user, char *host);
|
|
static bool valid_user_host(struct Client *source_p, const char *user, const char *host);
|
|
|
|
static void handle_remote_kline(struct Client *source_p, int tkline_time,
|
|
const char *user, const char *host, const char *reason);
|
|
static void apply_kline(struct Client *source_p, struct ConfItem *aconf,
|
|
const char *reason, const char *oper_reason);
|
|
static void apply_tkline(struct Client *source_p, struct ConfItem *aconf,
|
|
const char *, const char *, int);
|
|
static void apply_prop_kline(struct Client *source_p, struct ConfItem *aconf,
|
|
const char *, const char *, int);
|
|
static bool already_placed_kline(struct Client *, const char *, const char *, int);
|
|
|
|
static void handle_remote_unkline(struct Client *source_p, const char *user, const char *host);
|
|
static void remove_permkline_match(struct Client *, struct ConfItem *);
|
|
static bool remove_temp_kline(struct Client *, struct ConfItem *);
|
|
static void remove_prop_kline(struct Client *, struct ConfItem *);
|
|
|
|
/* mo_kline()
|
|
*
|
|
* parv[1] - temp time or user@host
|
|
* parv[2] - user@host, "ON", or reason
|
|
* parv[3] - "ON", reason, or server to target
|
|
* parv[4] - server to target, or reason
|
|
* parv[5] - reason
|
|
*/
|
|
static void
|
|
mo_kline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char **parv)
|
|
{
|
|
char def[] = "No Reason";
|
|
char user[USERLEN + 2];
|
|
char host[HOSTLEN + 2];
|
|
char *reason = def;
|
|
char *oper_reason;
|
|
const char *target_server = NULL;
|
|
struct ConfItem *aconf;
|
|
int tkline_time = 0;
|
|
int loc = 1;
|
|
bool propagated = ConfigFileEntry.use_propagated_bans;
|
|
|
|
if(!IsOperK(source_p))
|
|
{
|
|
sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "kline");
|
|
return;
|
|
}
|
|
|
|
if((tkline_time = valid_temp_time(parv[loc])) >= 0)
|
|
loc++;
|
|
/* we just set tkline_time to -1! */
|
|
else
|
|
tkline_time = 0;
|
|
|
|
if(find_user_host(source_p, parv[loc], user, host) == 0)
|
|
return;
|
|
|
|
loc++;
|
|
|
|
if(parc >= loc + 2 && !irccmp(parv[loc], "ON"))
|
|
{
|
|
if(!IsOperRemoteBan(source_p))
|
|
{
|
|
sendto_one(source_p, form_str(ERR_NOPRIVS),
|
|
me.name, source_p->name, "remoteban");
|
|
return;
|
|
}
|
|
|
|
target_server = parv[loc + 1];
|
|
loc += 2;
|
|
}
|
|
|
|
if(parc <= loc || EmptyString(parv[loc]))
|
|
{
|
|
sendto_one(source_p, form_str(ERR_NEEDMOREPARAMS),
|
|
me.name, source_p->name, "KLINE");
|
|
return;
|
|
}
|
|
|
|
reason = LOCAL_COPY(parv[loc]);
|
|
|
|
if(target_server != NULL)
|
|
{
|
|
propagate_generic(source_p, "KLINE", target_server, CAP_KLN,
|
|
"%d %s %s :%s", tkline_time, user, host, reason);
|
|
|
|
/* If we are sending it somewhere that doesnt include us, stop */
|
|
if(!match(target_server, me.name))
|
|
return;
|
|
|
|
/* Set as local-only. */
|
|
propagated = false;
|
|
}
|
|
/* if we have cluster servers, send it to them.. */
|
|
else if(!propagated && rb_dlink_list_length(&cluster_conf_list) > 0)
|
|
cluster_generic(source_p, "KLINE",
|
|
(tkline_time > 0) ? SHARED_TKLINE : SHARED_PKLINE, CAP_KLN,
|
|
"%lu %s %s :%s", tkline_time, user, host, reason);
|
|
|
|
if(!valid_user_host(source_p, user, host))
|
|
return;
|
|
|
|
if(!valid_wild_card(user, host))
|
|
{
|
|
sendto_one_notice(source_p,
|
|
":Please include at least %d non-wildcard "
|
|
"characters with the user@host",
|
|
ConfigFileEntry.min_nonwildcard);
|
|
return;
|
|
}
|
|
|
|
if(propagated && tkline_time == 0)
|
|
{
|
|
sendto_one_notice(source_p, ":Cannot set a permanent global ban");
|
|
return;
|
|
}
|
|
|
|
if(already_placed_kline(source_p, user, host, tkline_time))
|
|
return;
|
|
|
|
rb_set_time();
|
|
aconf = make_conf();
|
|
aconf->status = CONF_KILL;
|
|
aconf->created = rb_current_time();
|
|
aconf->host = rb_strdup(host);
|
|
aconf->user = rb_strdup(user);
|
|
aconf->port = 0;
|
|
aconf->info.oper = operhash_add(get_oper_name(source_p));
|
|
|
|
if(strlen(reason) > BANREASONLEN)
|
|
reason[BANREASONLEN] = '\0';
|
|
|
|
/* Look for an oper reason */
|
|
if((oper_reason = strchr(reason, '|')) != NULL)
|
|
{
|
|
*oper_reason = '\0';
|
|
oper_reason++;
|
|
|
|
if(!EmptyString(oper_reason))
|
|
aconf->spasswd = rb_strdup(oper_reason);
|
|
}
|
|
aconf->passwd = rb_strdup(reason);
|
|
|
|
if(propagated)
|
|
apply_prop_kline(source_p, aconf, reason, oper_reason, tkline_time);
|
|
else if(tkline_time > 0)
|
|
apply_tkline(source_p, aconf, reason, oper_reason, tkline_time);
|
|
else
|
|
apply_kline(source_p, aconf, reason, oper_reason);
|
|
|
|
if(ConfigFileEntry.kline_delay)
|
|
{
|
|
if(!kline_queued)
|
|
{
|
|
rb_event_addonce("check_klines", check_klines_event, NULL,
|
|
ConfigFileEntry.kline_delay);
|
|
kline_queued = true;
|
|
}
|
|
}
|
|
else
|
|
check_klines();
|
|
}
|
|
|
|
/* ms_kline()
|
|
*
|
|
* parv[1] - server targeted at
|
|
* parv[2] - tkline time (0 if perm)
|
|
* parv[3] - user
|
|
* parv[4] - host
|
|
* parv[5] - reason
|
|
*/
|
|
static void
|
|
ms_kline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
|
|
{
|
|
int tkline_time = atoi(parv[2]);
|
|
|
|
/* 1.5-3 and earlier contains a bug that allows remote klines to be
|
|
* sent with an empty reason field. This is a protocol violation,
|
|
* but its not worth dropping the link over.. --anfl
|
|
*/
|
|
if(parc < 6 || EmptyString(parv[5]))
|
|
return;
|
|
|
|
propagate_generic(source_p, "KLINE", parv[1], CAP_KLN,
|
|
"%d %s %s :%s", tkline_time, parv[3], parv[4], parv[5]);
|
|
|
|
if(!match(parv[1], me.name))
|
|
return;
|
|
|
|
if(!IsPerson(source_p))
|
|
return;
|
|
|
|
handle_remote_kline(source_p, tkline_time, parv[3], parv[4], parv[5]);
|
|
}
|
|
|
|
static void
|
|
me_kline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
|
|
{
|
|
/* <tkline_time> <user> <host> :<reason> */
|
|
if(!IsPerson(source_p))
|
|
return;
|
|
|
|
handle_remote_kline(source_p, atoi(parv[1]), parv[2], parv[3], parv[4]);
|
|
}
|
|
|
|
static void
|
|
handle_remote_kline(struct Client *source_p, int tkline_time,
|
|
const char *user, const char *host, const char *kreason)
|
|
{
|
|
char *reason = LOCAL_COPY(kreason);
|
|
struct ConfItem *aconf = NULL;
|
|
char *oper_reason;
|
|
|
|
if(!find_shared_conf(source_p->username, source_p->host,
|
|
source_p->servptr->name,
|
|
(tkline_time > 0) ? SHARED_TKLINE : SHARED_PKLINE))
|
|
return;
|
|
|
|
if(!valid_user_host(source_p, user, host))
|
|
return;
|
|
|
|
if(!valid_wild_card(user, host))
|
|
{
|
|
sendto_one_notice(source_p,
|
|
":Please include at least %d non-wildcard "
|
|
"characters with the user@host",
|
|
ConfigFileEntry.min_nonwildcard);
|
|
return;
|
|
}
|
|
|
|
if(already_placed_kline(source_p, user, host, tkline_time))
|
|
return;
|
|
|
|
aconf = make_conf();
|
|
|
|
aconf->status = CONF_KILL;
|
|
aconf->created = rb_current_time();
|
|
aconf->user = rb_strdup(user);
|
|
aconf->host = rb_strdup(host);
|
|
aconf->info.oper = operhash_add(get_oper_name(source_p));
|
|
|
|
if(strlen(reason) > BANREASONLEN)
|
|
reason[BANREASONLEN] = '\0';
|
|
|
|
/* Look for an oper reason */
|
|
if((oper_reason = strchr(reason, '|')) != NULL)
|
|
{
|
|
*oper_reason = '\0';
|
|
oper_reason++;
|
|
|
|
if(!EmptyString(oper_reason))
|
|
aconf->spasswd = rb_strdup(oper_reason);
|
|
}
|
|
aconf->passwd = rb_strdup(reason);
|
|
|
|
if(tkline_time > 0)
|
|
apply_tkline(source_p, aconf, reason, oper_reason, tkline_time);
|
|
else
|
|
apply_kline(source_p, aconf, reason, oper_reason);
|
|
|
|
if(ConfigFileEntry.kline_delay)
|
|
{
|
|
if(!kline_queued)
|
|
{
|
|
rb_event_addonce("check_klines", check_klines_event, NULL,
|
|
ConfigFileEntry.kline_delay);
|
|
kline_queued = true;
|
|
}
|
|
}
|
|
else
|
|
check_klines();
|
|
}
|
|
|
|
/* mo_unkline()
|
|
*
|
|
* parv[1] - kline to remove
|
|
* parv[2] - optional "ON"
|
|
* parv[3] - optional target server
|
|
*/
|
|
static void
|
|
mo_unkline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
|
|
{
|
|
const char *user;
|
|
char *host;
|
|
char splat[] = "*";
|
|
char *h = LOCAL_COPY(parv[1]);
|
|
struct ConfItem *aconf;
|
|
bool propagated = true;
|
|
|
|
if(!IsOperUnkline(source_p))
|
|
{
|
|
sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "unkline");
|
|
return;
|
|
}
|
|
|
|
if((host = strchr(h, '@')) || *h == '*' || strchr(h, '.') || strchr(h, ':'))
|
|
{
|
|
/* Explicit user@host mask given */
|
|
|
|
if(host) /* Found user@host */
|
|
{
|
|
*host++ = '\0';
|
|
|
|
/* check for @host */
|
|
if(*h)
|
|
user = h;
|
|
else
|
|
user = splat;
|
|
|
|
/* check for user@ */
|
|
if(!*host)
|
|
host = splat;
|
|
}
|
|
else
|
|
{
|
|
user = splat; /* no @ found, assume its *@somehost */
|
|
host = h;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
sendto_one_notice(source_p, ":Invalid parameters");
|
|
return;
|
|
}
|
|
|
|
/* possible remote kline.. */
|
|
if((parc > 3) && (irccmp(parv[2], "ON") == 0))
|
|
{
|
|
if(!IsOperRemoteBan(source_p))
|
|
{
|
|
sendto_one(source_p, form_str(ERR_NOPRIVS),
|
|
me.name, source_p->name, "remoteban");
|
|
return;
|
|
}
|
|
|
|
propagate_generic(source_p, "UNKLINE", parv[3], CAP_UNKLN, "%s %s", user, host);
|
|
|
|
if(match(parv[3], me.name) == 0)
|
|
return;
|
|
|
|
propagated = false;
|
|
}
|
|
|
|
aconf = find_exact_conf_by_address(host, CONF_KILL, user);
|
|
|
|
/* No clustering for removing a propagated kline */
|
|
if(propagated && (aconf == NULL || !aconf->lifetime) &&
|
|
rb_dlink_list_length(&cluster_conf_list) > 0)
|
|
cluster_generic(source_p, "UNKLINE", SHARED_UNKLINE, CAP_UNKLN,
|
|
"%s %s", user, host);
|
|
|
|
if(aconf == NULL)
|
|
{
|
|
sendto_one_notice(source_p, ":No K-Line for %s@%s", user, host);
|
|
return;
|
|
}
|
|
|
|
if(aconf->lifetime)
|
|
{
|
|
if(propagated)
|
|
remove_prop_kline(source_p, aconf);
|
|
else
|
|
sendto_one_notice(source_p, ":Cannot remove global K-Line %s@%s on specific servers", user, host);
|
|
return;
|
|
}
|
|
|
|
if(remove_temp_kline(source_p, aconf))
|
|
return;
|
|
|
|
remove_permkline_match(source_p, aconf);
|
|
}
|
|
|
|
/* ms_unkline()
|
|
*
|
|
* parv[1] - target server
|
|
* parv[2] - user to unkline
|
|
* parv[3] - host to unkline
|
|
*/
|
|
static void
|
|
ms_unkline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
|
|
{
|
|
/* parv[0] parv[1] parv[2] parv[3]
|
|
* oper target server user host */
|
|
propagate_generic(source_p, "UNKLINE", parv[1], CAP_UNKLN, "%s %s", parv[2], parv[3]);
|
|
|
|
if(!match(parv[1], me.name))
|
|
return;
|
|
|
|
if(!IsPerson(source_p))
|
|
return;
|
|
|
|
handle_remote_unkline(source_p, parv[2], parv[3]);
|
|
}
|
|
|
|
static void
|
|
me_unkline(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
|
|
{
|
|
/* user host */
|
|
if(!IsPerson(source_p))
|
|
return;
|
|
|
|
handle_remote_unkline(source_p, parv[1], parv[2]);
|
|
}
|
|
|
|
static void
|
|
handle_remote_unkline(struct Client *source_p, const char *user, const char *host)
|
|
{
|
|
struct ConfItem *aconf;
|
|
|
|
if(!find_shared_conf(source_p->username, source_p->host,
|
|
source_p->servptr->name, SHARED_UNKLINE))
|
|
return;
|
|
|
|
aconf = find_exact_conf_by_address(host, CONF_KILL, user);
|
|
if(aconf == NULL)
|
|
{
|
|
sendto_one_notice(source_p, ":No K-Line for %s@%s", user, host);
|
|
return;
|
|
}
|
|
if(aconf->lifetime)
|
|
{
|
|
sendto_one_notice(source_p, ":Cannot remove global K-Line %s@%s on specific servers", user, host);
|
|
return;
|
|
}
|
|
|
|
if(remove_temp_kline(source_p, aconf))
|
|
return;
|
|
|
|
remove_permkline_match(source_p, aconf);
|
|
}
|
|
|
|
/* apply_kline()
|
|
*
|
|
* inputs -
|
|
* output - NONE
|
|
* side effects - kline as given, is added to the hashtable
|
|
* and conf file
|
|
*/
|
|
static void
|
|
apply_kline(struct Client *source_p, struct ConfItem *aconf,
|
|
const char *reason, const char *oper_reason)
|
|
{
|
|
add_conf_by_address(aconf->host, CONF_KILL, aconf->user, NULL, aconf);
|
|
bandb_add(BANDB_KLINE, source_p, aconf->user, aconf->host,
|
|
reason, EmptyString(oper_reason) ? NULL : oper_reason, 0);
|
|
|
|
/* no oper reason.. */
|
|
if(EmptyString(oper_reason))
|
|
{
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
"%s added K-Line for [%s@%s] [%s]",
|
|
get_oper_name(source_p), aconf->user, aconf->host, reason);
|
|
ilog(L_KLINE, "K %s 0 %s %s %s",
|
|
get_oper_name(source_p), aconf->user, aconf->host, reason);
|
|
}
|
|
else
|
|
{
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
"%s added K-Line for [%s@%s] [%s|%s]",
|
|
get_oper_name(source_p), aconf->user, aconf->host,
|
|
reason, oper_reason);
|
|
ilog(L_KLINE, "K %s 0 %s %s %s|%s",
|
|
get_oper_name(source_p), aconf->user, aconf->host, reason, oper_reason);
|
|
}
|
|
|
|
sendto_one_notice(source_p, ":Added K-Line [%s@%s]",
|
|
aconf->user, aconf->host);
|
|
}
|
|
|
|
/* apply_tkline()
|
|
*
|
|
* inputs -
|
|
* output - NONE
|
|
* side effects - tkline as given is placed
|
|
*/
|
|
static void
|
|
apply_tkline(struct Client *source_p, struct ConfItem *aconf,
|
|
const char *reason, const char *oper_reason, int tkline_time)
|
|
{
|
|
aconf->hold = rb_current_time() + tkline_time;
|
|
add_temp_kline(aconf);
|
|
|
|
/* no oper reason.. */
|
|
if(EmptyString(oper_reason))
|
|
{
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
"%s added temporary %d min. K-Line for [%s@%s] [%s]",
|
|
get_oper_name(source_p), tkline_time / 60,
|
|
aconf->user, aconf->host, reason);
|
|
ilog(L_KLINE, "K %s %d %s %s %s",
|
|
get_oper_name(source_p), tkline_time / 60, aconf->user, aconf->host, reason);
|
|
}
|
|
else
|
|
{
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
"%s added temporary %d min. K-Line for [%s@%s] [%s|%s]",
|
|
get_oper_name(source_p), tkline_time / 60,
|
|
aconf->user, aconf->host, reason, oper_reason);
|
|
ilog(L_KLINE, "K %s %d %s %s %s|%s",
|
|
get_oper_name(source_p), tkline_time / 60,
|
|
aconf->user, aconf->host, reason, oper_reason);
|
|
}
|
|
|
|
sendto_one_notice(source_p, ":Added temporary %d min. K-Line [%s@%s]",
|
|
tkline_time / 60, aconf->user, aconf->host);
|
|
}
|
|
|
|
static void
|
|
apply_prop_kline(struct Client *source_p, struct ConfItem *aconf,
|
|
const char *reason, const char *oper_reason, int tkline_time)
|
|
{
|
|
aconf->flags |= CONF_FLAGS_MYOPER | CONF_FLAGS_TEMPORARY;
|
|
aconf->hold = rb_current_time() + tkline_time;
|
|
aconf->lifetime = aconf->hold;
|
|
|
|
replace_old_ban(aconf);
|
|
|
|
rb_dlinkAddAlloc(aconf, &prop_bans);
|
|
add_conf_by_address(aconf->host, CONF_KILL, aconf->user, NULL, aconf);
|
|
|
|
/* no oper reason.. */
|
|
if(EmptyString(oper_reason))
|
|
{
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
"%s added global %d min. K-Line for [%s@%s] [%s]",
|
|
get_oper_name(source_p), tkline_time / 60,
|
|
aconf->user, aconf->host, reason);
|
|
ilog(L_KLINE, "K %s %d %s %s %s",
|
|
get_oper_name(source_p), tkline_time / 60, aconf->user, aconf->host, reason);
|
|
}
|
|
else
|
|
{
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
"%s added global %d min. K-Line for [%s@%s] [%s|%s]",
|
|
get_oper_name(source_p), tkline_time / 60,
|
|
aconf->user, aconf->host, reason, oper_reason);
|
|
ilog(L_KLINE, "K %s %d %s %s %s|%s",
|
|
get_oper_name(source_p), tkline_time / 60,
|
|
aconf->user, aconf->host, reason, oper_reason);
|
|
}
|
|
|
|
sendto_one_notice(source_p, ":Added global %d min. K-Line [%s@%s]",
|
|
tkline_time / 60, aconf->user, aconf->host);
|
|
|
|
sendto_server(NULL, NULL, CAP_BAN|CAP_TS6, NOCAPS,
|
|
":%s BAN K %s %s %lu %d %d * :%s%s%s",
|
|
source_p->id, aconf->user, aconf->host,
|
|
(unsigned long)aconf->created,
|
|
(int)(aconf->hold - aconf->created),
|
|
(int)(aconf->lifetime - aconf->created),
|
|
reason,
|
|
oper_reason ? "|" : "",
|
|
oper_reason ? oper_reason : "");
|
|
}
|
|
|
|
/* find_user_host()
|
|
*
|
|
* inputs - client placing kline, user@host, user buffer, host buffer
|
|
* output - false if not ok to kline, true to kline i.e. if valid user host
|
|
* side effects -
|
|
*/
|
|
static bool
|
|
find_user_host(struct Client *source_p, const char *userhost, char *luser, char *lhost)
|
|
{
|
|
char *hostp;
|
|
|
|
hostp = (char *)strchr(userhost, '@');
|
|
|
|
if(hostp != NULL) /* I'm a little user@host */
|
|
{
|
|
*(hostp++) = '\0'; /* short and squat */
|
|
if(*userhost)
|
|
rb_strlcpy(luser, userhost, USERLEN + 1); /* here is my user */
|
|
else
|
|
strcpy(luser, "*");
|
|
if(*hostp)
|
|
rb_strlcpy(lhost, hostp, HOSTLEN + 1); /* here is my host */
|
|
else
|
|
strcpy(lhost, "*");
|
|
}
|
|
else
|
|
{
|
|
/* no '@', no '.', so its not a user@host or host, therefore
|
|
* its a nick, which support was removed for.
|
|
*/
|
|
if(strchr(userhost, '.') == NULL && strchr(userhost, ':') == NULL)
|
|
{
|
|
sendto_one_notice(source_p, ":K-Line must be a user@host or host");
|
|
return false;
|
|
}
|
|
|
|
luser[0] = '*'; /* no @ found, assume its *@somehost */
|
|
luser[1] = '\0';
|
|
rb_strlcpy(lhost, userhost, HOSTLEN + 1);
|
|
}
|
|
|
|
/* would break the protocol */
|
|
if (*luser == ':' || *lhost == ':')
|
|
{
|
|
sendto_one_notice(source_p, ":Invalid K-Line");
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/* valid_user_host()
|
|
*
|
|
* inputs - user buffer, host buffer
|
|
* output - false if invalid, true if valid
|
|
* side effects -
|
|
*/
|
|
static bool
|
|
valid_user_host(struct Client *source_p, const char *luser, const char *lhost)
|
|
{
|
|
/* # is invalid, as are '!' (n!u@h kline) and '@' (u@@h kline) */
|
|
if(strchr(lhost, '#') || strchr(luser, '#') || strchr(luser, '!') || strchr(lhost, '@'))
|
|
{
|
|
sendto_one_notice(source_p, ":Invalid K-Line");
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/* already_placed_kline()
|
|
*
|
|
* inputs - source to notify, user@host to check, tkline time
|
|
* outputs - true if a perm kline or a tkline when a tkline is being
|
|
* set exists, else false
|
|
* side effects - notifies source_p kline exists
|
|
*/
|
|
/* Note: This currently works if the new K-line is a special case of an
|
|
* existing K-line, but not the other way round. To do that we would
|
|
* have to walk the hash and check every existing K-line. -A1kmm.
|
|
*/
|
|
static bool
|
|
already_placed_kline(struct Client *source_p, const char *luser, const char *lhost, int tkline)
|
|
{
|
|
const char *reason, *p;
|
|
struct rb_sockaddr_storage iphost, *piphost;
|
|
struct ConfItem *aconf;
|
|
int t, bits;
|
|
|
|
aconf = find_exact_conf_by_address(lhost, CONF_KILL, luser);
|
|
if(aconf == NULL && ConfigFileEntry.non_redundant_klines)
|
|
{
|
|
bits = 0;
|
|
if((t = parse_netmask(lhost, &iphost, &bits)) != HM_HOST)
|
|
{
|
|
#ifdef RB_IPV6
|
|
if(t == HM_IPV6)
|
|
t = AF_INET6;
|
|
else
|
|
#endif
|
|
t = AF_INET;
|
|
|
|
piphost = &iphost;
|
|
}
|
|
else
|
|
piphost = NULL;
|
|
|
|
aconf = find_conf_by_address(lhost, NULL, NULL, (struct sockaddr *) piphost,
|
|
CONF_KILL, t, luser, NULL);
|
|
if(aconf != NULL)
|
|
{
|
|
/* The above was really a lookup of a single IP,
|
|
* so check if the new kline is wider than the
|
|
* existing one.
|
|
* -- jilles
|
|
*/
|
|
p = strchr(aconf->host, '/');
|
|
if(bits > 0 && (p == NULL || bits < atoi(p + 1)))
|
|
aconf = NULL;
|
|
}
|
|
}
|
|
if(aconf != NULL)
|
|
{
|
|
/* setting a tkline, or existing one is perm */
|
|
if(tkline || ((aconf->flags & CONF_FLAGS_TEMPORARY) == 0))
|
|
{
|
|
reason = aconf->passwd ? aconf->passwd : "<No Reason>";
|
|
|
|
sendto_one_notice(source_p,
|
|
":[%s@%s] already K-Lined by [%s@%s] - %s",
|
|
luser, lhost, aconf->user, aconf->host, reason);
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
/* remove_permkline_match()
|
|
*
|
|
* hunts for a permanent kline, and removes it.
|
|
*/
|
|
static void
|
|
remove_permkline_match(struct Client *source_p, struct ConfItem *aconf)
|
|
{
|
|
sendto_one_notice(source_p, ":K-Line for [%s@%s] is removed", aconf->user, aconf->host);
|
|
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
"%s has removed the K-Line for: [%s@%s]",
|
|
get_oper_name(source_p), aconf->user, aconf->host);
|
|
|
|
ilog(L_KLINE, "UK %s %s %s", get_oper_name(source_p), aconf->user, aconf->host);
|
|
|
|
remove_reject_mask(aconf->user, aconf->host);
|
|
bandb_del(BANDB_KLINE, aconf->user, aconf->host);
|
|
delete_one_address_conf(aconf->host, aconf);
|
|
}
|
|
|
|
/* remove_temp_kline()
|
|
*
|
|
* inputs - username, hostname to unkline
|
|
* outputs -
|
|
* side effects - tries to unkline anything that matches
|
|
*/
|
|
static bool
|
|
remove_temp_kline(struct Client *source_p, struct ConfItem *aconf)
|
|
{
|
|
rb_dlink_node *ptr;
|
|
int i;
|
|
|
|
for(i = 0; i < LAST_TEMP_TYPE; i++)
|
|
{
|
|
RB_DLINK_FOREACH(ptr, temp_klines[i].head)
|
|
{
|
|
if(aconf == ptr->data)
|
|
{
|
|
sendto_one_notice(source_p,
|
|
":Un-klined [%s@%s] from temporary k-lines",
|
|
aconf->user, aconf->host);
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
"%s has removed the temporary K-Line for: [%s@%s]",
|
|
get_oper_name(source_p), aconf->user,
|
|
aconf->host);
|
|
|
|
ilog(L_KLINE, "UK %s %s %s",
|
|
get_oper_name(source_p), aconf->user, aconf->host);
|
|
rb_dlinkDestroy(ptr, &temp_klines[i]);
|
|
remove_reject_mask(aconf->user, aconf->host);
|
|
delete_one_address_conf(aconf->host, aconf);
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static void
|
|
remove_prop_kline(struct Client *source_p, struct ConfItem *aconf)
|
|
{
|
|
rb_dlink_node *ptr;
|
|
time_t now;
|
|
|
|
ptr = rb_dlinkFind(aconf, &prop_bans);
|
|
if (!ptr)
|
|
return;
|
|
sendto_one_notice(source_p,
|
|
":Un-klined [%s@%s] from global k-lines",
|
|
aconf->user, aconf->host);
|
|
sendto_realops_snomask(SNO_GENERAL, L_ALL,
|
|
"%s has removed the global K-Line for: [%s@%s]",
|
|
get_oper_name(source_p), aconf->user,
|
|
aconf->host);
|
|
|
|
ilog(L_KLINE, "UK %s %s %s",
|
|
get_oper_name(source_p), aconf->user, aconf->host);
|
|
now = rb_current_time();
|
|
if(aconf->created < now)
|
|
aconf->created = now;
|
|
else
|
|
aconf->created++;
|
|
aconf->hold = aconf->created;
|
|
operhash_delete(aconf->info.oper);
|
|
aconf->info.oper = operhash_add(get_oper_name(source_p));
|
|
aconf->flags |= CONF_FLAGS_MYOPER | CONF_FLAGS_TEMPORARY;
|
|
sendto_server(NULL, NULL, CAP_BAN|CAP_TS6, NOCAPS,
|
|
":%s BAN K %s %s %lu %d %d * :*",
|
|
source_p->id, aconf->user, aconf->host,
|
|
(unsigned long)aconf->created,
|
|
0,
|
|
(int)(aconf->lifetime - aconf->created));
|
|
remove_reject_mask(aconf->user, aconf->host);
|
|
deactivate_conf(aconf, ptr, now);
|
|
}
|