ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/branches/newio/src/s_serv.c
Revision: 2212
Committed: Wed Jun 5 22:04:03 2013 UTC (10 years, 10 months ago) by michael
Content type: text/x-csrc
Original Path: ircd-hybrid/trunk/src/s_serv.c
File size: 43677 byte(s)
Log Message:
- s_serv.c:write_links_file(): replaced a dlinkAdd() with dlinkAddTail()

File Contents

# User Rev Content
1 adx 30 /*
2     * ircd-hybrid: an advanced Internet Relay Chat Daemon(ircd).
3     * s_serv.c: Server related functions.
4     *
5     * Copyright (C) 2005 by the past and present ircd coders, and others.
6     *
7     * This program is free software; you can redistribute it and/or modify
8     * it under the terms of the GNU General Public License as published by
9     * the Free Software Foundation; either version 2 of the License, or
10     * (at your option) any later version.
11     *
12     * This program is distributed in the hope that it will be useful,
13     * but WITHOUT ANY WARRANTY; without even the implied warranty of
14     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15     * GNU General Public License for more details.
16     *
17     * You should have received a copy of the GNU General Public License
18     * along with this program; if not, write to the Free Software
19     * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
20     * USA
21     *
22 knight 31 * $Id$
23 adx 30 */
24    
25     #include "stdinc.h"
26     #ifdef HAVE_LIBCRYPTO
27     #include <openssl/rsa.h>
28     #include "rsa.h"
29     #endif
30 michael 1011 #include "list.h"
31 adx 30 #include "channel.h"
32     #include "channel_mode.h"
33     #include "client.h"
34     #include "dbuf.h"
35     #include "event.h"
36     #include "fdlist.h"
37     #include "hash.h"
38     #include "irc_string.h"
39     #include "ircd.h"
40     #include "ircd_defs.h"
41     #include "s_bsd.h"
42     #include "numeric.h"
43     #include "packet.h"
44     #include "irc_res.h"
45 michael 1309 #include "conf.h"
46 adx 30 #include "s_serv.h"
47 michael 1309 #include "log.h"
48 michael 1303 #include "s_misc.h"
49 adx 30 #include "s_user.h"
50     #include "send.h"
51     #include "memory.h"
52     #include "channel.h" /* chcap_usage_counts stuff...*/
53 michael 1243 #include "parse.h"
54 adx 30
55     #define MIN_CONN_FREQ 300
56    
57 michael 2156 dlink_list flatten_links;
58 adx 30 static dlink_list cap_list = { NULL, NULL, 0 };
59     static void server_burst(struct Client *);
60     static void burst_all(struct Client *);
61     static void send_tb(struct Client *client_p, struct Channel *chptr);
62    
63     static CNCB serv_connect_callback;
64    
65     static void burst_members(struct Client *, struct Channel *);
66    
67     /*
68     * write_links_file
69     *
70     * inputs - void pointer which is not used
71     * output - NONE
72     * side effects - called from an event, write out list of linked servers
73     * but in no particular order.
74     */
75     void
76 michael 2156 write_links_file(void *notused)
77 adx 30 {
78 michael 2156 FILE *file = NULL;
79     dlink_node *ptr = NULL, *ptr_next = NULL;;
80     char buff[IRCD_BUFSIZE] = { '\0' };
81 adx 30
82 michael 2156 if ((file = fopen(LIPATH, "w")) == NULL)
83 adx 30 return;
84    
85 michael 2156 DLINK_FOREACH_SAFE(ptr, ptr_next, flatten_links.head)
86 adx 30 {
87 michael 2156 dlinkDelete(ptr, &flatten_links);
88     MyFree(ptr->data);
89     free_dlink_node(ptr);
90 adx 30 }
91    
92     DLINK_FOREACH(ptr, global_serv_list.head)
93     {
94 michael 1325 const struct Client *target_p = ptr->data;
95 adx 30
96 michael 2156 /*
97     * Skip hidden servers, aswell as ourselves, since we already send
98     * ourselves in /links
99     */
100     if (IsHidden(target_p) || IsMe(target_p))
101 adx 30 continue;
102    
103 michael 1851 if (HasFlag(target_p, FLAGS_SERVICE) && ConfigServerHide.hide_services)
104     continue;
105    
106 michael 1545 /*
107     * Attempt to format the file in such a way it follows the usual links output
108 adx 30 * ie "servername uplink :hops info"
109     * Mostly for aesthetic reasons - makes it look pretty in mIRC ;)
110     * - madmax
111     */
112 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s", target_p->name,
113     me.name, target_p->info);
114 michael 2212 dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
115 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s\n", target_p->name,
116     me.name, target_p->info);
117 adx 30
118 michael 1325 fputs(buff, file);
119 adx 30 }
120    
121 michael 1325 fclose(file);
122 adx 30 }
123    
124     /* hunt_server()
125     * Do the basic thing in delivering the message (command)
126     * across the relays to the specific server (server) for
127     * actions.
128     *
129     * Note: The command is a format string and *MUST* be
130     * of prefixed style (e.g. ":%s COMMAND %s ...").
131     * Command can have only max 8 parameters.
132     *
133     * server parv[server] is the parameter identifying the
134     * target server.
135     *
136     * *WARNING*
137     * parv[server] is replaced with the pointer to the
138     * real servername from the matched client (I'm lazy
139     * now --msa).
140     *
141     * returns: (see #defines)
142     */
143     int
144     hunt_server(struct Client *client_p, struct Client *source_p, const char *command,
145 michael 1857 const int server, const int parc, char *parv[])
146 adx 30 {
147     struct Client *target_p = NULL;
148     struct Client *target_tmp = NULL;
149     dlink_node *ptr;
150     int wilds;
151    
152 michael 1344 /* Assume it's me, if no server */
153     if (parc <= server || EmptyString(parv[server]))
154     return HUNTED_ISME;
155 adx 30
156 michael 1652 if (!strcmp(parv[server], me.id) || !match(parv[server], me.name))
157 michael 1344 return HUNTED_ISME;
158    
159 adx 30 /* These are to pickup matches that would cause the following
160     * message to go in the wrong direction while doing quick fast
161     * non-matching lookups.
162     */
163     if (MyClient(source_p))
164 michael 1169 target_p = hash_find_client(parv[server]);
165 adx 30 else
166     target_p = find_person(client_p, parv[server]);
167    
168     if (target_p)
169     if (target_p->from == source_p->from && !MyConnect(target_p))
170     target_p = NULL;
171    
172 michael 1169 if (target_p == NULL && (target_p = hash_find_server(parv[server])))
173 adx 30 if (target_p->from == source_p->from && !MyConnect(target_p))
174     target_p = NULL;
175    
176 michael 1400 wilds = has_wildcards(parv[server]);
177 adx 30
178     /* Again, if there are no wild cards involved in the server
179     * name, use the hash lookup
180     */
181     if (target_p == NULL)
182     {
183     if (!wilds)
184     {
185 michael 1169 if (!(target_p = hash_find_server(parv[server])))
186 adx 30 {
187 michael 1834 sendto_one(source_p, form_str(ERR_NOSUCHSERVER),
188 michael 1234 me.name, source_p->name, parv[server]);
189 michael 2182 return HUNTED_NOSUCH;
190 adx 30 }
191     }
192     else
193     {
194     DLINK_FOREACH(ptr, global_client_list.head)
195     {
196     target_tmp = ptr->data;
197    
198 michael 1652 if (!match(parv[server], target_tmp->name))
199 adx 30 {
200     if (target_tmp->from == source_p->from && !MyConnect(target_tmp))
201     continue;
202     target_p = ptr->data;
203    
204     if (IsRegistered(target_p) && (target_p != client_p))
205     break;
206     }
207     }
208     }
209     }
210    
211     if (target_p != NULL)
212     {
213     if(!IsRegistered(target_p))
214     {
215 michael 1834 sendto_one(source_p, form_str(ERR_NOSUCHSERVER),
216 michael 1234 me.name, source_p->name, parv[server]);
217 adx 30 return HUNTED_NOSUCH;
218     }
219    
220     if (IsMe(target_p) || MyClient(target_p))
221     return HUNTED_ISME;
222    
223 michael 1652 if (match(target_p->name, parv[server]))
224 adx 30 parv[server] = target_p->name;
225    
226     /* This is a little kludgy but should work... */
227     if (IsClient(source_p) &&
228     ((MyConnect(target_p) && IsCapable(target_p, CAP_TS6)) ||
229     (!MyConnect(target_p) && IsCapable(target_p->from, CAP_TS6))))
230     parv[0] = ID(source_p);
231    
232     sendto_one(target_p, command, parv[0],
233     parv[1], parv[2], parv[3], parv[4],
234     parv[5], parv[6], parv[7], parv[8]);
235 michael 2134 return HUNTED_PASS;
236 adx 30 }
237    
238 michael 1834 sendto_one(source_p, form_str(ERR_NOSUCHSERVER),
239 michael 1234 me.name, source_p->name, parv[server]);
240 michael 2134 return HUNTED_NOSUCH;
241 adx 30 }
242    
243     /* try_connections()
244     *
245     * inputs - void pointer which is not used
246     * output - NONE
247     * side effects -
248     * scan through configuration and try new connections.
249     * Returns the calendar time when the next call to this
250     * function should be made latest. (No harm done if this
251     * is called earlier or later...)
252     */
253     void
254     try_connections(void *unused)
255     {
256 michael 1632 dlink_node *ptr = NULL;
257     struct MaskItem *conf;
258 adx 30 int confrq;
259    
260     /* TODO: change this to set active flag to 0 when added to event! --Habeeb */
261     if (GlobalSetOptions.autoconn == 0)
262     return;
263    
264     DLINK_FOREACH(ptr, server_items.head)
265     {
266     conf = ptr->data;
267    
268 michael 1636 assert(conf->type == CONF_SERVER);
269 michael 1632
270 adx 30 /* Also when already connecting! (update holdtimes) --SRB
271     */
272 michael 1632 if (!conf->port ||!IsConfAllowAutoConn(conf))
273 adx 30 continue;
274    
275    
276     /* Skip this entry if the use of it is still on hold until
277     * future. Otherwise handle this entry (and set it on hold
278     * until next time). Will reset only hold times, if already
279     * made one successfull connection... [this algorithm is
280     * a bit fuzzy... -- msa >;) ]
281     */
282 michael 1649 if (conf->until > CurrentTime)
283 adx 30 continue;
284    
285 michael 1632 if (conf->class == NULL)
286 adx 30 confrq = DEFAULT_CONNECTFREQUENCY;
287     else
288     {
289 michael 1632 confrq = conf->class->con_freq;
290 michael 1377 if (confrq < MIN_CONN_FREQ)
291 michael 2134 confrq = MIN_CONN_FREQ;
292 adx 30 }
293    
294 michael 1649 conf->until = CurrentTime + confrq;
295 adx 30
296     /* Found a CONNECT config with port specified, scan clients
297     * and see if this server is already connected?
298     */
299 michael 1169 if (hash_find_server(conf->name) != NULL)
300 adx 30 continue;
301    
302 michael 1632 if (conf->class->ref_count < conf->class->max_total)
303 adx 30 {
304     /* Go to the end of the list, if not already last */
305     if (ptr->next != NULL)
306     {
307     dlinkDelete(ptr, &server_items);
308     dlinkAddTail(conf, &conf->node, &server_items);
309     }
310    
311     if (find_servconn_in_progress(conf->name))
312     return;
313    
314     /* We used to only print this if serv_connect() actually
315     * succeeded, but since comm_tcp_connect() can call the callback
316     * immediately if there is an error, we were getting error messages
317     * in the wrong order. SO, we just print out the activated line,
318     * and let serv_connect() / serv_connect_callback() print an
319     * error afterwards if it fails.
320     * -- adrian
321     */
322     if (ConfigServerHide.hide_server_ips)
323 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
324     "Connection to %s activated.",
325 adx 30 conf->name);
326     else
327 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
328     "Connection to %s[%s] activated.",
329 michael 1632 conf->name, conf->host);
330 adx 30
331 michael 1632 serv_connect(conf, NULL);
332 adx 30 /* We connect only one at time... */
333     return;
334     }
335     }
336     }
337    
338     int
339 michael 1115 valid_servname(const char *name)
340     {
341     unsigned int length = 0;
342     unsigned int dots = 0;
343     const char *p = name;
344    
345     for (; *p; ++p)
346     {
347     if (!IsServChar(*p))
348 michael 1118 return 0;
349 michael 1115
350     ++length;
351    
352     if (*p == '.')
353     ++dots;
354     }
355    
356 michael 1118 return dots != 0 && length <= HOSTLEN;
357 michael 1115 }
358    
359     int
360 michael 1302 check_server(const char *name, struct Client *client_p)
361 adx 30 {
362     dlink_node *ptr;
363 michael 1632 struct MaskItem *conf = NULL;
364     struct MaskItem *server_conf = NULL;
365 adx 30 int error = -1;
366    
367     assert(client_p != NULL);
368    
369     /* loop through looking for all possible connect items that might work */
370     DLINK_FOREACH(ptr, server_items.head)
371     {
372     conf = ptr->data;
373    
374 michael 1652 if (match(name, conf->name))
375 adx 30 continue;
376    
377     error = -3;
378    
379     /* XXX: Fix me for IPv6 */
380     /* XXX sockhost is the IPv4 ip as a string */
381 michael 1652 if (!match(conf->host, client_p->host) ||
382     !match(conf->host, client_p->sockhost))
383 adx 30 {
384     error = -2;
385    
386 michael 1632 if (!match_conf_password(client_p->localClient->passwd, conf))
387 michael 1414 return -2;
388 adx 30
389 michael 1414 server_conf = conf;
390 adx 30 }
391     }
392    
393     if (server_conf == NULL)
394 michael 2182 return error;
395 adx 30
396     attach_conf(client_p, server_conf);
397    
398    
399 michael 1632 if (server_conf != NULL)
400 adx 30 {
401     struct sockaddr_in *v4;
402     #ifdef IPV6
403     struct sockaddr_in6 *v6;
404     #endif
405 michael 1632 switch (server_conf->aftype)
406 adx 30 {
407     #ifdef IPV6
408     case AF_INET6:
409 michael 1632 v6 = (struct sockaddr_in6 *)&server_conf->addr;
410 adx 30
411     if (IN6_IS_ADDR_UNSPECIFIED(&v6->sin6_addr))
412 michael 1632 memcpy(&server_conf->addr, &client_p->localClient->ip, sizeof(struct irc_ssaddr));
413 adx 30 break;
414     #endif
415     case AF_INET:
416 michael 1632 v4 = (struct sockaddr_in *)&server_conf->addr;
417 adx 30
418     if (v4->sin_addr.s_addr == INADDR_NONE)
419 michael 1632 memcpy(&server_conf->addr, &client_p->localClient->ip, sizeof(struct irc_ssaddr));
420 adx 30 break;
421     }
422     }
423    
424 michael 2182 return 0;
425 adx 30 }
426    
427     /* add_capability()
428     *
429     * inputs - string name of CAPAB
430     * - int flag of capability
431     * output - NONE
432     * side effects - Adds given capability name and bit mask to
433     * current supported capabilities. This allows
434     * modules to dynamically add or subtract their capability.
435     */
436     void
437     add_capability(const char *capab_name, int cap_flag, int add_to_default)
438     {
439 michael 885 struct Capability *cap = MyMalloc(sizeof(*cap));
440 adx 30
441 michael 1646 cap->name = xstrdup(capab_name);
442 adx 30 cap->cap = cap_flag;
443     dlinkAdd(cap, &cap->node, &cap_list);
444 michael 885
445 adx 30 if (add_to_default)
446     default_server_capabs |= cap_flag;
447     }
448    
449     /* delete_capability()
450     *
451     * inputs - string name of CAPAB
452     * output - NONE
453     * side effects - delete given capability from ones known.
454     */
455     int
456     delete_capability(const char *capab_name)
457     {
458     dlink_node *ptr;
459     dlink_node *next_ptr;
460     struct Capability *cap;
461    
462     DLINK_FOREACH_SAFE(ptr, next_ptr, cap_list.head)
463     {
464     cap = ptr->data;
465    
466     if (cap->cap != 0)
467     {
468     if (irccmp(cap->name, capab_name) == 0)
469     {
470 michael 2134 default_server_capabs &= ~(cap->cap);
471     dlinkDelete(ptr, &cap_list);
472     MyFree(cap->name);
473     MyFree(cap);
474 adx 30 }
475     }
476     }
477    
478 michael 896 return 0;
479 adx 30 }
480    
481     /*
482     * find_capability()
483     *
484     * inputs - string name of capab to find
485     * output - 0 if not found CAPAB otherwise
486     * side effects - none
487     */
488 michael 1877 unsigned int
489 adx 30 find_capability(const char *capab)
490     {
491 michael 896 const dlink_node *ptr = NULL;
492 adx 30
493     DLINK_FOREACH(ptr, cap_list.head)
494     {
495 michael 896 const struct Capability *cap = ptr->data;
496 adx 30
497 michael 896 if (cap->cap && !irccmp(cap->name, capab))
498     return cap->cap;
499 adx 30 }
500 michael 896
501     return 0;
502 adx 30 }
503    
504     /* send_capabilities()
505     *
506     * inputs - Client pointer to send to
507     * - int flag of capabilities that this server can send
508     * output - NONE
509     * side effects - send the CAPAB line to a server -orabidoo
510     *
511     */
512     void
513 michael 1632 send_capabilities(struct Client *client_p, int cap_can_send)
514 adx 30 {
515     struct Capability *cap=NULL;
516     char msgbuf[IRCD_BUFSIZE];
517     char *t;
518     int tl;
519     dlink_node *ptr;
520    
521     t = msgbuf;
522    
523     DLINK_FOREACH(ptr, cap_list.head)
524     {
525     cap = ptr->data;
526    
527     if (cap->cap & (cap_can_send|default_server_capabs))
528     {
529 michael 1793 tl = sprintf(t, "%s ", cap->name);
530 adx 30 t += tl;
531     }
532     }
533    
534 michael 319 *(t - 1) = '\0';
535 adx 30 sendto_one(client_p, "CAPAB :%s", msgbuf);
536     }
537    
538     /* sendnick_TS()
539     *
540     * inputs - client (server) to send nick towards
541 adx 386 * - client to send nick for
542 adx 30 * output - NONE
543     * side effects - NICK message is sent towards given client_p
544     */
545     void
546     sendnick_TS(struct Client *client_p, struct Client *target_p)
547     {
548     static char ubuf[12];
549    
550     if (!IsClient(target_p))
551     return;
552    
553 michael 1294 send_umode(NULL, target_p, 0, SEND_UMODES, ubuf);
554 adx 30
555     if (ubuf[0] == '\0')
556     {
557     ubuf[0] = '+';
558     ubuf[1] = '\0';
559     }
560    
561 michael 1196 if (IsCapable(client_p, CAP_SVS))
562     {
563     if (HasID(target_p) && IsCapable(client_p, CAP_TS6))
564 michael 1559 sendto_one(client_p, ":%s UID %s %d %lu %s %s %s %s %s %s :%s",
565 michael 1196 target_p->servptr->id,
566     target_p->name, target_p->hopcount + 1,
567     (unsigned long) target_p->tsinfo,
568     ubuf, target_p->username, target_p->host,
569     (MyClient(target_p) && IsIPSpoof(target_p)) ?
570     "0" : target_p->sockhost, target_p->id,
571 michael 1559 target_p->svid, target_p->info);
572 michael 1196 else
573 michael 1559 sendto_one(client_p, "NICK %s %d %lu %s %s %s %s %s :%s",
574 michael 1196 target_p->name, target_p->hopcount + 1,
575     (unsigned long) target_p->tsinfo,
576     ubuf, target_p->username, target_p->host,
577 michael 1559 target_p->servptr->name, target_p->svid,
578 michael 1196 target_p->info);
579     }
580 adx 30 else
581 michael 1196 {
582     if (HasID(target_p) && IsCapable(client_p, CAP_TS6))
583     sendto_one(client_p, ":%s UID %s %d %lu %s %s %s %s %s :%s",
584     target_p->servptr->id,
585     target_p->name, target_p->hopcount + 1,
586     (unsigned long) target_p->tsinfo,
587     ubuf, target_p->username, target_p->host,
588     (MyClient(target_p) && IsIPSpoof(target_p)) ?
589     "0" : target_p->sockhost, target_p->id, target_p->info);
590     else
591     sendto_one(client_p, "NICK %s %d %lu %s %s %s %s :%s",
592     target_p->name, target_p->hopcount + 1,
593     (unsigned long) target_p->tsinfo,
594     ubuf, target_p->username, target_p->host,
595     target_p->servptr->name, target_p->info);
596     }
597 adx 386
598 michael 1519 if (target_p->away[0])
599     sendto_one(client_p, ":%s AWAY :%s", ID_or_name(target_p, client_p),
600     target_p->away);
601 adx 30
602     }
603    
604     /*
605     * show_capabilities - show current server capabilities
606     *
607     * inputs - pointer to a struct Client
608     * output - pointer to static string
609     * side effects - build up string representing capabilities of server listed
610     */
611     const char *
612     show_capabilities(struct Client *target_p)
613     {
614     static char msgbuf[IRCD_BUFSIZE];
615     char *t = msgbuf;
616     dlink_node *ptr;
617    
618 michael 1793 t += sprintf(msgbuf, "TS ");
619 adx 30
620     DLINK_FOREACH(ptr, cap_list.head)
621     {
622     const struct Capability *cap = ptr->data;
623    
624     if (IsCapable(target_p, cap->cap))
625 michael 1793 t += sprintf(t, "%s ", cap->name);
626 adx 30 }
627 michael 1302
628 adx 30 *(t - 1) = '\0';
629 michael 1302 return msgbuf;
630 adx 30 }
631    
632     /* make_server()
633     *
634     * inputs - pointer to client struct
635     * output - pointer to struct Server
636     * side effects - add's an Server information block to a client
637     * if it was not previously allocated.
638     */
639     struct Server *
640     make_server(struct Client *client_p)
641     {
642     if (client_p->serv == NULL)
643     client_p->serv = MyMalloc(sizeof(struct Server));
644    
645     return client_p->serv;
646     }
647    
648     /* server_estab()
649     *
650     * inputs - pointer to a struct Client
651     * output -
652     * side effects -
653     */
654     void
655     server_estab(struct Client *client_p)
656     {
657     struct Client *target_p;
658 michael 1632 struct MaskItem *conf = NULL;
659 adx 30 char *host;
660     const char *inpath;
661     static char inpath_ip[HOSTLEN * 2 + USERLEN + 6];
662     dlink_node *ptr;
663 michael 1305 #ifdef HAVE_LIBCRYPTO
664     const COMP_METHOD *compression = NULL, *expansion = NULL;
665     #endif
666 adx 30
667     assert(client_p != NULL);
668    
669     strlcpy(inpath_ip, get_client_name(client_p, SHOW_IP), sizeof(inpath_ip));
670    
671     inpath = get_client_name(client_p, MASK_IP); /* "refresh" inpath with host */
672     host = client_p->name;
673    
674 michael 1632 if ((conf = find_conf_name(&client_p->localClient->confs, host, CONF_SERVER))
675 adx 30 == NULL)
676     {
677     /* This shouldn't happen, better tell the ops... -A1kmm */
678 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
679     "Warning: Lost connect{} block "
680 adx 30 "for server %s(this shouldn't happen)!", host);
681     exit_client(client_p, &me, "Lost connect{} block!");
682     return;
683     }
684    
685     MyFree(client_p->localClient->passwd);
686     client_p->localClient->passwd = NULL;
687    
688     /* Its got identd, since its a server */
689     SetGotId(client_p);
690    
691     /* If there is something in the serv_list, it might be this
692     * connecting server..
693     */
694     if (!ServerInfo.hub && serv_list.head)
695     {
696     if (client_p != serv_list.head->data || serv_list.head->next)
697     {
698 michael 896 ++ServerStats.is_ref;
699 adx 30 sendto_one(client_p, "ERROR :I'm a leaf not a hub");
700     exit_client(client_p, &me, "I'm a leaf");
701     return;
702     }
703     }
704    
705 michael 1302 if (IsUnknown(client_p))
706 adx 30 {
707 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
708 adx 30
709 michael 1632 send_capabilities(client_p, 0);
710 adx 30
711     sendto_one(client_p, "SERVER %s 1 :%s%s",
712 michael 1118 me.name, ConfigServerHide.hidden ? "(H) " : "", me.info);
713 adx 30 }
714    
715 michael 1115 sendto_one(client_p, "SVINFO %d %d 0 :%lu", TS_CURRENT, TS_MIN,
716 adx 30 (unsigned long)CurrentTime);
717    
718     /* assumption here is if they passed the correct TS version, they also passed an SID */
719     if (IsCapable(client_p, CAP_TS6))
720     hash_add_id(client_p);
721    
722     /* XXX Does this ever happen? I don't think so -db */
723 michael 1632 detach_conf(client_p, CONF_OPER);
724 adx 30
725     /* *WARNING*
726     ** In the following code in place of plain server's
727     ** name we send what is returned by get_client_name
728     ** which may add the "sockhost" after the name. It's
729     ** *very* *important* that there is a SPACE between
730     ** the name and sockhost (if present). The receiving
731     ** server will start the information field from this
732     ** first blank and thus puts the sockhost into info.
733     ** ...a bit tricky, but you have been warned, besides
734     ** code is more neat this way... --msa
735     */
736     client_p->servptr = &me;
737    
738     if (IsClosing(client_p))
739     return;
740    
741     SetServer(client_p);
742    
743     /* Update the capability combination usage counts. -A1kmm */
744     set_chcap_usage_counts(client_p);
745    
746     /* Some day, all these lists will be consolidated *sigh* */
747 michael 889 dlinkAdd(client_p, &client_p->lnode, &me.serv->server_list);
748 adx 30
749 michael 1126 assert(dlinkFind(&unknown_list, client_p));
750 adx 30
751 michael 1126 dlink_move_node(&client_p->localClient->lclient_node,
752     &unknown_list, &serv_list);
753 adx 30
754     Count.myserver++;
755    
756     dlinkAdd(client_p, make_dlink_node(), &global_serv_list);
757     hash_add_client(client_p);
758    
759     /* doesnt duplicate client_p->serv if allocated this struct already */
760     make_server(client_p);
761    
762     /* fixing eob timings.. -gnp */
763 michael 1241 client_p->localClient->firsttime = CurrentTime;
764 adx 30
765 michael 1632 if (find_matching_name_conf(CONF_SERVICE, client_p->name, NULL, NULL, 0))
766 michael 1219 AddFlag(client_p, FLAGS_SERVICE);
767 michael 1157
768 adx 30 /* Show the real host/IP to admins */
769 michael 1305 #ifdef HAVE_LIBCRYPTO
770 michael 1303 if (client_p->localClient->fd.ssl)
771     {
772 michael 1305 compression = SSL_get_current_compression(client_p->localClient->fd.ssl);
773     expansion = SSL_get_current_expansion(client_p->localClient->fd.ssl);
774    
775 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
776 michael 1305 "Link with %s established: [SSL: %s, Compression/Expansion method: %s/%s] (Capabilities: %s)",
777 michael 1303 inpath_ip, ssl_get_cipher(client_p->localClient->fd.ssl),
778 michael 1305 compression ? SSL_COMP_get_name(compression) : "NONE",
779     expansion ? SSL_COMP_get_name(expansion) : "NONE",
780 michael 1303 show_capabilities(client_p));
781     /* Now show the masked hostname/IP to opers */
782 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
783 michael 1305 "Link with %s established: [SSL: %s, Compression/Expansion method: %s/%s] (Capabilities: %s)",
784 michael 1303 inpath, ssl_get_cipher(client_p->localClient->fd.ssl),
785 michael 1305 compression ? SSL_COMP_get_name(compression) : "NONE",
786     expansion ? SSL_COMP_get_name(expansion) : "NONE",
787 michael 1303 show_capabilities(client_p));
788 michael 1305 ilog(LOG_TYPE_IRCD, "Link with %s established: [SSL: %s, Compression/Expansion method: %s/%s] (Capabilities: %s)",
789 michael 1303 inpath_ip, ssl_get_cipher(client_p->localClient->fd.ssl),
790 michael 1305 compression ? SSL_COMP_get_name(compression) : "NONE",
791     expansion ? SSL_COMP_get_name(expansion) : "NONE",
792 michael 1303 show_capabilities(client_p));
793     }
794     else
795 michael 1305 #endif
796 michael 1303 {
797 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
798 michael 1303 "Link with %s established: (Capabilities: %s)",
799 michael 1618 inpath_ip, show_capabilities(client_p));
800 michael 1303 /* Now show the masked hostname/IP to opers */
801 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
802 michael 1303 "Link with %s established: (Capabilities: %s)",
803 michael 1618 inpath, show_capabilities(client_p));
804 michael 1303 ilog(LOG_TYPE_IRCD, "Link with %s established: (Capabilities: %s)",
805     inpath_ip, show_capabilities(client_p));
806     }
807 adx 30
808 michael 1302 fd_note(&client_p->localClient->fd, "Server: %s", client_p->name);
809 adx 30
810     /* Old sendto_serv_but_one() call removed because we now
811     ** need to send different names to different servers
812     ** (domain name matching) Send new server to other servers.
813     */
814     DLINK_FOREACH(ptr, serv_list.head)
815     {
816     target_p = ptr->data;
817    
818     if (target_p == client_p)
819     continue;
820    
821     if (IsCapable(target_p, CAP_TS6) && HasID(client_p))
822     sendto_one(target_p, ":%s SID %s 2 %s :%s%s",
823     me.id, client_p->name, client_p->id,
824     IsHidden(client_p) ? "(H) " : "",
825     client_p->info);
826     else
827     sendto_one(target_p,":%s SERVER %s 2 :%s%s",
828     me.name, client_p->name,
829     IsHidden(client_p) ? "(H) " : "",
830     client_p->info);
831     }
832    
833     /* Pass on my client information to the new server
834     **
835     ** First, pass only servers (idea is that if the link gets
836     ** cancelled beacause the server was already there,
837     ** there are no NICK's to be cancelled...). Of course,
838     ** if cancellation occurs, all this info is sent anyway,
839     ** and I guess the link dies when a read is attempted...? --msa
840     **
841     ** Note: Link cancellation to occur at this point means
842     ** that at least two servers from my fragment are building
843     ** up connection this other fragment at the same time, it's
844     ** a race condition, not the normal way of operation...
845     **
846     ** ALSO NOTE: using the get_client_name for server names--
847     ** see previous *WARNING*!!! (Also, original inpath
848     ** is destroyed...)
849     */
850    
851     DLINK_FOREACH_PREV(ptr, global_serv_list.tail)
852     {
853     target_p = ptr->data;
854    
855     /* target_p->from == target_p for target_p == client_p */
856 michael 1118 if (IsMe(target_p) || target_p->from == client_p)
857 adx 30 continue;
858    
859     if (IsCapable(client_p, CAP_TS6))
860     {
861     if (HasID(target_p))
862     sendto_one(client_p, ":%s SID %s %d %s :%s%s",
863     ID(target_p->servptr), target_p->name, target_p->hopcount+1,
864     target_p->id, IsHidden(target_p) ? "(H) " : "",
865     target_p->info);
866     else /* introducing non-ts6 server */
867     sendto_one(client_p, ":%s SERVER %s %d :%s%s",
868     ID(target_p->servptr), target_p->name, target_p->hopcount+1,
869     IsHidden(target_p) ? "(H) " : "", target_p->info);
870     }
871     else
872     sendto_one(client_p, ":%s SERVER %s %d :%s%s",
873     target_p->servptr->name, target_p->name, target_p->hopcount+1,
874     IsHidden(target_p) ? "(H) " : "", target_p->info);
875 michael 1972
876     if (HasFlag(target_p, FLAGS_EOB))
877     sendto_one(client_p, ":%s EOB", ID_or_name(client_p, target_p));
878 adx 30 }
879    
880     server_burst(client_p);
881     }
882    
883     /* server_burst()
884     *
885     * inputs - struct Client pointer server
886     * -
887     * output - none
888     * side effects - send a server burst
889     * bugs - still too long
890     */
891     static void
892     server_burst(struct Client *client_p)
893     {
894     /* Send it in the shortened format with the TS, if
895     ** it's a TS server; walk the list of channels, sending
896     ** all the nicks that haven't been sent yet for each
897     ** channel, then send the channel itself -- it's less
898     ** obvious than sending all nicks first, but on the
899     ** receiving side memory will be allocated more nicely
900     ** saving a few seconds in the handling of a split
901     ** -orabidoo
902     */
903    
904 michael 885 burst_all(client_p);
905 adx 30
906     /* EOB stuff is now in burst_all */
907     /* Always send a PING after connect burst is done */
908     sendto_one(client_p, "PING :%s", ID_or_name(&me, client_p));
909     }
910    
911     /* burst_all()
912     *
913     * inputs - pointer to server to send burst to
914     * output - NONE
915     * side effects - complete burst of channels/nicks is sent to client_p
916     */
917     static void
918     burst_all(struct Client *client_p)
919     {
920 michael 329 dlink_node *ptr = NULL;
921 adx 30
922 michael 329 DLINK_FOREACH(ptr, global_channel_list.head)
923 adx 30 {
924 michael 329 struct Channel *chptr = ptr->data;
925 adx 30
926     if (dlink_list_length(&chptr->members) != 0)
927     {
928     burst_members(client_p, chptr);
929     send_channel_modes(client_p, chptr);
930 michael 329
931 michael 1472 if (IsCapable(client_p, CAP_TBURST))
932 michael 2134 send_tb(client_p, chptr);
933 adx 30 }
934     }
935    
936     /* also send out those that are not on any channel
937     */
938     DLINK_FOREACH(ptr, global_client_list.head)
939     {
940 michael 329 struct Client *target_p = ptr->data;
941 adx 30
942 michael 1219 if (!HasFlag(target_p, FLAGS_BURSTED) && target_p->from != client_p)
943 adx 30 sendnick_TS(client_p, target_p);
944    
945 michael 1219 DelFlag(target_p, FLAGS_BURSTED);
946 adx 30 }
947    
948     if (IsCapable(client_p, CAP_EOB))
949     sendto_one(client_p, ":%s EOB", ID_or_name(&me, client_p));
950     }
951    
952     /*
953     * send_tb
954     *
955 michael 329 * inputs - pointer to Client
956     * - pointer to channel
957     * output - NONE
958     * side effects - Called on a server burst when
959 michael 1472 * server is CAP_TBURST capable
960 adx 30 */
961     static void
962     send_tb(struct Client *client_p, struct Channel *chptr)
963     {
964 michael 329 /*
965 michael 337 * We may also send an empty topic here, but only if topic_time isn't 0,
966     * i.e. if we had a topic that got unset. This is required for syncing
967     * topics properly.
968     *
969     * Imagine the following scenario: Our downlink introduces a channel
970     * to us with a TS that is equal to ours, but the channel topic on
971     * their side got unset while the servers were in splitmode, which means
972     * their 'topic' is newer. They simply wanted to unset it, so we have to
973     * deal with it in a more sophisticated fashion instead of just resetting
974     * it to their old topic they had before. Read m_tburst.c:ms_tburst
975     * for further information -Michael
976 michael 329 */
977 michael 337 if (chptr->topic_time != 0)
978 michael 1472 sendto_one(client_p, ":%s TBURST %lu %s %lu %s :%s",
979     ID_or_name(&me, client_p),
980     (unsigned long)chptr->channelts, chptr->chname,
981     (unsigned long)chptr->topic_time,
982     chptr->topic_info,
983     chptr->topic);
984 adx 30 }
985    
986     /* burst_members()
987     *
988     * inputs - pointer to server to send members to
989     * - dlink_list pointer to membership list to send
990     * output - NONE
991     * side effects -
992     */
993     static void
994     burst_members(struct Client *client_p, struct Channel *chptr)
995     {
996     struct Client *target_p;
997     struct Membership *ms;
998     dlink_node *ptr;
999    
1000     DLINK_FOREACH(ptr, chptr->members.head)
1001     {
1002     ms = ptr->data;
1003     target_p = ms->client_p;
1004    
1005 michael 1219 if (!HasFlag(target_p, FLAGS_BURSTED))
1006 adx 30 {
1007 michael 1219 AddFlag(target_p, FLAGS_BURSTED);
1008 adx 30
1009     if (target_p->from != client_p)
1010     sendnick_TS(client_p, target_p);
1011     }
1012     }
1013     }
1014    
1015     /* New server connection code
1016     * Based upon the stuff floating about in s_bsd.c
1017     * -- adrian
1018     */
1019    
1020     /* serv_connect() - initiate a server connection
1021     *
1022     * inputs - pointer to conf
1023     * - pointer to client doing the connect
1024     * output -
1025     * side effects -
1026     *
1027     * This code initiates a connection to a server. It first checks to make
1028     * sure the given server exists. If this is the case, it creates a socket,
1029     * creates a client, saves the socket information in the client, and
1030     * initiates a connection to the server through comm_connect_tcp(). The
1031     * completion of this goes through serv_completed_connection().
1032     *
1033     * We return 1 if the connection is attempted, since we don't know whether
1034     * it suceeded or not, and 0 if it fails in here somewhere.
1035     */
1036     int
1037 michael 1632 serv_connect(struct MaskItem *conf, struct Client *by)
1038 adx 30 {
1039     struct Client *client_p;
1040 michael 1398 char buf[HOSTIPLEN + 1];
1041 adx 30
1042     /* conversion structs */
1043     struct sockaddr_in *v4;
1044 michael 1632 /* Make sure conf is useful */
1045     assert(conf != NULL);
1046 adx 30
1047    
1048 michael 1632 getnameinfo((struct sockaddr *)&conf->addr, conf->addr.ss_len,
1049 michael 1123 buf, sizeof(buf), NULL, 0, NI_NUMERICHOST);
1050 michael 1632 ilog(LOG_TYPE_IRCD, "Connect to %s[%s] @%s", conf->name, conf->host,
1051 adx 30 buf);
1052    
1053     /* Still processing a DNS lookup? -> exit */
1054 michael 1632 if (conf->dns_pending)
1055 adx 30 {
1056 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
1057 michael 992 "Error connecting to %s: DNS lookup for connect{} in progress.",
1058     conf->name);
1059 adx 30 return (0);
1060     }
1061    
1062 michael 1632 if (conf->dns_failed)
1063 michael 992 {
1064 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
1065 michael 992 "Error connecting to %s: DNS lookup for connect{} failed.",
1066     conf->name);
1067     return (0);
1068     }
1069    
1070 adx 30 /* Make sure this server isn't already connected
1071 michael 1632 * Note: conf should ALWAYS be a valid C: line
1072 adx 30 */
1073 michael 1169 if ((client_p = hash_find_server(conf->name)) != NULL)
1074 adx 30 {
1075 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
1076 michael 2134 "Server %s already present from %s",
1077     conf->name, get_client_name(client_p, SHOW_IP));
1078 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
1079 michael 2134 "Server %s already present from %s",
1080     conf->name, get_client_name(client_p, MASK_IP));
1081 adx 30 if (by && IsClient(by) && !MyClient(by))
1082     sendto_one(by, ":%s NOTICE %s :Server %s already present from %s",
1083 michael 2134 me.name, by->name, conf->name,
1084     get_client_name(client_p, MASK_IP));
1085     return 0;
1086 adx 30 }
1087    
1088     /* Create a local client */
1089     client_p = make_client(NULL);
1090    
1091     /* Copy in the server, hostname, fd */
1092     strlcpy(client_p->name, conf->name, sizeof(client_p->name));
1093 michael 1632 strlcpy(client_p->host, conf->host, sizeof(client_p->host));
1094 adx 30
1095     /* We already converted the ip once, so lets use it - stu */
1096 michael 1115 strlcpy(client_p->sockhost, buf, sizeof(client_p->sockhost));
1097 adx 30
1098     /* create a socket for the server connection */
1099 michael 1632 if (comm_open(&client_p->localClient->fd, conf->addr.ss.ss_family,
1100 adx 30 SOCK_STREAM, 0, NULL) < 0)
1101     {
1102     /* Eek, failure to create the socket */
1103 michael 2134 report_error(L_ALL, "opening stream socket to %s: %s",
1104     conf->name, errno);
1105 adx 30 SetDead(client_p);
1106     exit_client(client_p, &me, "Connection failed");
1107 michael 2134 return 0;
1108 adx 30 }
1109    
1110     /* servernames are always guaranteed under HOSTLEN chars */
1111     fd_note(&client_p->localClient->fd, "Server: %s", conf->name);
1112    
1113     /* Attach config entries to client here rather than in
1114     * serv_connect_callback(). This to avoid null pointer references.
1115     */
1116 michael 1632 if (!attach_connect_block(client_p, conf->name, conf->host))
1117 adx 30 {
1118 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
1119 michael 2134 "Host %s is not enabled for connecting: no connect{} block",
1120     conf->name);
1121 adx 30 if (by && IsClient(by) && !MyClient(by))
1122     sendto_one(by, ":%s NOTICE %s :Connect to host %s failed.",
1123 michael 2134 me.name, by->name, client_p->name);
1124 adx 30 SetDead(client_p);
1125     exit_client(client_p, client_p, "Connection failed");
1126 michael 2134 return 0;
1127 adx 30 }
1128    
1129     /* at this point we have a connection in progress and C/N lines
1130     * attached to the client, the socket info should be saved in the
1131     * client and it should either be resolved or have a valid address.
1132     *
1133     * The socket has been connected or connect is in progress.
1134     */
1135     make_server(client_p);
1136    
1137     if (by && IsClient(by))
1138     strlcpy(client_p->serv->by, by->name, sizeof(client_p->serv->by));
1139     else
1140     strlcpy(client_p->serv->by, "AutoConn.", sizeof(client_p->serv->by));
1141    
1142     SetConnecting(client_p);
1143     dlinkAdd(client_p, &client_p->node, &global_client_list);
1144     /* from def_fam */
1145 michael 1632 client_p->localClient->aftype = conf->aftype;
1146 adx 30
1147     /* Now, initiate the connection */
1148     /* XXX assume that a non 0 type means a specific bind address
1149     * for this connect.
1150     */
1151 michael 1632 switch (conf->aftype)
1152 adx 30 {
1153     case AF_INET:
1154 michael 1632 v4 = (struct sockaddr_in*)&conf->bind;
1155 adx 30 if (v4->sin_addr.s_addr != 0)
1156     {
1157     struct irc_ssaddr ipn;
1158     memset(&ipn, 0, sizeof(struct irc_ssaddr));
1159     ipn.ss.ss_family = AF_INET;
1160     ipn.ss_port = 0;
1161 michael 1632 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
1162 michael 2134 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
1163     (struct sockaddr *)&ipn, ipn.ss_len,
1164     serv_connect_callback, client_p, conf->aftype,
1165     CONNECTTIMEOUT);
1166 adx 30 }
1167     else if (ServerInfo.specific_ipv4_vhost)
1168     {
1169     struct irc_ssaddr ipn;
1170     memset(&ipn, 0, sizeof(struct irc_ssaddr));
1171     ipn.ss.ss_family = AF_INET;
1172     ipn.ss_port = 0;
1173     memcpy(&ipn, &ServerInfo.ip, sizeof(struct irc_ssaddr));
1174 michael 1632 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
1175 adx 30 (struct sockaddr *)&ipn, ipn.ss_len,
1176 michael 1632 serv_connect_callback, client_p, conf->aftype,
1177 michael 2134 CONNECTTIMEOUT);
1178 adx 30 }
1179     else
1180 michael 1632 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
1181     NULL, 0, serv_connect_callback, client_p, conf->aftype,
1182 adx 30 CONNECTTIMEOUT);
1183     break;
1184     #ifdef IPV6
1185     case AF_INET6:
1186     {
1187 michael 2182 struct irc_ssaddr ipn;
1188     struct sockaddr_in6 *v6;
1189     struct sockaddr_in6 *v6conf;
1190 adx 30
1191 michael 2182 memset(&ipn, 0, sizeof(struct irc_ssaddr));
1192     v6conf = (struct sockaddr_in6 *)&conf->bind;
1193     v6 = (struct sockaddr_in6 *)&ipn;
1194 adx 30
1195 michael 2182 if (memcmp(&v6conf->sin6_addr, &v6->sin6_addr, sizeof(struct in6_addr)) != 0)
1196 adx 30 {
1197 michael 2182 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
1198     ipn.ss.ss_family = AF_INET6;
1199     ipn.ss_port = 0;
1200     comm_connect_tcp(&client_p->localClient->fd,
1201     conf->host, conf->port,
1202     (struct sockaddr *)&ipn, ipn.ss_len,
1203     serv_connect_callback, client_p,
1204     conf->aftype, CONNECTTIMEOUT);
1205     }
1206     else if (ServerInfo.specific_ipv6_vhost)
1207     {
1208     memcpy(&ipn, &ServerInfo.ip6, sizeof(struct irc_ssaddr));
1209     ipn.ss.ss_family = AF_INET6;
1210     ipn.ss_port = 0;
1211     comm_connect_tcp(&client_p->localClient->fd,
1212     conf->host, conf->port,
1213     (struct sockaddr *)&ipn, ipn.ss_len,
1214     serv_connect_callback, client_p,
1215     conf->aftype, CONNECTTIMEOUT);
1216     }
1217     else
1218     comm_connect_tcp(&client_p->localClient->fd,
1219     conf->host, conf->port,
1220     NULL, 0, serv_connect_callback, client_p,
1221     conf->aftype, CONNECTTIMEOUT);
1222 adx 30 }
1223     #endif
1224     }
1225 michael 2182 return 1;
1226 adx 30 }
1227    
1228 michael 1303 #ifdef HAVE_LIBCRYPTO
1229     static void
1230     finish_ssl_server_handshake(struct Client *client_p)
1231     {
1232 michael 1632 struct MaskItem *conf = NULL;
1233 michael 1303
1234     conf = find_conf_name(&client_p->localClient->confs,
1235 michael 1632 client_p->name, CONF_SERVER);
1236 michael 1303 if (conf == NULL)
1237     {
1238 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
1239 michael 1303 "Lost connect{} block for %s", get_client_name(client_p, HIDE_IP));
1240 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
1241 michael 1303 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
1242    
1243     exit_client(client_p, &me, "Lost connect{} block");
1244     return;
1245     }
1246    
1247 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
1248 michael 1303
1249 michael 1632 send_capabilities(client_p, 0);
1250 michael 1303
1251     sendto_one(client_p, "SERVER %s 1 :%s%s",
1252     me.name, ConfigServerHide.hidden ? "(H) " : "",
1253     me.info);
1254    
1255     /* If we've been marked dead because a send failed, just exit
1256     * here now and save everyone the trouble of us ever existing.
1257     */
1258     if (IsDead(client_p))
1259     {
1260 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
1261 michael 1303 "%s[%s] went dead during handshake",
1262     client_p->name,
1263     client_p->host);
1264 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
1265 michael 1303 "%s went dead during handshake", client_p->name);
1266     return;
1267     }
1268    
1269     /* don't move to serv_list yet -- we haven't sent a burst! */
1270     /* If we get here, we're ok, so lets start reading some data */
1271     comm_setselect(&client_p->localClient->fd, COMM_SELECT_READ, read_packet, client_p, 0);
1272     }
1273    
1274     static void
1275 michael 1306 ssl_server_handshake(fde_t *fd, struct Client *client_p)
1276 michael 1303 {
1277     int ret;
1278     int err;
1279    
1280     ret = SSL_connect(client_p->localClient->fd.ssl);
1281    
1282     if (ret <= 0)
1283     {
1284     switch ((err = SSL_get_error(client_p->localClient->fd.ssl, ret)))
1285     {
1286     case SSL_ERROR_WANT_WRITE:
1287     comm_setselect(&client_p->localClient->fd, COMM_SELECT_WRITE,
1288 michael 1308 (PF *)ssl_server_handshake, client_p, 0);
1289 michael 1303 return;
1290     case SSL_ERROR_WANT_READ:
1291     comm_setselect(&client_p->localClient->fd, COMM_SELECT_READ,
1292 michael 1308 (PF *)ssl_server_handshake, client_p, 0);
1293 michael 1303 return;
1294     default:
1295 michael 1308 {
1296     const char *sslerr = ERR_error_string(ERR_get_error(), NULL);
1297 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
1298 michael 1308 "Error connecting to %s: %s", client_p->name,
1299     sslerr ? sslerr : "unknown SSL error");
1300 michael 1303 exit_client(client_p, client_p, "Error during SSL handshake");
1301     return;
1302 michael 1308 }
1303 michael 1303 }
1304     }
1305    
1306     finish_ssl_server_handshake(client_p);
1307     }
1308    
1309     static void
1310 michael 1632 ssl_connect_init(struct Client *client_p, struct MaskItem *conf, fde_t *fd)
1311 michael 1303 {
1312     if ((client_p->localClient->fd.ssl = SSL_new(ServerInfo.client_ctx)) == NULL)
1313     {
1314     ilog(LOG_TYPE_IRCD, "SSL_new() ERROR! -- %s",
1315     ERR_error_string(ERR_get_error(), NULL));
1316     SetDead(client_p);
1317     exit_client(client_p, client_p, "SSL_new failed");
1318     return;
1319     }
1320    
1321     SSL_set_fd(fd->ssl, fd->fd);
1322 michael 1306
1323 michael 1632 if (!EmptyString(conf->cipher_list))
1324     SSL_set_cipher_list(client_p->localClient->fd.ssl, conf->cipher_list);
1325 michael 1306
1326     ssl_server_handshake(NULL, client_p);
1327 michael 1303 }
1328     #endif
1329    
1330 adx 30 /* serv_connect_callback() - complete a server connection.
1331     *
1332     * This routine is called after the server connection attempt has
1333     * completed. If unsucessful, an error is sent to ops and the client
1334     * is closed. If sucessful, it goes through the initialisation/check
1335     * procedures, the capabilities are sent, and the socket is then
1336     * marked for reading.
1337     */
1338     static void
1339     serv_connect_callback(fde_t *fd, int status, void *data)
1340     {
1341     struct Client *client_p = data;
1342 michael 1632 struct MaskItem *conf = NULL;
1343 adx 30
1344     /* First, make sure its a real client! */
1345     assert(client_p != NULL);
1346     assert(&client_p->localClient->fd == fd);
1347    
1348     /* Next, for backward purposes, record the ip of the server */
1349     memcpy(&client_p->localClient->ip, &fd->connect.hostaddr,
1350     sizeof(struct irc_ssaddr));
1351     /* Check the status */
1352     if (status != COMM_OK)
1353     {
1354     /* We have an error, so report it and quit
1355     * Admins get to see any IP, mere opers don't *sigh*
1356     */
1357     if (ConfigServerHide.hide_server_ips)
1358 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
1359 adx 30 "Error connecting to %s: %s",
1360     client_p->name, comm_errstr(status));
1361     else
1362 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
1363 michael 2134 "Error connecting to %s[%s]: %s", client_p->name,
1364     client_p->host, comm_errstr(status));
1365 adx 30
1366 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
1367 michael 2134 "Error connecting to %s: %s",
1368     client_p->name, comm_errstr(status));
1369 adx 30
1370     /* If a fd goes bad, call dead_link() the socket is no
1371     * longer valid for reading or writing.
1372     */
1373     dead_link_on_write(client_p, 0);
1374     return;
1375     }
1376    
1377     /* COMM_OK, so continue the connection procedure */
1378     /* Get the C/N lines */
1379     conf = find_conf_name(&client_p->localClient->confs,
1380 michael 2134 client_p->name, CONF_SERVER);
1381 adx 30 if (conf == NULL)
1382     {
1383 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
1384 michael 2134 "Lost connect{} block for %s", get_client_name(client_p, HIDE_IP));
1385 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
1386 michael 2134 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
1387 adx 30
1388     exit_client(client_p, &me, "Lost connect{} block");
1389     return;
1390     }
1391    
1392     /* Next, send the initial handshake */
1393     SetHandshake(client_p);
1394    
1395     #ifdef HAVE_LIBCRYPTO
1396 michael 1632 if (IsConfSSL(conf))
1397 michael 1303 {
1398 michael 1632 ssl_connect_init(client_p, conf, fd);
1399 michael 1303 return;
1400     }
1401 adx 30 #endif
1402    
1403 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
1404 adx 30
1405 michael 1632 send_capabilities(client_p, 0);
1406 adx 30
1407 michael 2134 sendto_one(client_p, "SERVER %s 1 :%s%s", me.name,
1408     ConfigServerHide.hidden ? "(H) " : "", me.info);
1409 adx 30
1410     /* If we've been marked dead because a send failed, just exit
1411     * here now and save everyone the trouble of us ever existing.
1412     */
1413     if (IsDead(client_p))
1414     {
1415 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
1416 michael 2134 "%s[%s] went dead during handshake",
1417 adx 30 client_p->name,
1418 michael 2134 client_p->host);
1419 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
1420 michael 2134 "%s went dead during handshake", client_p->name);
1421 adx 30 return;
1422     }
1423    
1424     /* don't move to serv_list yet -- we haven't sent a burst! */
1425     /* If we get here, we're ok, so lets start reading some data */
1426     comm_setselect(fd, COMM_SELECT_READ, read_packet, client_p, 0);
1427     }
1428    
1429     struct Client *
1430     find_servconn_in_progress(const char *name)
1431     {
1432     dlink_node *ptr;
1433     struct Client *cptr;
1434    
1435     DLINK_FOREACH(ptr, unknown_list.head)
1436     {
1437     cptr = ptr->data;
1438    
1439     if (cptr && cptr->name[0])
1440 michael 1652 if (!match(name, cptr->name))
1441 adx 30 return cptr;
1442     }
1443    
1444     return NULL;
1445     }

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision