ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/branches/8.2.x/src/server.c
Revision: 3377
Committed: Thu Apr 24 16:15:51 2014 UTC (9 years, 11 months ago) by michael
Content type: text/x-csrc
File size: 29798 byte(s)
Log Message:
- Create 8.2.x branch

File Contents

# User Rev Content
1 adx 30 /*
2 michael 2916 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3 adx 30 *
4 michael 2916 * Copyright (c) 1997-2014 ircd-hybrid development team
5 adx 30 *
6     * This program is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * This program is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with this program; if not, write to the Free Software
18     * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
19     * USA
20     */
21    
22 michael 2916 /*! \file s_serv.c
23     * \brief Server related functions.
24     * \version $Id$
25     */
26    
27 adx 30 #include "stdinc.h"
28     #ifdef HAVE_LIBCRYPTO
29     #include <openssl/rsa.h>
30     #include "rsa.h"
31     #endif
32 michael 1011 #include "list.h"
33 adx 30 #include "client.h"
34     #include "event.h"
35     #include "hash.h"
36     #include "irc_string.h"
37     #include "ircd.h"
38     #include "ircd_defs.h"
39     #include "s_bsd.h"
40     #include "numeric.h"
41     #include "packet.h"
42 michael 1309 #include "conf.h"
43 michael 3347 #include "server.h"
44 michael 1309 #include "log.h"
45 michael 3347 #include "user.h"
46 adx 30 #include "send.h"
47     #include "memory.h"
48 michael 2916 #include "channel.h"
49 michael 1243 #include "parse.h"
50 adx 30
51     #define MIN_CONN_FREQ 300
52    
53 michael 2156 dlink_list flatten_links;
54 adx 30 static dlink_list cap_list = { NULL, NULL, 0 };
55     static CNCB serv_connect_callback;
56    
57    
58     /*
59     * write_links_file
60     *
61     * inputs - void pointer which is not used
62     * output - NONE
63     * side effects - called from an event, write out list of linked servers
64     * but in no particular order.
65     */
66     void
67 michael 2156 write_links_file(void *notused)
68 adx 30 {
69 michael 2156 FILE *file = NULL;
70 michael 2216 dlink_node *ptr = NULL, *ptr_next = NULL;
71 michael 3215 char buff[IRCD_BUFSIZE] = "";
72 adx 30
73 michael 2156 if ((file = fopen(LIPATH, "w")) == NULL)
74 adx 30 return;
75    
76 michael 2156 DLINK_FOREACH_SAFE(ptr, ptr_next, flatten_links.head)
77 adx 30 {
78 michael 2156 dlinkDelete(ptr, &flatten_links);
79     MyFree(ptr->data);
80     free_dlink_node(ptr);
81 adx 30 }
82    
83     DLINK_FOREACH(ptr, global_serv_list.head)
84     {
85 michael 1325 const struct Client *target_p = ptr->data;
86 adx 30
87 michael 2156 /*
88     * Skip hidden servers, aswell as ourselves, since we already send
89     * ourselves in /links
90     */
91     if (IsHidden(target_p) || IsMe(target_p))
92 adx 30 continue;
93    
94 michael 1851 if (HasFlag(target_p, FLAGS_SERVICE) && ConfigServerHide.hide_services)
95     continue;
96    
97 michael 1545 /*
98     * Attempt to format the file in such a way it follows the usual links output
99 adx 30 * ie "servername uplink :hops info"
100     * Mostly for aesthetic reasons - makes it look pretty in mIRC ;)
101     * - madmax
102     */
103 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s", target_p->name,
104     me.name, target_p->info);
105 michael 2212 dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
106 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s\n", target_p->name,
107     me.name, target_p->info);
108 adx 30
109 michael 1325 fputs(buff, file);
110 adx 30 }
111    
112 michael 1325 fclose(file);
113 adx 30 }
114    
115 michael 2216 void
116     read_links_file(void)
117     {
118     FILE *file = NULL;
119     char *p = NULL;
120 michael 3215 char buff[IRCD_BUFSIZE] = "";
121 michael 2216
122     if ((file = fopen(LIPATH, "r")) == NULL)
123     return;
124    
125     while (fgets(buff, sizeof(buff), file))
126     {
127 michael 3246 if ((p = strchr(buff, '\n')))
128 michael 2216 *p = '\0';
129    
130     dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
131     }
132    
133     fclose(file);
134     }
135    
136 adx 30 /* hunt_server()
137     * Do the basic thing in delivering the message (command)
138     * across the relays to the specific server (server) for
139     * actions.
140     *
141     * Note: The command is a format string and *MUST* be
142     * of prefixed style (e.g. ":%s COMMAND %s ...").
143     * Command can have only max 8 parameters.
144     *
145     * server parv[server] is the parameter identifying the
146     * target server.
147     *
148     * *WARNING*
149     * parv[server] is replaced with the pointer to the
150     * real servername from the matched client (I'm lazy
151     * now --msa).
152     *
153     * returns: (see #defines)
154     */
155     int
156 michael 3156 hunt_server(struct Client *source_p, const char *command,
157 michael 1857 const int server, const int parc, char *parv[])
158 adx 30 {
159     struct Client *target_p = NULL;
160     struct Client *target_tmp = NULL;
161     dlink_node *ptr;
162     int wilds;
163    
164 michael 1344 /* Assume it's me, if no server */
165     if (parc <= server || EmptyString(parv[server]))
166     return HUNTED_ISME;
167 adx 30
168 michael 1652 if (!strcmp(parv[server], me.id) || !match(parv[server], me.name))
169 michael 1344 return HUNTED_ISME;
170    
171 adx 30 /* These are to pickup matches that would cause the following
172     * message to go in the wrong direction while doing quick fast
173     * non-matching lookups.
174     */
175     if (MyClient(source_p))
176 michael 1169 target_p = hash_find_client(parv[server]);
177 adx 30 else
178 michael 3156 target_p = find_person(source_p, parv[server]);
179 adx 30
180     if (target_p)
181     if (target_p->from == source_p->from && !MyConnect(target_p))
182     target_p = NULL;
183    
184 michael 1169 if (target_p == NULL && (target_p = hash_find_server(parv[server])))
185 adx 30 if (target_p->from == source_p->from && !MyConnect(target_p))
186     target_p = NULL;
187    
188 michael 1400 wilds = has_wildcards(parv[server]);
189 adx 30
190     /* Again, if there are no wild cards involved in the server
191     * name, use the hash lookup
192     */
193     if (target_p == NULL)
194     {
195     if (!wilds)
196     {
197 michael 1169 if (!(target_p = hash_find_server(parv[server])))
198 adx 30 {
199 michael 3109 sendto_one_numeric(source_p, &me, ERR_NOSUCHSERVER, parv[server]);
200 michael 2182 return HUNTED_NOSUCH;
201 adx 30 }
202     }
203     else
204     {
205     DLINK_FOREACH(ptr, global_client_list.head)
206     {
207     target_tmp = ptr->data;
208    
209 michael 1652 if (!match(parv[server], target_tmp->name))
210 adx 30 {
211     if (target_tmp->from == source_p->from && !MyConnect(target_tmp))
212     continue;
213     target_p = ptr->data;
214    
215 michael 3156 if (IsRegistered(target_p) && (target_p != source_p->from))
216 adx 30 break;
217     }
218     }
219     }
220     }
221    
222 michael 3246 if (target_p)
223 adx 30 {
224 michael 3246 if (!IsRegistered(target_p))
225 adx 30 {
226 michael 3109 sendto_one_numeric(source_p, &me, ERR_NOSUCHSERVER, parv[server]);
227 adx 30 return HUNTED_NOSUCH;
228     }
229    
230     if (IsMe(target_p) || MyClient(target_p))
231     return HUNTED_ISME;
232    
233 michael 1652 if (match(target_p->name, parv[server]))
234 adx 30 parv[server] = target_p->name;
235    
236 michael 3136 /* This is a little kludgy but should work... */
237 michael 3096 sendto_one(target_p, command, ID_or_name(source_p, target_p),
238 adx 30 parv[1], parv[2], parv[3], parv[4],
239     parv[5], parv[6], parv[7], parv[8]);
240 michael 2134 return HUNTED_PASS;
241 michael 2345 }
242 adx 30
243 michael 3109 sendto_one_numeric(source_p, &me, ERR_NOSUCHSERVER, parv[server]);
244 michael 2134 return HUNTED_NOSUCH;
245 adx 30 }
246    
247     /* try_connections()
248     *
249     * inputs - void pointer which is not used
250     * output - NONE
251     * side effects -
252     * scan through configuration and try new connections.
253     * Returns the calendar time when the next call to this
254     * function should be made latest. (No harm done if this
255     * is called earlier or later...)
256     */
257     void
258     try_connections(void *unused)
259     {
260 michael 1632 dlink_node *ptr = NULL;
261 michael 3335 int confrq = 0;
262 adx 30
263     /* TODO: change this to set active flag to 0 when added to event! --Habeeb */
264     if (GlobalSetOptions.autoconn == 0)
265     return;
266    
267     DLINK_FOREACH(ptr, server_items.head)
268     {
269 michael 3335 struct MaskItem *conf = ptr->data;
270 adx 30
271 michael 1636 assert(conf->type == CONF_SERVER);
272 michael 1632
273 michael 2345 /* Also when already connecting! (update holdtimes) --SRB
274 adx 30 */
275 michael 1632 if (!conf->port ||!IsConfAllowAutoConn(conf))
276 adx 30 continue;
277    
278    
279     /* Skip this entry if the use of it is still on hold until
280     * future. Otherwise handle this entry (and set it on hold
281     * until next time). Will reset only hold times, if already
282     * made one successfull connection... [this algorithm is
283     * a bit fuzzy... -- msa >;) ]
284     */
285 michael 1649 if (conf->until > CurrentTime)
286 adx 30 continue;
287    
288 michael 1632 if (conf->class == NULL)
289 adx 30 confrq = DEFAULT_CONNECTFREQUENCY;
290     else
291     {
292 michael 1632 confrq = conf->class->con_freq;
293 michael 1377 if (confrq < MIN_CONN_FREQ)
294 michael 2134 confrq = MIN_CONN_FREQ;
295 adx 30 }
296    
297 michael 1649 conf->until = CurrentTime + confrq;
298 adx 30
299 michael 3246 /*
300     * Found a CONNECT config with port specified, scan clients
301 adx 30 * and see if this server is already connected?
302     */
303 michael 3246 if (hash_find_server(conf->name))
304 adx 30 continue;
305    
306 michael 1632 if (conf->class->ref_count < conf->class->max_total)
307 adx 30 {
308     /* Go to the end of the list, if not already last */
309 michael 3246 if (ptr->next)
310 adx 30 {
311     dlinkDelete(ptr, &server_items);
312     dlinkAddTail(conf, &conf->node, &server_items);
313     }
314    
315     if (find_servconn_in_progress(conf->name))
316     return;
317    
318 michael 3246 /*
319     * We used to only print this if serv_connect() actually
320 adx 30 * succeeded, but since comm_tcp_connect() can call the callback
321     * immediately if there is an error, we were getting error messages
322     * in the wrong order. SO, we just print out the activated line,
323     * and let serv_connect() / serv_connect_callback() print an
324     * error afterwards if it fails.
325     * -- adrian
326     */
327     if (ConfigServerHide.hide_server_ips)
328 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
329     "Connection to %s activated.",
330 adx 30 conf->name);
331     else
332 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
333     "Connection to %s[%s] activated.",
334 michael 1632 conf->name, conf->host);
335 adx 30
336 michael 1632 serv_connect(conf, NULL);
337 adx 30 /* We connect only one at time... */
338     return;
339     }
340     }
341     }
342    
343     int
344 michael 1115 valid_servname(const char *name)
345     {
346     unsigned int length = 0;
347     unsigned int dots = 0;
348     const char *p = name;
349    
350     for (; *p; ++p)
351     {
352     if (!IsServChar(*p))
353 michael 1118 return 0;
354 michael 1115
355     ++length;
356    
357     if (*p == '.')
358     ++dots;
359     }
360    
361 michael 3246 return dots && length <= HOSTLEN;
362 michael 1115 }
363    
364     int
365 michael 1302 check_server(const char *name, struct Client *client_p)
366 adx 30 {
367     dlink_node *ptr;
368 michael 1632 struct MaskItem *conf = NULL;
369     struct MaskItem *server_conf = NULL;
370 adx 30 int error = -1;
371    
372 michael 3246 assert(client_p);
373 adx 30
374     /* loop through looking for all possible connect items that might work */
375     DLINK_FOREACH(ptr, server_items.head)
376     {
377     conf = ptr->data;
378    
379 michael 1652 if (match(name, conf->name))
380 adx 30 continue;
381    
382     error = -3;
383    
384     /* XXX: Fix me for IPv6 */
385     /* XXX sockhost is the IPv4 ip as a string */
386 michael 2345 if (!match(conf->host, client_p->host) ||
387 michael 1652 !match(conf->host, client_p->sockhost))
388 adx 30 {
389     error = -2;
390    
391 michael 1632 if (!match_conf_password(client_p->localClient->passwd, conf))
392 michael 1414 return -2;
393 adx 30
394 michael 2228 if (!EmptyString(conf->certfp))
395 michael 2229 if (EmptyString(client_p->certfp) || strcasecmp(client_p->certfp, conf->certfp))
396 michael 2228 return -4;
397    
398 michael 1414 server_conf = conf;
399 adx 30 }
400     }
401    
402     if (server_conf == NULL)
403 michael 2182 return error;
404 adx 30
405     attach_conf(client_p, server_conf);
406    
407    
408 michael 3246 if (server_conf)
409 adx 30 {
410     struct sockaddr_in *v4;
411     #ifdef IPV6
412     struct sockaddr_in6 *v6;
413     #endif
414 michael 1632 switch (server_conf->aftype)
415 adx 30 {
416     #ifdef IPV6
417 michael 2345 case AF_INET6:
418 michael 1632 v6 = (struct sockaddr_in6 *)&server_conf->addr;
419 adx 30
420     if (IN6_IS_ADDR_UNSPECIFIED(&v6->sin6_addr))
421 michael 1632 memcpy(&server_conf->addr, &client_p->localClient->ip, sizeof(struct irc_ssaddr));
422 adx 30 break;
423     #endif
424     case AF_INET:
425 michael 1632 v4 = (struct sockaddr_in *)&server_conf->addr;
426 adx 30
427     if (v4->sin_addr.s_addr == INADDR_NONE)
428 michael 2345 memcpy(&server_conf->addr, &client_p->localClient->ip, sizeof(struct irc_ssaddr));
429 adx 30 break;
430     }
431     }
432    
433 michael 2182 return 0;
434 adx 30 }
435    
436     /* add_capability()
437     *
438     * inputs - string name of CAPAB
439     * - int flag of capability
440     * output - NONE
441     * side effects - Adds given capability name and bit mask to
442     * current supported capabilities. This allows
443     * modules to dynamically add or subtract their capability.
444     */
445     void
446     add_capability(const char *capab_name, int cap_flag, int add_to_default)
447     {
448 michael 885 struct Capability *cap = MyMalloc(sizeof(*cap));
449 adx 30
450 michael 1646 cap->name = xstrdup(capab_name);
451 adx 30 cap->cap = cap_flag;
452     dlinkAdd(cap, &cap->node, &cap_list);
453 michael 885
454 adx 30 if (add_to_default)
455     default_server_capabs |= cap_flag;
456     }
457    
458     /* delete_capability()
459     *
460     * inputs - string name of CAPAB
461     * output - NONE
462     * side effects - delete given capability from ones known.
463     */
464     int
465     delete_capability(const char *capab_name)
466     {
467 michael 3335 dlink_node *ptr = NULL, *ptr_next = NULL;
468 adx 30
469 michael 3335 DLINK_FOREACH_SAFE(ptr, ptr_next, cap_list.head)
470 adx 30 {
471 michael 3335 struct Capability *cap = ptr->data;
472 adx 30
473 michael 3335 if (cap->cap)
474 adx 30 {
475 michael 3335 if (!irccmp(cap->name, capab_name))
476 adx 30 {
477 michael 2134 default_server_capabs &= ~(cap->cap);
478     dlinkDelete(ptr, &cap_list);
479     MyFree(cap->name);
480     MyFree(cap);
481 adx 30 }
482     }
483     }
484    
485 michael 896 return 0;
486 adx 30 }
487    
488     /*
489     * find_capability()
490     *
491     * inputs - string name of capab to find
492     * output - 0 if not found CAPAB otherwise
493     * side effects - none
494     */
495 michael 1877 unsigned int
496 adx 30 find_capability(const char *capab)
497     {
498 michael 896 const dlink_node *ptr = NULL;
499 adx 30
500     DLINK_FOREACH(ptr, cap_list.head)
501     {
502 michael 896 const struct Capability *cap = ptr->data;
503 adx 30
504 michael 896 if (cap->cap && !irccmp(cap->name, capab))
505     return cap->cap;
506 adx 30 }
507 michael 896
508     return 0;
509 adx 30 }
510    
511     /* send_capabilities()
512     *
513     * inputs - Client pointer to send to
514     * - int flag of capabilities that this server can send
515     * output - NONE
516     * side effects - send the CAPAB line to a server -orabidoo
517     *
518     */
519     void
520 michael 1632 send_capabilities(struct Client *client_p, int cap_can_send)
521 adx 30 {
522 michael 3246 char msgbuf[IRCD_BUFSIZE] = "";
523     char *t = msgbuf;
524 adx 30 int tl;
525 michael 3246 dlink_node *ptr = NULL;
526 adx 30
527     DLINK_FOREACH(ptr, cap_list.head)
528     {
529 michael 3246 struct Capability *cap = ptr->data;
530 adx 30
531     if (cap->cap & (cap_can_send|default_server_capabs))
532     {
533 michael 1793 tl = sprintf(t, "%s ", cap->name);
534 adx 30 t += tl;
535     }
536     }
537    
538 michael 319 *(t - 1) = '\0';
539 adx 30 sendto_one(client_p, "CAPAB :%s", msgbuf);
540     }
541    
542     /*
543     * show_capabilities - show current server capabilities
544     *
545     * inputs - pointer to a struct Client
546     * output - pointer to static string
547     * side effects - build up string representing capabilities of server listed
548     */
549     const char *
550 michael 2282 show_capabilities(const struct Client *target_p)
551 adx 30 {
552 michael 2309 static char msgbuf[IRCD_BUFSIZE] = "";
553 michael 2282 const dlink_node *ptr = NULL;
554 adx 30
555 michael 2309 strlcpy(msgbuf, "TS", sizeof(msgbuf));
556    
557 adx 30 DLINK_FOREACH(ptr, cap_list.head)
558     {
559     const struct Capability *cap = ptr->data;
560    
561 michael 2282 if (!IsCapable(target_p, cap->cap))
562     continue;
563    
564     strlcat(msgbuf, " ", sizeof(msgbuf));
565     strlcat(msgbuf, cap->name, sizeof(msgbuf));
566 adx 30 }
567 michael 1302
568     return msgbuf;
569 adx 30 }
570    
571     /* make_server()
572     *
573     * inputs - pointer to client struct
574     * output - pointer to struct Server
575     * side effects - add's an Server information block to a client
576     * if it was not previously allocated.
577     */
578     struct Server *
579     make_server(struct Client *client_p)
580     {
581     if (client_p->serv == NULL)
582     client_p->serv = MyMalloc(sizeof(struct Server));
583    
584     return client_p->serv;
585     }
586    
587     /* New server connection code
588     * Based upon the stuff floating about in s_bsd.c
589     * -- adrian
590     */
591    
592     /* serv_connect() - initiate a server connection
593     *
594 michael 2345 * inputs - pointer to conf
595 adx 30 * - pointer to client doing the connect
596     * output -
597     * side effects -
598     *
599     * This code initiates a connection to a server. It first checks to make
600     * sure the given server exists. If this is the case, it creates a socket,
601     * creates a client, saves the socket information in the client, and
602     * initiates a connection to the server through comm_connect_tcp(). The
603     * completion of this goes through serv_completed_connection().
604     *
605     * We return 1 if the connection is attempted, since we don't know whether
606     * it suceeded or not, and 0 if it fails in here somewhere.
607     */
608     int
609 michael 1632 serv_connect(struct MaskItem *conf, struct Client *by)
610 adx 30 {
611 michael 3246 struct Client *client_p = NULL;
612     char buf[HOSTIPLEN + 1] = "";
613 adx 30
614     /* conversion structs */
615     struct sockaddr_in *v4;
616 michael 3246
617 michael 1632 /* Make sure conf is useful */
618 michael 3246 assert(conf);
619 adx 30
620 michael 1632 getnameinfo((struct sockaddr *)&conf->addr, conf->addr.ss_len,
621 michael 1123 buf, sizeof(buf), NULL, 0, NI_NUMERICHOST);
622 michael 1632 ilog(LOG_TYPE_IRCD, "Connect to %s[%s] @%s", conf->name, conf->host,
623 adx 30 buf);
624    
625     /* Still processing a DNS lookup? -> exit */
626 michael 1632 if (conf->dns_pending)
627 adx 30 {
628 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
629 michael 992 "Error connecting to %s: DNS lookup for connect{} in progress.",
630     conf->name);
631 michael 3246 return 0;
632 adx 30 }
633    
634 michael 1632 if (conf->dns_failed)
635 michael 992 {
636 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
637 michael 992 "Error connecting to %s: DNS lookup for connect{} failed.",
638     conf->name);
639 michael 3246 return 0;
640 michael 992 }
641    
642 adx 30 /* Make sure this server isn't already connected
643 michael 1632 * Note: conf should ALWAYS be a valid C: line
644 adx 30 */
645 michael 3246 if ((client_p = hash_find_server(conf->name)))
646 michael 2345 {
647 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
648 michael 2134 "Server %s already present from %s",
649     conf->name, get_client_name(client_p, SHOW_IP));
650 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
651 michael 2134 "Server %s already present from %s",
652     conf->name, get_client_name(client_p, MASK_IP));
653 adx 30 if (by && IsClient(by) && !MyClient(by))
654 michael 3110 sendto_one_notice(by, &me, ":Server %s already present from %s",
655     conf->name, get_client_name(client_p, MASK_IP));
656 michael 2134 return 0;
657 adx 30 }
658 michael 2345
659 adx 30 /* Create a local client */
660     client_p = make_client(NULL);
661    
662     /* Copy in the server, hostname, fd */
663     strlcpy(client_p->name, conf->name, sizeof(client_p->name));
664 michael 1632 strlcpy(client_p->host, conf->host, sizeof(client_p->host));
665 adx 30
666     /* We already converted the ip once, so lets use it - stu */
667 michael 1115 strlcpy(client_p->sockhost, buf, sizeof(client_p->sockhost));
668 adx 30
669 michael 2345 /* create a socket for the server connection */
670 michael 3335 if (comm_open(&client_p->localClient->fd, conf->addr.ss.ss_family, SOCK_STREAM, 0, NULL) < 0)
671 adx 30 {
672     /* Eek, failure to create the socket */
673 michael 3335 report_error(L_ALL, "opening stream socket to %s: %s", conf->name, errno);
674    
675 adx 30 SetDead(client_p);
676 michael 3171 exit_client(client_p, "Connection failed");
677 michael 2134 return 0;
678 adx 30 }
679    
680     /* servernames are always guaranteed under HOSTLEN chars */
681     fd_note(&client_p->localClient->fd, "Server: %s", conf->name);
682    
683     /* Attach config entries to client here rather than in
684     * serv_connect_callback(). This to avoid null pointer references.
685     */
686 michael 1632 if (!attach_connect_block(client_p, conf->name, conf->host))
687 adx 30 {
688 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
689 michael 2134 "Host %s is not enabled for connecting: no connect{} block",
690     conf->name);
691 michael 2345 if (by && IsClient(by) && !MyClient(by))
692 michael 3110 sendto_one_notice(by, &me, ":Connect to host %s failed.", client_p->name);
693    
694 adx 30 SetDead(client_p);
695 michael 3171 exit_client(client_p, "Connection failed");
696 michael 2134 return 0;
697 adx 30 }
698    
699     /* at this point we have a connection in progress and C/N lines
700     * attached to the client, the socket info should be saved in the
701     * client and it should either be resolved or have a valid address.
702     *
703     * The socket has been connected or connect is in progress.
704     */
705     make_server(client_p);
706    
707     if (by && IsClient(by))
708     strlcpy(client_p->serv->by, by->name, sizeof(client_p->serv->by));
709     else
710     strlcpy(client_p->serv->by, "AutoConn.", sizeof(client_p->serv->by));
711    
712     SetConnecting(client_p);
713     dlinkAdd(client_p, &client_p->node, &global_client_list);
714 michael 3335
715 michael 1632 client_p->localClient->aftype = conf->aftype;
716 adx 30
717     /* Now, initiate the connection */
718 michael 2345 /* XXX assume that a non 0 type means a specific bind address
719 adx 30 * for this connect.
720     */
721 michael 1632 switch (conf->aftype)
722 adx 30 {
723     case AF_INET:
724 michael 1632 v4 = (struct sockaddr_in*)&conf->bind;
725 michael 3246 if (v4->sin_addr.s_addr)
726 adx 30 {
727     struct irc_ssaddr ipn;
728     memset(&ipn, 0, sizeof(struct irc_ssaddr));
729     ipn.ss.ss_family = AF_INET;
730     ipn.ss_port = 0;
731 michael 1632 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
732 michael 2134 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
733 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
734 michael 2134 serv_connect_callback, client_p, conf->aftype,
735     CONNECTTIMEOUT);
736 adx 30 }
737     else if (ServerInfo.specific_ipv4_vhost)
738     {
739     struct irc_ssaddr ipn;
740     memset(&ipn, 0, sizeof(struct irc_ssaddr));
741     ipn.ss.ss_family = AF_INET;
742     ipn.ss_port = 0;
743     memcpy(&ipn, &ServerInfo.ip, sizeof(struct irc_ssaddr));
744 michael 1632 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
745 adx 30 (struct sockaddr *)&ipn, ipn.ss_len,
746 michael 1632 serv_connect_callback, client_p, conf->aftype,
747 michael 2134 CONNECTTIMEOUT);
748 adx 30 }
749     else
750 michael 2345 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
751     NULL, 0, serv_connect_callback, client_p, conf->aftype,
752 adx 30 CONNECTTIMEOUT);
753     break;
754     #ifdef IPV6
755     case AF_INET6:
756     {
757 michael 2182 struct irc_ssaddr ipn;
758     struct sockaddr_in6 *v6;
759     struct sockaddr_in6 *v6conf;
760 adx 30
761 michael 2182 memset(&ipn, 0, sizeof(struct irc_ssaddr));
762     v6conf = (struct sockaddr_in6 *)&conf->bind;
763     v6 = (struct sockaddr_in6 *)&ipn;
764 adx 30
765 michael 3246 if (memcmp(&v6conf->sin6_addr, &v6->sin6_addr, sizeof(struct in6_addr)))
766 adx 30 {
767 michael 2182 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
768     ipn.ss.ss_family = AF_INET6;
769     ipn.ss_port = 0;
770     comm_connect_tcp(&client_p->localClient->fd,
771     conf->host, conf->port,
772 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
773 michael 2182 serv_connect_callback, client_p,
774     conf->aftype, CONNECTTIMEOUT);
775     }
776     else if (ServerInfo.specific_ipv6_vhost)
777     {
778     memcpy(&ipn, &ServerInfo.ip6, sizeof(struct irc_ssaddr));
779     ipn.ss.ss_family = AF_INET6;
780     ipn.ss_port = 0;
781     comm_connect_tcp(&client_p->localClient->fd,
782     conf->host, conf->port,
783     (struct sockaddr *)&ipn, ipn.ss_len,
784     serv_connect_callback, client_p,
785     conf->aftype, CONNECTTIMEOUT);
786     }
787     else
788     comm_connect_tcp(&client_p->localClient->fd,
789 michael 2345 conf->host, conf->port,
790 michael 2182 NULL, 0, serv_connect_callback, client_p,
791     conf->aftype, CONNECTTIMEOUT);
792 adx 30 }
793     #endif
794     }
795 michael 2182 return 1;
796 adx 30 }
797    
798 michael 1303 #ifdef HAVE_LIBCRYPTO
799     static void
800     finish_ssl_server_handshake(struct Client *client_p)
801     {
802 michael 1632 struct MaskItem *conf = NULL;
803 michael 1303
804     conf = find_conf_name(&client_p->localClient->confs,
805 michael 1632 client_p->name, CONF_SERVER);
806 michael 1303 if (conf == NULL)
807     {
808 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
809 michael 1303 "Lost connect{} block for %s", get_client_name(client_p, HIDE_IP));
810 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
811 michael 1303 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
812    
813 michael 3171 exit_client(client_p, "Lost connect{} block");
814 michael 1303 return;
815     }
816    
817 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
818 michael 1303
819 michael 1632 send_capabilities(client_p, 0);
820 michael 1303
821     sendto_one(client_p, "SERVER %s 1 :%s%s",
822     me.name, ConfigServerHide.hidden ? "(H) " : "",
823     me.info);
824    
825     /* If we've been marked dead because a send failed, just exit
826     * here now and save everyone the trouble of us ever existing.
827     */
828     if (IsDead(client_p))
829     {
830 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
831 michael 1303 "%s[%s] went dead during handshake",
832     client_p->name,
833     client_p->host);
834 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
835 michael 1303 "%s went dead during handshake", client_p->name);
836     return;
837     }
838    
839     /* don't move to serv_list yet -- we haven't sent a burst! */
840     /* If we get here, we're ok, so lets start reading some data */
841     comm_setselect(&client_p->localClient->fd, COMM_SELECT_READ, read_packet, client_p, 0);
842     }
843    
844     static void
845 michael 1306 ssl_server_handshake(fde_t *fd, struct Client *client_p)
846 michael 1303 {
847 michael 2463 X509 *cert = NULL;
848     int ret = 0;
849 michael 1303
850 michael 2463 if ((ret = SSL_connect(client_p->localClient->fd.ssl)) <= 0)
851 michael 1303 {
852 michael 2463 switch (SSL_get_error(client_p->localClient->fd.ssl, ret))
853 michael 1303 {
854     case SSL_ERROR_WANT_WRITE:
855     comm_setselect(&client_p->localClient->fd, COMM_SELECT_WRITE,
856 michael 1308 (PF *)ssl_server_handshake, client_p, 0);
857 michael 1303 return;
858     case SSL_ERROR_WANT_READ:
859     comm_setselect(&client_p->localClient->fd, COMM_SELECT_READ,
860 michael 1308 (PF *)ssl_server_handshake, client_p, 0);
861 michael 1303 return;
862     default:
863 michael 1308 {
864     const char *sslerr = ERR_error_string(ERR_get_error(), NULL);
865 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
866 michael 1308 "Error connecting to %s: %s", client_p->name,
867     sslerr ? sslerr : "unknown SSL error");
868 michael 3171 exit_client(client_p, "Error during SSL handshake");
869 michael 1303 return;
870 michael 1308 }
871 michael 1303 }
872     }
873    
874 michael 2463 if ((cert = SSL_get_peer_certificate(client_p->localClient->fd.ssl)))
875     {
876     int res = SSL_get_verify_result(client_p->localClient->fd.ssl);
877 michael 3375 char buf[EVP_MAX_MD_SIZE * 2 + 1] = "";
878     unsigned char md[EVP_MAX_MD_SIZE] = "";
879 michael 2463
880     if (res == X509_V_OK || res == X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN ||
881     res == X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE ||
882     res == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT)
883     {
884 michael 3375 unsigned int n = 0;
885 michael 2463
886     if (X509_digest(cert, EVP_sha256(), md, &n))
887     {
888 michael 3375 for (unsigned int i = 0; i < n; ++i)
889 michael 2463 snprintf(buf + 2 * i, 3, "%02X", md[i]);
890     client_p->certfp = xstrdup(buf);
891     }
892     }
893     else
894     ilog(LOG_TYPE_IRCD, "Server %s!%s@%s gave bad SSL client certificate: %d",
895     client_p->name, client_p->username, client_p->host, res);
896     X509_free(cert);
897     }
898    
899 michael 1303 finish_ssl_server_handshake(client_p);
900     }
901    
902     static void
903 michael 1632 ssl_connect_init(struct Client *client_p, struct MaskItem *conf, fde_t *fd)
904 michael 1303 {
905     if ((client_p->localClient->fd.ssl = SSL_new(ServerInfo.client_ctx)) == NULL)
906     {
907     ilog(LOG_TYPE_IRCD, "SSL_new() ERROR! -- %s",
908     ERR_error_string(ERR_get_error(), NULL));
909     SetDead(client_p);
910 michael 3171 exit_client(client_p, "SSL_new failed");
911 michael 1303 return;
912     }
913    
914     SSL_set_fd(fd->ssl, fd->fd);
915 michael 1306
916 michael 1632 if (!EmptyString(conf->cipher_list))
917     SSL_set_cipher_list(client_p->localClient->fd.ssl, conf->cipher_list);
918 michael 1306
919     ssl_server_handshake(NULL, client_p);
920 michael 1303 }
921     #endif
922    
923 adx 30 /* serv_connect_callback() - complete a server connection.
924 michael 2345 *
925 adx 30 * This routine is called after the server connection attempt has
926     * completed. If unsucessful, an error is sent to ops and the client
927     * is closed. If sucessful, it goes through the initialisation/check
928     * procedures, the capabilities are sent, and the socket is then
929     * marked for reading.
930     */
931     static void
932     serv_connect_callback(fde_t *fd, int status, void *data)
933     {
934     struct Client *client_p = data;
935 michael 1632 struct MaskItem *conf = NULL;
936 adx 30
937     /* First, make sure its a real client! */
938 michael 3246 assert(client_p);
939 adx 30 assert(&client_p->localClient->fd == fd);
940    
941     /* Next, for backward purposes, record the ip of the server */
942     memcpy(&client_p->localClient->ip, &fd->connect.hostaddr,
943     sizeof(struct irc_ssaddr));
944 michael 3246
945 adx 30 /* Check the status */
946     if (status != COMM_OK)
947     {
948     /* We have an error, so report it and quit
949     * Admins get to see any IP, mere opers don't *sigh*
950     */
951     if (ConfigServerHide.hide_server_ips)
952 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
953 adx 30 "Error connecting to %s: %s",
954     client_p->name, comm_errstr(status));
955     else
956 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
957 michael 2134 "Error connecting to %s[%s]: %s", client_p->name,
958     client_p->host, comm_errstr(status));
959 adx 30
960 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
961 michael 2134 "Error connecting to %s: %s",
962     client_p->name, comm_errstr(status));
963 adx 30
964     /* If a fd goes bad, call dead_link() the socket is no
965     * longer valid for reading or writing.
966     */
967     dead_link_on_write(client_p, 0);
968     return;
969     }
970    
971     /* COMM_OK, so continue the connection procedure */
972     /* Get the C/N lines */
973     conf = find_conf_name(&client_p->localClient->confs,
974 michael 2134 client_p->name, CONF_SERVER);
975 adx 30 if (conf == NULL)
976     {
977 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
978 michael 2134 "Lost connect{} block for %s", get_client_name(client_p, HIDE_IP));
979 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
980 michael 2134 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
981 adx 30
982 michael 3171 exit_client(client_p, "Lost connect{} block");
983 adx 30 return;
984     }
985    
986     /* Next, send the initial handshake */
987     SetHandshake(client_p);
988    
989     #ifdef HAVE_LIBCRYPTO
990 michael 1632 if (IsConfSSL(conf))
991 michael 1303 {
992 michael 1632 ssl_connect_init(client_p, conf, fd);
993 michael 1303 return;
994     }
995 adx 30 #endif
996    
997 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
998 adx 30
999 michael 1632 send_capabilities(client_p, 0);
1000 adx 30
1001 michael 2134 sendto_one(client_p, "SERVER %s 1 :%s%s", me.name,
1002     ConfigServerHide.hidden ? "(H) " : "", me.info);
1003 adx 30
1004     /* If we've been marked dead because a send failed, just exit
1005     * here now and save everyone the trouble of us ever existing.
1006     */
1007 michael 2345 if (IsDead(client_p))
1008 adx 30 {
1009 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
1010 michael 2134 "%s[%s] went dead during handshake",
1011 adx 30 client_p->name,
1012 michael 2134 client_p->host);
1013 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
1014 michael 2134 "%s went dead during handshake", client_p->name);
1015 adx 30 return;
1016     }
1017    
1018     /* don't move to serv_list yet -- we haven't sent a burst! */
1019     /* If we get here, we're ok, so lets start reading some data */
1020     comm_setselect(fd, COMM_SELECT_READ, read_packet, client_p, 0);
1021     }
1022    
1023     struct Client *
1024     find_servconn_in_progress(const char *name)
1025     {
1026     dlink_node *ptr;
1027     struct Client *cptr;
1028    
1029     DLINK_FOREACH(ptr, unknown_list.head)
1030     {
1031     cptr = ptr->data;
1032    
1033     if (cptr && cptr->name[0])
1034 michael 1652 if (!match(name, cptr->name))
1035 adx 30 return cptr;
1036     }
1037 michael 2345
1038 adx 30 return NULL;
1039     }

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision