ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/branches/8.2.x/src/auth.c
Revision: 4463
Committed: Wed Aug 13 17:26:13 2014 UTC (9 years, 8 months ago) by michael
Content type: text/x-csrc
File size: 14252 byte(s)
Log Message:
- Removed CNCB typedef

File Contents

# User Rev Content
1 adx 30 /*
2 michael 2916 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3 adx 30 *
4 michael 2916 * Copyright (c) 1997-2014 ircd-hybrid development team
5 adx 30 *
6     * This program is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * This program is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with this program; if not, write to the Free Software
18     * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
19     * USA
20     */
21    
22 michael 3324 /*! \file auth.c
23 michael 2916 * \brief Functions for querying a users ident.
24     * \version $Id$
25     */
26    
27 adx 30 /*
28     * Changes:
29     * July 6, 1999 - Rewrote most of the code here. When a client connects
30     * to the server and passes initial socket validation checks, it
31     * is owned by this module (auth) which returns it to the rest of the
32     * server when dns and auth queries are finished. Until the client is
33     * released, the server does not know it exists and does not process
34     * any messages from it.
35     * --Bleep Thomas Helvey <tomh@inxpress.net>
36     */
37 michael 1309
38 adx 30 #include "stdinc.h"
39     #include "list.h"
40 michael 1011 #include "ircd_defs.h"
41     #include "fdlist.h"
42 michael 3324 #include "auth.h"
43 michael 1309 #include "conf.h"
44 adx 30 #include "client.h"
45     #include "event.h"
46     #include "irc_string.h"
47     #include "ircd.h"
48     #include "packet.h"
49 michael 3322 #include "res.h"
50 adx 30 #include "s_bsd.h"
51 michael 1309 #include "log.h"
52 adx 30 #include "send.h"
53 michael 1654 #include "mempool.h"
54 adx 30
55 michael 1011
56 michael 3564 static const char *const HeaderMessages[] =
57 michael 2916 {
58 michael 4310 ":*** Looking up your hostname",
59 michael 3168 ":*** Found your hostname",
60     ":*** Couldn't look up your hostname",
61     ":*** Checking Ident",
62     ":*** Got Ident response",
63     ":*** No Ident response",
64 michael 4310 ":*** Your forward and reverse DNS do not match, ignoring hostname",
65 michael 3168 ":*** Your hostname is too long, ignoring hostname"
66 adx 30 };
67    
68 michael 2916 enum
69     {
70 adx 30 REPORT_DO_DNS,
71     REPORT_FIN_DNS,
72     REPORT_FAIL_DNS,
73     REPORT_DO_ID,
74     REPORT_FIN_ID,
75     REPORT_FAIL_ID,
76     REPORT_IP_MISMATCH,
77     REPORT_HOST_TOOLONG
78     };
79    
80 michael 3168 #define sendheader(c, i) sendto_one_notice((c), &me, HeaderMessages[(i)])
81 adx 30
82 michael 4310 static dlink_list auth_pending_list;
83 michael 4462 static void read_auth_reply(fde_t *, void *);
84 michael 4463 static void auth_connect_callback(fde_t *, int, void *);
85 adx 30
86 michael 4095
87 adx 30 /*
88     * make_auth_request - allocate a new auth request
89     */
90     static struct AuthRequest *
91     make_auth_request(struct Client *client)
92     {
93 michael 2181 struct AuthRequest *request = &client->localClient->auth;
94 adx 30
95 michael 1654 memset(request, 0, sizeof(*request));
96 adx 30
97 michael 2181 request->client = client;
98     request->timeout = CurrentTime + CONNECTTIMEOUT;
99    
100 michael 650 return request;
101 adx 30 }
102    
103     /*
104     * release_auth_client - release auth client from auth system
105     * this adds the client into the local client lists so it can be read by
106     * the main io processing loop
107     */
108     void
109 michael 992 release_auth_client(struct AuthRequest *auth)
110 adx 30 {
111 michael 992 struct Client *client = auth->client;
112    
113     if (IsDoingAuth(auth) || IsDNSPending(auth))
114     return;
115    
116 michael 2929 if (IsInAuth(auth))
117     {
118 michael 4310 dlinkDelete(&auth->node, &auth_pending_list);
119 michael 2929 ClearInAuth(auth);
120     }
121 michael 992
122 adx 30 /*
123     * When a client has auth'ed, we want to start reading what it sends
124     * us. This is what read_packet() does.
125     * -- adrian
126     */
127     client->localClient->allow_read = MAX_FLOOD;
128     comm_setflush(&client->localClient->fd, 1000, flood_recalc, client);
129 michael 650
130 michael 1241 client->localClient->since = CurrentTime;
131     client->localClient->lasttime = CurrentTime;
132     client->localClient->firsttime = CurrentTime;
133 michael 664 client->flags |= FLAGS_FINISHED_AUTH;
134 michael 650
135 adx 30 read_packet(&client->localClient->fd, client);
136     }
137 michael 2916
138 adx 30 /*
139     * auth_dns_callback - called when resolver query finishes
140 michael 998 * if the query resulted in a successful search, name will contain
141     * a non-NULL pointer, otherwise name will be NULL.
142 adx 30 * set the client on it's way to a connection completion, regardless
143     * of success of failure
144     */
145     static void
146 michael 4409 auth_dns_callback(void *vptr, const struct irc_ssaddr *addr, const char *name, size_t namelength)
147 adx 30 {
148 michael 992 struct AuthRequest *auth = vptr;
149 adx 30
150     ClearDNSPending(auth);
151    
152 michael 4409 if (!EmptyString(name))
153 adx 30 {
154 michael 992 const struct sockaddr_in *v4, *v4dns;
155     const struct sockaddr_in6 *v6, *v6dns;
156 adx 30
157     if (auth->client->localClient->ip.ss.ss_family == AF_INET6)
158     {
159 michael 992 v6 = (const struct sockaddr_in6 *)&auth->client->localClient->ip;
160     v6dns = (const struct sockaddr_in6 *)addr;
161 michael 3250
162 adx 30 if (memcmp(&v6->sin6_addr, &v6dns->sin6_addr, sizeof(struct in6_addr)) != 0)
163     {
164     sendheader(auth->client, REPORT_IP_MISMATCH);
165 michael 4409 release_auth_client(auth);
166     return;
167 adx 30 }
168     }
169     else
170     {
171 michael 992 v4 = (const struct sockaddr_in *)&auth->client->localClient->ip;
172     v4dns = (const struct sockaddr_in *)addr;
173 michael 3250
174     if (v4->sin_addr.s_addr != v4dns->sin_addr.s_addr)
175 adx 30 {
176     sendheader(auth->client, REPORT_IP_MISMATCH);
177 michael 4409 release_auth_client(auth);
178     return;
179 adx 30 }
180     }
181 michael 3250
182 michael 4409 if (namelength > HOSTLEN)
183     sendheader(auth->client, REPORT_HOST_TOOLONG);
184     else
185 adx 30 {
186 michael 4409 strlcpy(auth->client->host, name, sizeof(auth->client->host));
187 adx 30 sendheader(auth->client, REPORT_FIN_DNS);
188     }
189     }
190     else
191 michael 992 sendheader(auth->client, REPORT_FAIL_DNS);
192 adx 30
193 michael 992 release_auth_client(auth);
194 adx 30 }
195    
196     /*
197     * authsenderr - handle auth send errors
198     */
199     static void
200     auth_error(struct AuthRequest *auth)
201     {
202 michael 896 ++ServerStats.is_abad;
203 adx 30
204     fd_close(&auth->fd);
205    
206     ClearAuth(auth);
207    
208     sendheader(auth->client, REPORT_FAIL_ID);
209    
210 michael 992 release_auth_client(auth);
211 adx 30 }
212    
213     /*
214 michael 2916 * start_auth_query - Flag the client to show that an attempt to
215 adx 30 * contact the ident server on
216     * the client's host. The connect and subsequently the socket are all put
217     * into 'non-blocking' mode. Should the connect or any later phase of the
218     * identifing process fail, it is aborted and the user is given a username
219     * of "unknown".
220     */
221     static int
222     start_auth_query(struct AuthRequest *auth)
223     {
224     struct irc_ssaddr localaddr;
225     socklen_t locallen = sizeof(struct irc_ssaddr);
226     struct sockaddr_in6 *v6;
227    
228     /* open a socket of the same type as the client socket */
229     if (comm_open(&auth->fd, auth->client->localClient->ip.ss.ss_family,
230     SOCK_STREAM, 0, "ident") == -1)
231     {
232 michael 2916 report_error(L_ALL, "creating auth stream socket %s:%s",
233     get_client_name(auth->client, SHOW_IP), errno);
234 michael 1247 ilog(LOG_TYPE_IRCD, "Unable to create auth socket for %s",
235 adx 30 get_client_name(auth->client, SHOW_IP));
236 michael 896 ++ServerStats.is_abad;
237 adx 30 return 0;
238     }
239    
240     sendheader(auth->client, REPORT_DO_ID);
241    
242 michael 2916 /*
243 adx 30 * get the local address of the client and bind to that to
244     * make the auth request. This used to be done only for
245     * ifdef VIRTUAL_HOST, but needs to be done for all clients
246     * since the ident request must originate from that same address--
247     * and machines with multiple IP addresses are common now
248     */
249     memset(&localaddr, 0, locallen);
250     getsockname(auth->client->localClient->fd.fd, (struct sockaddr*)&localaddr,
251     &locallen);
252    
253     remove_ipv6_mapping(&localaddr);
254     v6 = (struct sockaddr_in6 *)&localaddr;
255     v6->sin6_port = htons(0);
256     localaddr.ss_port = htons(0);
257    
258 michael 4310 comm_connect_tcp(&auth->fd, auth->client->sockhost, RFC1413_PORT,
259 michael 2916 (struct sockaddr *)&localaddr, localaddr.ss_len, auth_connect_callback,
260     auth, auth->client->localClient->ip.ss.ss_family,
261 adx 30 GlobalSetOptions.ident_timeout);
262     return 1; /* We suceed here for now */
263     }
264    
265     /*
266 michael 2916 * start_auth
267 adx 30 *
268     * inputs - pointer to client to auth
269     * output - NONE
270     * side effects - starts auth (identd) and dns queries for a client
271     */
272 michael 2916 void
273 michael 3250 start_auth(struct Client *client_p)
274 adx 30 {
275     struct AuthRequest *auth = NULL;
276    
277 michael 3250 assert(client_p);
278 adx 30
279 michael 3250 auth = make_auth_request(client_p);
280 michael 2929 SetInAuth(auth);
281 michael 4310 dlinkAddTail(auth, &auth->node, &auth_pending_list);
282 adx 30
283 michael 3250 sendheader(client_p, REPORT_DO_DNS);
284 adx 30
285 michael 992 SetDNSPending(auth);
286    
287 michael 4341 if (ConfigGeneral.disable_auth == 0)
288 michael 992 {
289     SetDoingAuth(auth);
290 adx 30 start_auth_query(auth);
291 michael 992 }
292 adx 30
293 michael 3250 gethost_byaddr(auth_dns_callback, auth, &client_p->localClient->ip);
294 adx 30 }
295    
296     /*
297     * timeout_auth_queries - timeout resolver and identd requests
298     * allow clients through if requests failed
299     */
300     static void
301     timeout_auth_queries_event(void *notused)
302     {
303 michael 3250 dlink_node *ptr = NULL, *ptr_next = NULL;
304 adx 30
305 michael 4310 DLINK_FOREACH_SAFE(ptr, ptr_next, auth_pending_list.head)
306 adx 30 {
307 michael 992 struct AuthRequest *auth = ptr->data;
308 adx 30
309 michael 992 if (auth->timeout > CurrentTime)
310 michael 2929 break;
311 adx 30
312 michael 992 if (IsDoingAuth(auth))
313 michael 2916 {
314 michael 896 ++ServerStats.is_abad;
315 michael 1000 fd_close(&auth->fd);
316 michael 998 ClearAuth(auth);
317 adx 30 sendheader(auth->client, REPORT_FAIL_ID);
318 michael 992 }
319 adx 30
320 michael 992 if (IsDNSPending(auth))
321     {
322     delete_resolver_queries(auth);
323 michael 998 ClearDNSPending(auth);
324 michael 992 sendheader(auth->client, REPORT_FAIL_DNS);
325     }
326 adx 30
327 michael 1247 ilog(LOG_TYPE_IRCD, "DNS/AUTH timeout %s",
328 michael 992 get_client_name(auth->client, SHOW_IP));
329     release_auth_client(auth);
330 adx 30 }
331     }
332    
333     /*
334     * auth_connect_callback() - deal with the result of comm_connect_tcp()
335     *
336     * If the connection failed, we simply close the auth fd and report
337     * a failure. If the connection suceeded send the ident server a query
338     * giving "theirport , ourport". The write is only attempted *once* so
339     * it is deemed to be a fail if the entire write doesn't write all the
340     * data given. This shouldnt be a problem since the socket should have
341     * a write buffer far greater than this message to store it in should
342     * problems arise. -avalon
343     */
344     static void
345     auth_connect_callback(fde_t *fd, int error, void *data)
346     {
347     struct AuthRequest *auth = data;
348     struct irc_ssaddr us;
349     struct irc_ssaddr them;
350     char authbuf[32];
351     socklen_t ulen = sizeof(struct irc_ssaddr);
352     socklen_t tlen = sizeof(struct irc_ssaddr);
353 michael 1032 uint16_t uport, tport;
354 adx 30 struct sockaddr_in6 *v6;
355    
356     if (error != COMM_OK)
357     {
358     auth_error(auth);
359     return;
360     }
361    
362 michael 3250 if (getsockname(auth->client->localClient->fd.fd, (struct sockaddr *)&us, &ulen) ||
363     getpeername(auth->client->localClient->fd.fd, (struct sockaddr *)&them, &tlen))
364 adx 30 {
365 michael 1247 ilog(LOG_TYPE_IRCD, "auth get{sock,peer}name error for %s",
366 michael 3250 get_client_name(auth->client, SHOW_IP));
367 adx 30 auth_error(auth);
368     return;
369     }
370    
371     v6 = (struct sockaddr_in6 *)&us;
372     uport = ntohs(v6->sin6_port);
373     v6 = (struct sockaddr_in6 *)&them;
374     tport = ntohs(v6->sin6_port);
375     remove_ipv6_mapping(&us);
376     remove_ipv6_mapping(&them);
377 michael 2916
378 michael 4310 snprintf(authbuf, sizeof(authbuf), "%u, %u\r\n", tport, uport);
379 adx 30
380     if (send(fd->fd, authbuf, strlen(authbuf), 0) == -1)
381     {
382     auth_error(auth);
383     return;
384     }
385 michael 696
386 michael 4310 comm_setselect(fd, COMM_SELECT_READ, read_auth_reply, auth, 0);
387 adx 30 }
388    
389 michael 4310 /** Enum used to index ident reply fields in a human-readable way. */
390     enum IdentReplyFields
391     {
392     IDENT_PORT_NUMBERS,
393     IDENT_REPLY_TYPE,
394     IDENT_OS_TYPE,
395     IDENT_INFO,
396     USERID_TOKEN_COUNT
397     };
398    
399     /** Parse an ident reply line and extract the userid from it.
400     * \param reply The ident reply line.
401     * \return The userid, or NULL on parse failure.
402     */
403     static const char *
404     check_ident_reply(char *reply)
405     {
406     char *token = NULL, *end = NULL;
407     char *vector[USERID_TOKEN_COUNT];
408     int count = token_vector(reply, ':', vector, USERID_TOKEN_COUNT);
409    
410     if (USERID_TOKEN_COUNT != count)
411     return NULL;
412    
413     /*
414     * Second token is the reply type
415     */
416     token = vector[IDENT_REPLY_TYPE];
417    
418     if (EmptyString(token))
419     return NULL;
420    
421     while (IsSpace(*token))
422     ++token;
423    
424     if (strncmp(token, "USERID", 6))
425     return NULL;
426    
427     /*
428     * Third token is the os type
429     */
430     token = vector[IDENT_OS_TYPE];
431    
432     if (EmptyString(token))
433     return NULL;
434    
435     while (IsSpace(*token))
436     ++token;
437    
438     /*
439     * Unless "OTHER" is specified as the operating system type, the server
440     * is expected to return the "normal" user identification of the owner
441     * of this connection. "Normal" in this context may be taken to mean a
442     * string of characters which uniquely identifies the connection owner
443     * such as a user identifier assigned by the system administrator and
444     * used by such user as a mail identifier, or as the "user" part of a
445     * user/password pair used to gain access to system resources. When an
446     * operating system is specified (e.g., anything but "OTHER"), the user
447     * identifier is expected to be in a more or less immediately useful
448     * form - e.g., something that could be used as an argument to "finger"
449     * or as a mail address.
450     */
451     if (!strncmp(token, "OTHER", 5))
452     return NULL;
453    
454     /*
455     * Fourth token is the username
456     */
457     token = vector[IDENT_INFO];
458    
459     if (EmptyString(token))
460     return NULL;
461    
462     while (IsSpace(*token))
463     ++token;
464    
465     while (*token == '~' || *token == '^')
466     ++token;
467    
468     /*
469     * Look for the end of the username, terminators are '\0, @, <SPACE>, :'
470     */
471     for (end = token; *end; ++end)
472     if (IsSpace(*end) || '@' == *end || ':' == *end)
473     break;
474     *end = '\0';
475    
476     return token;
477     }
478    
479 adx 30 /*
480 michael 2916 * read_auth_reply - read the reply (if any) from the ident server
481 adx 30 * we connected to.
482     * We only give it one shot, if the reply isn't good the first time
483     * fail the authentication entirely. --Bleep
484     */
485     static void
486     read_auth_reply(fde_t *fd, void *data)
487     {
488     struct AuthRequest *auth = data;
489 michael 4310 const char *username = NULL;
490     ssize_t len = 0;
491     char buf[RFC1413_BUFSIZ + 1];
492 adx 30
493 michael 4310 if ((len = recv(fd->fd, buf, RFC1413_BUFSIZ, 0)) > 0)
494 adx 30 {
495     buf[len] = '\0';
496 michael 4310 username = check_ident_reply(buf);
497 adx 30 }
498    
499     fd_close(fd);
500    
501     ClearAuth(auth);
502    
503 michael 4310 if (EmptyString(username))
504 adx 30 {
505     sendheader(auth->client, REPORT_FAIL_ID);
506 michael 896 ++ServerStats.is_abad;
507 adx 30 }
508     else
509     {
510 michael 4310 strlcpy(auth->client->username, username, sizeof(auth->client->username));
511 adx 30 sendheader(auth->client, REPORT_FIN_ID);
512 michael 896 ++ServerStats.is_asuc;
513 adx 30 SetGotId(auth->client);
514     }
515    
516 michael 992 release_auth_client(auth);
517 adx 30 }
518    
519     /*
520     * delete_auth()
521     */
522 michael 2916 void
523 michael 992 delete_auth(struct AuthRequest *auth)
524 adx 30 {
525 michael 992 if (IsDNSPending(auth))
526     delete_resolver_queries(auth);
527 adx 30
528 michael 1000 if (IsDoingAuth(auth))
529     fd_close(&auth->fd);
530    
531 michael 2929 if (IsInAuth(auth))
532     {
533 michael 4310 dlinkDelete(&auth->node, &auth_pending_list);
534 michael 2929 ClearInAuth(auth);
535     }
536 adx 30 }
537 michael 4310
538     /* auth_init
539     *
540     * Initialise the auth code
541     */
542     void
543     auth_init(void)
544     {
545     static struct event timeout_auth_queries =
546     {
547     .name = "timeout_auth_queries_event",
548     .handler = timeout_auth_queries_event,
549     .when = 1
550     };
551    
552     event_add(&timeout_auth_queries, NULL);
553     }

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision