ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/client.c
Revision: 3024
Committed: Mon Feb 24 22:31:48 2014 UTC (11 years, 6 months ago) by michael
Content type: text/x-csrc
File size: 36175 byte(s)
Log Message:
- client.c:find_person(): fixed mismatching prototype as pointed out by Adam

File Contents

# Content
1 /*
2 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3 *
4 * Copyright (c) 1997-2014 ircd-hybrid development team
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
19 * USA
20 */
21
22 /*! \file client.c
23 * \brief Controls clients.
24 * \version $Id$
25 */
26
27 #include "stdinc.h"
28 #include "list.h"
29 #include "client.h"
30 #include "channel_mode.h"
31 #include "event.h"
32 #include "fdlist.h"
33 #include "hash.h"
34 #include "irc_string.h"
35 #include "ircd.h"
36 #include "s_gline.h"
37 #include "numeric.h"
38 #include "packet.h"
39 #include "s_auth.h"
40 #include "s_bsd.h"
41 #include "conf.h"
42 #include "log.h"
43 #include "s_misc.h"
44 #include "s_serv.h"
45 #include "send.h"
46 #include "whowas.h"
47 #include "s_user.h"
48 #include "dbuf.h"
49 #include "memory.h"
50 #include "mempool.h"
51 #include "hostmask.h"
52 #include "listener.h"
53 #include "irc_res.h"
54 #include "userhost.h"
55 #include "watch.h"
56 #include "rng_mt.h"
57 #include "parse.h"
58
59 dlink_list listing_client_list = { NULL, NULL, 0 };
60 /* Pointer to beginning of Client list */
61 dlink_list global_client_list = {NULL, NULL, 0};
62 /* unknown/client pointer lists */
63 dlink_list unknown_list = {NULL, NULL, 0};
64 dlink_list local_client_list = {NULL, NULL, 0};
65 dlink_list serv_list = {NULL, NULL, 0};
66 dlink_list global_serv_list = {NULL, NULL, 0};
67 dlink_list oper_list = {NULL, NULL, 0};
68
69 static EVH check_pings;
70
71 static mp_pool_t *client_pool = NULL;
72 static mp_pool_t *lclient_pool = NULL;
73
74 static dlink_list dead_list = { NULL, NULL, 0};
75 static dlink_list abort_list = { NULL, NULL, 0};
76
77 static dlink_node *eac_next; /* next aborted client to exit */
78
79 static void check_pings_list(dlink_list *);
80 static void check_unknowns_list(void);
81
82
83 /* client_init()
84 *
85 * inputs - NONE
86 * output - NONE
87 * side effects - initialize client free memory
88 */
89 void
90 client_init(void)
91 {
92 /* start off the check ping event .. -- adrian
93 * Every 30 seconds is plenty -- db
94 */
95 client_pool = mp_pool_new(sizeof(struct Client), MP_CHUNK_SIZE_CLIENT);
96 lclient_pool = mp_pool_new(sizeof(struct LocalUser), MP_CHUNK_SIZE_LCLIENT);
97 eventAdd("check_pings", check_pings, NULL, 5);
98 }
99
100 /*
101 * make_client - create a new Client struct and set it to initial state.
102 *
103 * from == NULL, create local client (a client connected
104 * to a socket).
105 * WARNING: This leaves the client in a dangerous
106 * state where fd == -1, dead flag is not set and
107 * the client is on the unknown_list; therefore,
108 * the first thing to do after calling make_client(NULL)
109 * is setting fd to something reasonable. -adx
110 *
111 * from, create remote client (behind a socket
112 * associated with the client defined by
113 * 'from'). ('from' is a local client!!).
114 */
115 struct Client *
116 make_client(struct Client *from)
117 {
118 struct Client *client_p = mp_pool_get(client_pool);
119
120 memset(client_p, 0, sizeof(*client_p));
121
122 if (from == NULL)
123 {
124 client_p->from = client_p; /* 'from' of local client is self! */
125 client_p->localClient = mp_pool_get(lclient_pool);
126
127 memset(client_p->localClient, 0, sizeof(*client_p->localClient));
128
129 client_p->localClient->since = CurrentTime;
130 client_p->localClient->lasttime = CurrentTime;
131 client_p->localClient->firsttime = CurrentTime;
132 client_p->localClient->registration = REG_INIT;
133
134 /* as good a place as any... */
135 dlinkAdd(client_p, &client_p->localClient->lclient_node, &unknown_list);
136 }
137 else
138 client_p->from = from; /* 'from' of local client is self! */
139
140 client_p->idhnext = client_p;
141 client_p->hnext = client_p;
142 SetUnknown(client_p);
143 strcpy(client_p->username, "unknown");
144 strcpy(client_p->svid, "0");
145
146 return client_p;
147 }
148
149 /*
150 * free_client
151 *
152 * inputs - pointer to client
153 * output - NONE
154 * side effects - client pointed to has its memory freed
155 */
156 static void
157 free_client(struct Client *client_p)
158 {
159 assert(client_p != NULL);
160 assert(client_p != &me);
161 assert(client_p->hnext == client_p);
162 assert(client_p->idhnext == client_p);
163 assert(client_p->channel.head == NULL);
164 assert(dlink_list_length(&client_p->channel) == 0);
165 assert(dlink_list_length(&client_p->whowas) == 0);
166 assert(!IsServer(client_p) || (IsServer(client_p) && client_p->serv));
167
168 MyFree(client_p->serv);
169 MyFree(client_p->certfp);
170
171 if (MyConnect(client_p))
172 {
173 assert(client_p->localClient->invited.head == NULL);
174 assert(dlink_list_length(&client_p->localClient->invited) == 0);
175 assert(dlink_list_length(&client_p->localClient->watches) == 0);
176 assert(IsClosing(client_p) && IsDead(client_p));
177
178 MyFree(client_p->localClient->response);
179 MyFree(client_p->localClient->auth_oper);
180
181 /*
182 * clean up extra sockets from P-lines which have been discarded.
183 */
184 if (client_p->localClient->listener)
185 {
186 assert(0 < client_p->localClient->listener->ref_count);
187 if (0 == --client_p->localClient->listener->ref_count &&
188 !client_p->localClient->listener->active)
189 free_listener(client_p->localClient->listener);
190 }
191
192 dbuf_clear(&client_p->localClient->buf_recvq);
193 dbuf_clear(&client_p->localClient->buf_sendq);
194
195 mp_pool_release(client_p->localClient);
196 }
197
198 mp_pool_release(client_p);
199 }
200
201 /*
202 * check_pings - go through the local client list and check activity
203 * kill off stuff that should die
204 *
205 * inputs - NOT USED (from event)
206 * output - next time_t when check_pings() should be called again
207 * side effects -
208 *
209 *
210 * A PING can be sent to clients as necessary.
211 *
212 * Client/Server ping outs are handled.
213 */
214
215 /*
216 * Addon from adrian. We used to call this after nextping seconds,
217 * however I've changed it to run once a second. This is only for
218 * PING timeouts, not K/etc-line checks (thanks dianora!). Having it
219 * run once a second makes life a lot easier - when a new client connects
220 * and they need a ping in 4 seconds, if nextping was set to 20 seconds
221 * we end up waiting 20 seconds. This is stupid. :-)
222 * I will optimise (hah!) check_pings() once I've finished working on
223 * tidying up other network IO evilnesses.
224 * -- adrian
225 */
226
227 static void
228 check_pings(void *notused)
229 {
230 check_pings_list(&local_client_list);
231 check_pings_list(&serv_list);
232 check_unknowns_list();
233 }
234
235 /* check_pings_list()
236 *
237 * inputs - pointer to list to check
238 * output - NONE
239 * side effects -
240 */
241 static void
242 check_pings_list(dlink_list *list)
243 {
244 char scratch[IRCD_BUFSIZE];
245 int ping = 0; /* ping time value from client */
246 dlink_node *ptr = NULL, *next_ptr = NULL;
247
248 DLINK_FOREACH_SAFE(ptr, next_ptr, list->head)
249 {
250 struct Client *client_p = ptr->data;
251
252 /*
253 ** Note: No need to notify opers here. It's
254 ** already done when "FLAGS_DEADSOCKET" is set.
255 */
256 if (IsDead(client_p))
257 {
258 /* Ignore it, its been exited already */
259 continue;
260 }
261
262 if (!IsRegistered(client_p))
263 ping = CONNECTTIMEOUT;
264 else
265 ping = get_client_ping(&client_p->localClient->confs);
266
267 if (ping < CurrentTime - client_p->localClient->lasttime)
268 {
269 if (!IsPingSent(client_p))
270 {
271 /*
272 * if we havent PINGed the connection and we havent
273 * heard from it in a while, PING it to make sure
274 * it is still alive.
275 */
276 SetPingSent(client_p);
277 client_p->localClient->lasttime = CurrentTime - ping;
278 sendto_one(client_p, "PING :%s", ID_or_name(&me, client_p));
279 }
280 else
281 {
282 if (CurrentTime - client_p->localClient->lasttime >= 2 * ping)
283 {
284 /*
285 * If the client/server hasn't talked to us in 2*ping seconds
286 * and it has a ping time, then close its connection.
287 */
288 if (IsServer(client_p) || IsHandshake(client_p))
289 {
290 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
291 "No response from %s, closing link",
292 get_client_name(client_p, HIDE_IP));
293 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
294 "No response from %s, closing link",
295 get_client_name(client_p, MASK_IP));
296 ilog(LOG_TYPE_IRCD, "No response from %s, closing link",
297 get_client_name(client_p, HIDE_IP));
298 }
299
300 snprintf(scratch, sizeof(scratch), "Ping timeout: %d seconds",
301 (int)(CurrentTime - client_p->localClient->lasttime));
302 exit_client(client_p, &me, scratch);
303 }
304 }
305 }
306 }
307 }
308
309 /* check_unknowns_list()
310 *
311 * inputs - pointer to list of unknown clients
312 * output - NONE
313 * side effects - unknown clients get marked for termination after n seconds
314 */
315 static void
316 check_unknowns_list(void)
317 {
318 dlink_node *ptr, *next_ptr;
319
320 DLINK_FOREACH_SAFE(ptr, next_ptr, unknown_list.head)
321 {
322 struct Client *client_p = ptr->data;
323
324 /*
325 * Check UNKNOWN connections - if they have been in this state
326 * for > 30s, close them.
327 */
328 if (IsAuthFinished(client_p) && (CurrentTime - client_p->localClient->firsttime) > 30)
329 exit_client(client_p, &me, "Registration timed out");
330 }
331 }
332
333 /* check_conf_klines()
334 *
335 * inputs - NONE
336 * output - NONE
337 * side effects - Check all connections for a pending kline against the
338 * client, exit the client if a kline matches.
339 */
340 void
341 check_conf_klines(void)
342 {
343 struct Client *client_p = NULL; /* current local client_p being examined */
344 struct MaskItem *conf = NULL;
345 dlink_node *ptr, *next_ptr;
346
347 DLINK_FOREACH_SAFE(ptr, next_ptr, local_client_list.head)
348 {
349 client_p = ptr->data;
350
351 /* If a client is already being exited
352 */
353 if (IsDead(client_p) || !IsClient(client_p))
354 continue;
355
356 if ((conf = find_dline_conf(&client_p->localClient->ip,
357 client_p->localClient->aftype)) != NULL)
358 {
359 if (conf->type == CONF_EXEMPT)
360 continue;
361
362 conf_try_ban(client_p, conf);
363 continue; /* and go examine next fd/client_p */
364 }
365
366 if (ConfigFileEntry.glines)
367 {
368 if ((conf = find_conf_by_address(client_p->host, &client_p->localClient->ip,
369 CONF_GLINE, client_p->localClient->aftype,
370 client_p->username, NULL, 1)))
371 {
372 conf_try_ban(client_p, conf);
373 /* and go examine next fd/client_p */
374 continue;
375 }
376 }
377
378 if ((conf = find_conf_by_address(client_p->host, &client_p->localClient->ip,
379 CONF_KLINE, client_p->localClient->aftype,
380 client_p->username, NULL, 1)))
381 {
382 conf_try_ban(client_p, conf);
383 continue;
384 }
385
386 if ((conf = find_matching_name_conf(CONF_XLINE, client_p->info,
387 NULL, NULL, 0)))
388 {
389 conf_try_ban(client_p, conf);
390 continue;
391 }
392 }
393
394 /* also check the unknowns list for new dlines */
395 DLINK_FOREACH_SAFE(ptr, next_ptr, unknown_list.head)
396 {
397 client_p = ptr->data;
398
399 if ((conf = find_dline_conf(&client_p->localClient->ip,
400 client_p->localClient->aftype)))
401 {
402 if (conf->type == CONF_EXEMPT)
403 continue;
404
405 exit_client(client_p, &me, "D-lined");
406 }
407 }
408 }
409
410 /*
411 * conf_try_ban
412 *
413 * inputs - pointer to client to ban
414 * - pointer to MaskItem
415 * output - NONE
416 * side effects - given client_p is banned
417 */
418 void
419 conf_try_ban(struct Client *client_p, struct MaskItem *conf)
420 {
421 const char *user_reason = NULL; /* What is sent to user */
422 const char *type_string = NULL;
423 const char dline_string[] = "D-line";
424 const char kline_string[] = "K-line";
425 const char gline_string[] = "G-line";
426 const char xline_string[] = "X-line";
427
428 switch (conf->type)
429 {
430 case CONF_KLINE:
431 if (IsExemptKline(client_p))
432 {
433 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
434 "KLINE over-ruled for %s, client is kline_exempt",
435 get_client_name(client_p, HIDE_IP));
436 return;
437 }
438
439 type_string = kline_string;
440 break;
441 case CONF_DLINE:
442 type_string = dline_string;
443 break;
444 case CONF_GLINE:
445 if (IsExemptKline(client_p) ||
446 IsExemptGline(client_p))
447 {
448 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
449 "GLINE over-ruled for %s, client is %sline_exempt",
450 get_client_name(client_p, HIDE_IP), IsExemptKline(client_p) ? "k" : "g");
451 return;
452 }
453
454 type_string = gline_string;
455 break;
456 case CONF_XLINE:
457 type_string = xline_string;
458 ++conf->count;
459 break;
460 default:
461 assert(0);
462 break;
463 }
464
465 user_reason = conf->reason ? conf->reason : type_string;
466
467 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE, "%s active for %s",
468 type_string, get_client_name(client_p, HIDE_IP));
469
470 if (IsClient(client_p))
471 sendto_one(client_p, form_str(ERR_YOUREBANNEDCREEP),
472 me.name, client_p->name, user_reason);
473
474 exit_client(client_p, &me, user_reason);
475 }
476
477 /* update_client_exit_stats()
478 *
479 * input - pointer to client
480 * output - NONE
481 * side effects -
482 */
483 static void
484 update_client_exit_stats(struct Client *client_p)
485 {
486 if (IsClient(client_p))
487 {
488 assert(Count.total > 0);
489 --Count.total;
490 if (HasUMode(client_p, UMODE_OPER))
491 --Count.oper;
492 if (HasUMode(client_p, UMODE_INVISIBLE))
493 --Count.invisi;
494 }
495 else if (IsServer(client_p))
496 sendto_realops_flags(UMODE_EXTERNAL, L_ALL, SEND_NOTICE,
497 "Server %s split from %s",
498 client_p->name, client_p->servptr->name);
499
500 if (splitchecking && !splitmode)
501 check_splitmode(NULL);
502 }
503
504 /* find_person()
505 *
506 * inputs - pointer to name
507 * output - return client pointer
508 * side effects - find person by (nick)name
509 */
510 struct Client *
511 find_person(const struct Client *const client_p, const char *name)
512 {
513 struct Client *target_p = NULL;
514
515 if (IsDigit(*name))
516 {
517 if (IsServer(client_p) || HasFlag(client_p, FLAGS_SERVICE))
518 target_p = hash_find_id(name);
519 }
520 else
521 target_p = hash_find_client(name);
522
523 return (target_p && IsClient(target_p)) ? target_p : NULL;
524 }
525
526 /*
527 * find_chasing - find the client structure for a nick name (name)
528 * using history mechanism if necessary. If the client is not found,
529 * an error message (NO SUCH NICK) is generated. If the client was found
530 * through the history, chasing will be 1 and otherwise 0.
531 */
532 struct Client *
533 find_chasing(struct Client *source_p, const char *name, int *const chasing)
534 {
535 struct Client *who = find_person(source_p->from, name);
536
537 if (chasing)
538 *chasing = 0;
539
540 if (who)
541 return who;
542
543 if (IsDigit(*name))
544 return NULL;
545
546 if ((who = whowas_get_history(name,
547 (time_t)ConfigFileEntry.kill_chase_time_limit))
548 == NULL)
549 {
550 sendto_one(source_p, form_str(ERR_NOSUCHNICK),
551 me.name, source_p->name, name);
552 return NULL;
553 }
554
555 if (chasing)
556 *chasing = 1;
557
558 return who;
559 }
560
561 /*
562 * get_client_name - Return the name of the client
563 * for various tracking and
564 * admin purposes. The main purpose of this function is to
565 * return the "socket host" name of the client, if that
566 * differs from the advertised name (other than case).
567 * But, this can be used to any client structure.
568 *
569 * NOTE 1:
570 * Watch out the allocation of "nbuf", if either source_p->name
571 * or source_p->sockhost gets changed into pointers instead of
572 * directly allocated within the structure...
573 *
574 * NOTE 2:
575 * Function return either a pointer to the structure (source_p) or
576 * to internal buffer (nbuf). *NEVER* use the returned pointer
577 * to modify what it points!!!
578 */
579 const char *
580 get_client_name(const struct Client *client, enum addr_mask_type type)
581 {
582 static char nbuf[HOSTLEN * 2 + USERLEN + 5];
583
584 assert(client != NULL);
585
586 if (!MyConnect(client))
587 return client->name;
588
589 if (IsServer(client) || IsConnecting(client) || IsHandshake(client))
590 {
591 if (!irccmp(client->name, client->host))
592 return client->name;
593 else if (ConfigServerHide.hide_server_ips)
594 type = MASK_IP;
595 }
596
597 if (ConfigFileEntry.hide_spoof_ips)
598 if (type == SHOW_IP && IsIPSpoof(client))
599 type = MASK_IP;
600
601 /* And finally, let's get the host information, ip or name */
602 switch (type)
603 {
604 case SHOW_IP:
605 snprintf(nbuf, sizeof(nbuf), "%s[%s@%s]",
606 client->name,
607 client->username, client->sockhost);
608 break;
609 case MASK_IP:
610 if (client->localClient->aftype == AF_INET)
611 snprintf(nbuf, sizeof(nbuf), "%s[%s@255.255.255.255]",
612 client->name, client->username);
613 else
614 snprintf(nbuf, sizeof(nbuf), "%s[%s@ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff]",
615 client->name, client->username);
616 break;
617 default:
618 snprintf(nbuf, sizeof(nbuf), "%s[%s@%s]",
619 client->name,
620 client->username, client->host);
621 }
622
623 return nbuf;
624 }
625
626 void
627 free_exited_clients(void)
628 {
629 dlink_node *ptr = NULL, *next = NULL;
630
631 DLINK_FOREACH_SAFE(ptr, next, dead_list.head)
632 {
633 free_client(ptr->data);
634 dlinkDelete(ptr, &dead_list);
635 free_dlink_node(ptr);
636 }
637 }
638
639 /*
640 * Exit one client, local or remote. Assuming all dependents have
641 * been already removed, and socket closed for local client.
642 *
643 * The only messages generated are QUITs on channels.
644 */
645 static void
646 exit_one_client(struct Client *source_p, const char *quitmsg)
647 {
648 dlink_node *lp = NULL, *next_lp = NULL;
649
650 assert(!IsMe(source_p));
651
652 if (IsClient(source_p))
653 {
654 if (source_p->servptr->serv != NULL)
655 dlinkDelete(&source_p->lnode, &source_p->servptr->serv->client_list);
656
657 /*
658 * If a person is on a channel, send a QUIT notice
659 * to every client (person) on the same channel (so
660 * that the client can show the "**signoff" message).
661 * (Note: The notice is to the local clients *only*)
662 */
663 sendto_common_channels_local(source_p, 0, 0, ":%s!%s@%s QUIT :%s",
664 source_p->name, source_p->username,
665 source_p->host, quitmsg);
666 DLINK_FOREACH_SAFE(lp, next_lp, source_p->channel.head)
667 remove_user_from_channel(lp->data);
668
669 whowas_add_history(source_p, 0);
670 whowas_off_history(source_p);
671
672 watch_check_hash(source_p, RPL_LOGOFF);
673
674 if (MyConnect(source_p))
675 {
676 /* Clean up invitefield */
677 DLINK_FOREACH_SAFE(lp, next_lp, source_p->localClient->invited.head)
678 del_invite(lp->data, source_p);
679
680 del_all_accepts(source_p);
681 }
682 }
683 else if (IsServer(source_p))
684 {
685 dlinkDelete(&source_p->lnode, &source_p->servptr->serv->server_list);
686
687 if ((lp = dlinkFindDelete(&global_serv_list, source_p)) != NULL)
688 free_dlink_node(lp);
689 }
690
691 /* Remove source_p from the client lists */
692 if (HasID(source_p))
693 hash_del_id(source_p);
694 if (source_p->name[0])
695 hash_del_client(source_p);
696
697 if (IsUserHostIp(source_p))
698 delete_user_host(source_p->username, source_p->host, !MyConnect(source_p));
699
700 /* remove from global client list
701 * NOTE: source_p->node.next cannot be NULL if the client is added
702 * to global_client_list (there is always &me at its end)
703 */
704 if (source_p != NULL && source_p->node.next != NULL)
705 dlinkDelete(&source_p->node, &global_client_list);
706
707 update_client_exit_stats(source_p);
708
709 /* Check to see if the client isn't already on the dead list */
710 assert(dlinkFind(&dead_list, source_p) == NULL);
711
712 /* add to dead client dlist */
713 SetDead(source_p);
714 dlinkAdd(source_p, make_dlink_node(), &dead_list);
715 }
716
717 /* Recursively send QUITs and SQUITs for source_p and all its dependent clients
718 * and servers to those servers that need them. A server needs the client
719 * QUITs if it can't figure them out from the SQUIT (ie pre-TS4) or if it
720 * isn't getting the SQUIT because of @#(*&@)# hostmasking. With TS4, once
721 * a link gets a SQUIT, it doesn't need any QUIT/SQUITs for clients depending
722 * on that one -orabidoo
723 *
724 * This is now called on each local server -adx
725 */
726 static void
727 recurse_send_quits(struct Client *original_source_p, struct Client *source_p,
728 struct Client *from, struct Client *to, const char *comment,
729 const char *splitstr)
730 {
731 dlink_node *ptr, *next;
732 struct Client *target_p;
733
734 assert(to != source_p); /* should be already removed from serv_list */
735
736 /* If this server can handle quit storm (QS) removal
737 * of dependents, just send the SQUIT
738 */
739 if (!IsCapable(to, CAP_QS))
740 DLINK_FOREACH_SAFE(ptr, next, source_p->serv->client_list.head)
741 {
742 target_p = ptr->data;
743 sendto_one(to, ":%s QUIT :%s", target_p->name, splitstr);
744 }
745
746 DLINK_FOREACH_SAFE(ptr, next, source_p->serv->server_list.head)
747 recurse_send_quits(original_source_p, ptr->data, from, to,
748 comment, splitstr);
749
750 if ((source_p == original_source_p && to != from) ||
751 !IsCapable(to, CAP_QS))
752 {
753 /* don't use a prefix here - we have to be 100% sure the message
754 * will be accepted without Unknown prefix etc.. */
755 sendto_one(to, "SQUIT %s :%s", ID_or_name(source_p, to), comment);
756 }
757 }
758
759 /*
760 * Remove all clients that depend on source_p; assumes all (S)QUITs have
761 * already been sent. we make sure to exit a server's dependent clients
762 * and servers before the server itself; exit_one_client takes care of
763 * actually removing things off llists. tweaked from +CSr31 -orabidoo
764 */
765 static void
766 recurse_remove_clients(struct Client *source_p, const char *quitmsg)
767 {
768 dlink_node *ptr, *next;
769
770 DLINK_FOREACH_SAFE(ptr, next, source_p->serv->client_list.head)
771 exit_one_client(ptr->data, quitmsg);
772
773 DLINK_FOREACH_SAFE(ptr, next, source_p->serv->server_list.head)
774 {
775 recurse_remove_clients(ptr->data, quitmsg);
776 exit_one_client(ptr->data, quitmsg);
777 }
778 }
779
780 /*
781 ** Remove *everything* that depends on source_p, from all lists, and sending
782 ** all necessary QUITs and SQUITs. source_p itself is still on the lists,
783 ** and its SQUITs have been sent except for the upstream one -orabidoo
784 */
785 static void
786 remove_dependents(struct Client *source_p, struct Client *from,
787 const char *comment, const char *splitstr)
788 {
789 dlink_node *ptr = NULL;
790
791 DLINK_FOREACH(ptr, serv_list.head)
792 recurse_send_quits(source_p, source_p, from, ptr->data,
793 comment, splitstr);
794
795 recurse_remove_clients(source_p, splitstr);
796 }
797
798 /*
799 * exit_client - exit a client of any type. Generally, you can use
800 * this on any struct Client, regardless of its state.
801 *
802 * Note, you shouldn't exit remote _users_ without first doing
803 * AddFlag(x, FLAGS_KILLED) and propagating a kill or similar message.
804 * However, it is perfectly correct to call exit_client to force a _server_
805 * quit (either local or remote one).
806 *
807 * inputs: - a client pointer that is going to be exited
808 * - for servers, the second argument is a pointer to who
809 * is firing the server. This side won't get any generated
810 * messages. NEVER NULL!
811 * output: none
812 * side effects: the client is delinked from all lists, disconnected,
813 * and the rest of IRC network is notified of the exit.
814 * Client memory is scheduled to be freed
815 */
816 void
817 exit_client(struct Client *source_p, struct Client *from, const char *comment)
818 {
819 dlink_node *m = NULL;
820
821 if (MyConnect(source_p))
822 {
823 /* DO NOT REMOVE. exit_client can be called twice after a failed
824 * read/write.
825 */
826 if (IsClosing(source_p))
827 return;
828
829 SetClosing(source_p);
830
831 if (IsIpHash(source_p))
832 remove_one_ip(&source_p->localClient->ip);
833
834 delete_auth(&source_p->localClient->auth);
835
836 /*
837 * This source_p could have status of one of STAT_UNKNOWN, STAT_CONNECTING
838 * STAT_HANDSHAKE or STAT_UNKNOWN
839 * all of which are lumped together into unknown_list
840 *
841 * In all above cases IsRegistered() will not be true.
842 */
843 if (!IsRegistered(source_p))
844 {
845 assert(dlinkFind(&unknown_list, source_p));
846
847 dlinkDelete(&source_p->localClient->lclient_node, &unknown_list);
848 }
849 else if (IsClient(source_p))
850 {
851 time_t on_for = CurrentTime - source_p->localClient->firsttime;
852 assert(Count.local > 0);
853 Count.local--;
854
855 if (HasUMode(source_p, UMODE_OPER))
856 if ((m = dlinkFindDelete(&oper_list, source_p)) != NULL)
857 free_dlink_node(m);
858
859 assert(dlinkFind(&local_client_list, source_p));
860 dlinkDelete(&source_p->localClient->lclient_node, &local_client_list);
861
862 if (source_p->localClient->list_task != NULL)
863 free_list_task(source_p->localClient->list_task, source_p);
864
865 watch_del_watch_list(source_p);
866 sendto_realops_flags(UMODE_CCONN, L_ALL, SEND_NOTICE,
867 "Client exiting: %s (%s@%s) [%s] [%s]",
868 source_p->name, source_p->username, source_p->host, comment,
869 ConfigFileEntry.hide_spoof_ips && IsIPSpoof(source_p) ?
870 "255.255.255.255" : source_p->sockhost);
871 ilog(LOG_TYPE_USER, "%s (%3u:%02u:%02u): %s!%s@%s %llu/%llu",
872 myctime(source_p->localClient->firsttime), (unsigned int)(on_for / 3600),
873 (unsigned int)((on_for % 3600)/60), (unsigned int)(on_for % 60),
874 source_p->name, source_p->username, source_p->host,
875 source_p->localClient->send.bytes>>10,
876 source_p->localClient->recv.bytes>>10);
877 }
878 else if (IsServer(source_p))
879 {
880 assert(Count.myserver > 0);
881 --Count.myserver;
882
883 assert(dlinkFind(&serv_list, source_p));
884 dlinkDelete(&source_p->localClient->lclient_node, &serv_list);
885 unset_chcap_usage_counts(source_p);
886 }
887
888 if (!IsDead(source_p))
889 {
890 if (IsServer(source_p))
891 {
892 /* for them, we are exiting the network */
893 sendto_one(source_p, ":%s SQUIT %s :%s",
894 ID_or_name(from, source_p), me.name, comment);
895 }
896
897 sendto_one(source_p, "ERROR :Closing Link: %s (%s)",
898 source_p->host, comment);
899 }
900
901 /*
902 ** Currently only server connections can have
903 ** depending remote clients here, but it does no
904 ** harm to check for all local clients. In
905 ** future some other clients than servers might
906 ** have remotes too...
907 **
908 ** Close the Client connection first and mark it
909 ** so that no messages are attempted to send to it.
910 ** Remember it makes source_p->from == NULL.
911 */
912 close_connection(source_p);
913 }
914 else if (IsClient(source_p) && HasFlag(source_p->servptr, FLAGS_EOB))
915 sendto_realops_flags(UMODE_FARCONNECT, L_ALL, SEND_NOTICE,
916 "Client exiting at %s: %s (%s@%s) [%s]",
917 source_p->servptr->name, source_p->name,
918 source_p->username, source_p->host, comment);
919
920 if (IsServer(source_p))
921 {
922 char splitstr[HOSTLEN + HOSTLEN + 2];
923
924 /* This shouldn't ever happen */
925 assert(source_p->serv != NULL && source_p->servptr != NULL);
926
927 if (ConfigServerHide.hide_servers)
928 /*
929 * Set netsplit message to "*.net *.split" to still show
930 * that its a split, but hide the servers splitting
931 */
932 strcpy(splitstr, "*.net *.split");
933 else
934 snprintf(splitstr, sizeof(splitstr), "%s %s",
935 source_p->servptr->name, source_p->name);
936
937 remove_dependents(source_p, from->from, comment, splitstr);
938
939 if (source_p->servptr == &me)
940 {
941 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
942 "%s was connected for %d seconds. %llu/%llu sendK/recvK.",
943 source_p->name, (int)(CurrentTime - source_p->localClient->firsttime),
944 source_p->localClient->send.bytes >> 10,
945 source_p->localClient->recv.bytes >> 10);
946 ilog(LOG_TYPE_IRCD, "%s was connected for %d seconds. %llu/%llu sendK/recvK.",
947 source_p->name, (int)(CurrentTime - source_p->localClient->firsttime),
948 source_p->localClient->send.bytes >> 10,
949 source_p->localClient->recv.bytes >> 10);
950 }
951 }
952 else if (IsClient(source_p) && !HasFlag(source_p, FLAGS_KILLED))
953 {
954 sendto_server(from->from, CAP_TS6, NOCAPS,
955 ":%s QUIT :%s", ID(source_p), comment);
956 sendto_server(from->from, NOCAPS, CAP_TS6,
957 ":%s QUIT :%s", source_p->name, comment);
958 }
959
960 /* The client *better* be off all of the lists */
961 assert(dlinkFind(&unknown_list, source_p) == NULL);
962 assert(dlinkFind(&local_client_list, source_p) == NULL);
963 assert(dlinkFind(&serv_list, source_p) == NULL);
964 assert(dlinkFind(&oper_list, source_p) == NULL);
965
966 exit_one_client(source_p, comment);
967 }
968
969 /*
970 * dead_link_on_write - report a write error if not already dead,
971 * mark it as dead then exit it
972 */
973 void
974 dead_link_on_write(struct Client *client_p, int ierrno)
975 {
976 dlink_node *ptr;
977
978 if (IsDefunct(client_p))
979 return;
980
981 dbuf_clear(&client_p->localClient->buf_recvq);
982 dbuf_clear(&client_p->localClient->buf_sendq);
983
984 assert(dlinkFind(&abort_list, client_p) == NULL);
985 ptr = make_dlink_node();
986 /* don't let exit_aborted_clients() finish yet */
987 dlinkAddTail(client_p, ptr, &abort_list);
988
989 if (eac_next == NULL)
990 eac_next = ptr;
991
992 SetDead(client_p); /* You are dead my friend */
993 }
994
995 /*
996 * dead_link_on_read - report a read error if not already dead,
997 * mark it as dead then exit it
998 */
999 void
1000 dead_link_on_read(struct Client *client_p, int error)
1001 {
1002 char errmsg[IRCD_BUFSIZE];
1003 int current_error;
1004
1005 if (IsDefunct(client_p))
1006 return;
1007
1008 dbuf_clear(&client_p->localClient->buf_recvq);
1009 dbuf_clear(&client_p->localClient->buf_sendq);
1010
1011 current_error = get_sockerr(client_p->localClient->fd.fd);
1012
1013 if (IsServer(client_p) || IsHandshake(client_p))
1014 {
1015 int connected = CurrentTime - client_p->localClient->firsttime;
1016
1017 if (error == 0)
1018 {
1019 /* Admins get the real IP */
1020 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
1021 "Server %s closed the connection",
1022 get_client_name(client_p, SHOW_IP));
1023
1024 /* Opers get a masked IP */
1025 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
1026 "Server %s closed the connection",
1027 get_client_name(client_p, MASK_IP));
1028
1029 ilog(LOG_TYPE_IRCD, "Server %s closed the connection",
1030 get_client_name(client_p, SHOW_IP));
1031 }
1032 else
1033 {
1034 report_error(L_ADMIN, "Lost connection to %s: %s",
1035 get_client_name(client_p, SHOW_IP), current_error);
1036 report_error(L_OPER, "Lost connection to %s: %s",
1037 get_client_name(client_p, MASK_IP), current_error);
1038 }
1039
1040 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
1041 "%s had been connected for %d day%s, %2d:%02d:%02d",
1042 client_p->name, connected/86400,
1043 (connected/86400 == 1) ? "" : "s",
1044 (connected % 86400) / 3600, (connected % 3600) / 60,
1045 connected % 60);
1046 }
1047
1048 if (error == 0)
1049 strlcpy(errmsg, "Remote host closed the connection",
1050 sizeof(errmsg));
1051 else
1052 snprintf(errmsg, sizeof(errmsg), "Read error: %s",
1053 strerror(current_error));
1054
1055 exit_client(client_p, &me, errmsg);
1056 }
1057
1058 void
1059 exit_aborted_clients(void)
1060 {
1061 dlink_node *ptr;
1062 struct Client *target_p;
1063 const char *notice;
1064
1065 DLINK_FOREACH_SAFE(ptr, eac_next, abort_list.head)
1066 {
1067 target_p = ptr->data;
1068 eac_next = ptr->next;
1069
1070 if (target_p == NULL)
1071 {
1072 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
1073 "Warning: null client on abort_list!");
1074 dlinkDelete(ptr, &abort_list);
1075 free_dlink_node(ptr);
1076 continue;
1077 }
1078
1079 dlinkDelete(ptr, &abort_list);
1080
1081 if (IsSendQExceeded(target_p))
1082 notice = "Max SendQ exceeded";
1083 else
1084 notice = "Write error: connection closed";
1085
1086 exit_client(target_p, &me, notice);
1087 free_dlink_node(ptr);
1088 }
1089 }
1090
1091 /*
1092 * accept processing, this adds a form of "caller ID" to ircd
1093 *
1094 * If a client puts themselves into "caller ID only" mode,
1095 * only clients that match a client pointer they have put on
1096 * the accept list will be allowed to message them.
1097 *
1098 * Diane Bruce, "Dianora" db@db.net
1099 */
1100
1101 void
1102 del_accept(struct split_nuh_item *accept_p, struct Client *client_p)
1103 {
1104 dlinkDelete(&accept_p->node, &client_p->localClient->acceptlist);
1105
1106 MyFree(accept_p->nickptr);
1107 MyFree(accept_p->userptr);
1108 MyFree(accept_p->hostptr);
1109 MyFree(accept_p);
1110 }
1111
1112 struct split_nuh_item *
1113 find_accept(const char *nick, const char *user,
1114 const char *host, struct Client *client_p,
1115 int (*cmpfunc)(const char *, const char *))
1116 {
1117 dlink_node *ptr = NULL;
1118
1119 DLINK_FOREACH(ptr, client_p->localClient->acceptlist.head)
1120 {
1121 struct split_nuh_item *accept_p = ptr->data;
1122
1123 if (!cmpfunc(accept_p->nickptr, nick) &&
1124 !cmpfunc(accept_p->userptr, user) &&
1125 !cmpfunc(accept_p->hostptr, host))
1126 return accept_p;
1127 }
1128
1129 return NULL;
1130 }
1131
1132 /* accept_message()
1133 *
1134 * inputs - pointer to source client
1135 * - pointer to target client
1136 * output - 1 if accept this message 0 if not
1137 * side effects - See if source is on target's allow list
1138 */
1139 int
1140 accept_message(struct Client *source,
1141 struct Client *target)
1142 {
1143 dlink_node *ptr = NULL;
1144
1145 if (source == target || find_accept(source->name, source->username,
1146 source->host, target, match))
1147 return 1;
1148
1149 if (HasUMode(target, UMODE_SOFTCALLERID))
1150 DLINK_FOREACH(ptr, target->channel.head)
1151 if (IsMember(source, ((struct Membership *)ptr->data)->chptr))
1152 return 1;
1153
1154 return 0;
1155 }
1156
1157 /* del_all_accepts()
1158 *
1159 * inputs - pointer to exiting client
1160 * output - NONE
1161 * side effects - Walk through given clients acceptlist and remove all entries
1162 */
1163 void
1164 del_all_accepts(struct Client *client_p)
1165 {
1166 dlink_node *ptr = NULL, *next_ptr = NULL;
1167
1168 DLINK_FOREACH_SAFE(ptr, next_ptr, client_p->localClient->acceptlist.head)
1169 del_accept(ptr->data, client_p);
1170 }
1171
1172 unsigned int
1173 idle_time_get(const struct Client *source_p, const struct Client *target_p)
1174 {
1175 unsigned int idle = 0;
1176 unsigned int min_idle = 0;
1177 unsigned int max_idle = 0;
1178 const struct ClassItem *class = get_class_ptr(&target_p->localClient->confs);
1179
1180 if (!(class->flags & CLASS_FLAGS_FAKE_IDLE) || target_p == source_p)
1181 return CurrentTime - target_p->localClient->last_privmsg;
1182 if (HasUMode(source_p, UMODE_OPER) &&
1183 !(class->flags & CLASS_FLAGS_HIDE_IDLE_FROM_OPERS))
1184 return CurrentTime - target_p->localClient->last_privmsg;
1185
1186 min_idle = class->min_idle;
1187 max_idle = class->max_idle;
1188
1189 if (min_idle == max_idle)
1190 return min_idle;
1191
1192 if (class->flags & CLASS_FLAGS_RANDOM_IDLE)
1193 idle = genrand_int32();
1194 else
1195 idle = CurrentTime - target_p->localClient->last_privmsg;
1196
1197 if (max_idle == 0)
1198 idle = 0;
1199 else
1200 idle %= max_idle;
1201
1202 if (idle < min_idle)
1203 idle = min_idle + (idle % (max_idle - min_idle));
1204
1205 return idle;
1206 }

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision