ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/server.c
Revision: 4340
Committed: Sat Aug 2 16:53:22 2014 UTC (11 years ago) by michael
Content type: text/x-csrc
File size: 28736 byte(s)
Log Message:
- Renamed structures to meet code conventions

File Contents

# User Rev Content
1 adx 30 /*
2 michael 2916 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3 adx 30 *
4 michael 2916 * Copyright (c) 1997-2014 ircd-hybrid development team
5 adx 30 *
6     * This program is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * This program is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with this program; if not, write to the Free Software
18     * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
19     * USA
20     */
21    
22 michael 2916 /*! \file s_serv.c
23     * \brief Server related functions.
24     * \version $Id$
25     */
26    
27 adx 30 #include "stdinc.h"
28     #ifdef HAVE_LIBCRYPTO
29     #include <openssl/rsa.h>
30     #include "rsa.h"
31     #endif
32 michael 1011 #include "list.h"
33 adx 30 #include "client.h"
34     #include "event.h"
35     #include "hash.h"
36     #include "irc_string.h"
37     #include "ircd.h"
38     #include "ircd_defs.h"
39     #include "s_bsd.h"
40     #include "numeric.h"
41     #include "packet.h"
42 michael 1309 #include "conf.h"
43 michael 3347 #include "server.h"
44 michael 1309 #include "log.h"
45 michael 3347 #include "user.h"
46 adx 30 #include "send.h"
47     #include "memory.h"
48 michael 2916 #include "channel.h"
49 michael 1243 #include "parse.h"
50 adx 30
51     #define MIN_CONN_FREQ 300
52    
53 michael 2156 dlink_list flatten_links;
54 adx 30 static dlink_list cap_list = { NULL, NULL, 0 };
55     static CNCB serv_connect_callback;
56    
57    
58     /*
59     * write_links_file
60     *
61     * inputs - void pointer which is not used
62     * output - NONE
63     * side effects - called from an event, write out list of linked servers
64     * but in no particular order.
65     */
66     void
67 michael 2156 write_links_file(void *notused)
68 adx 30 {
69 michael 2156 FILE *file = NULL;
70 michael 2216 dlink_node *ptr = NULL, *ptr_next = NULL;
71 michael 3215 char buff[IRCD_BUFSIZE] = "";
72 adx 30
73 michael 2156 if ((file = fopen(LIPATH, "w")) == NULL)
74 adx 30 return;
75    
76 michael 2156 DLINK_FOREACH_SAFE(ptr, ptr_next, flatten_links.head)
77 adx 30 {
78 michael 2156 dlinkDelete(ptr, &flatten_links);
79     MyFree(ptr->data);
80     free_dlink_node(ptr);
81 adx 30 }
82    
83 michael 4209 DLINK_FOREACH(ptr, global_server_list.head)
84 adx 30 {
85 michael 1325 const struct Client *target_p = ptr->data;
86 adx 30
87 michael 2156 /*
88     * Skip hidden servers, aswell as ourselves, since we already send
89     * ourselves in /links
90     */
91     if (IsHidden(target_p) || IsMe(target_p))
92 adx 30 continue;
93    
94 michael 1851 if (HasFlag(target_p, FLAGS_SERVICE) && ConfigServerHide.hide_services)
95     continue;
96    
97 michael 1545 /*
98     * Attempt to format the file in such a way it follows the usual links output
99 adx 30 * ie "servername uplink :hops info"
100     * Mostly for aesthetic reasons - makes it look pretty in mIRC ;)
101     * - madmax
102     */
103 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s", target_p->name,
104     me.name, target_p->info);
105 michael 2212 dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
106 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s\n", target_p->name,
107     me.name, target_p->info);
108 adx 30
109 michael 1325 fputs(buff, file);
110 adx 30 }
111    
112 michael 1325 fclose(file);
113 adx 30 }
114    
115 michael 2216 void
116     read_links_file(void)
117     {
118     FILE *file = NULL;
119     char *p = NULL;
120 michael 3215 char buff[IRCD_BUFSIZE] = "";
121 michael 2216
122     if ((file = fopen(LIPATH, "r")) == NULL)
123     return;
124    
125     while (fgets(buff, sizeof(buff), file))
126     {
127 michael 3246 if ((p = strchr(buff, '\n')))
128 michael 2216 *p = '\0';
129    
130     dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
131     }
132    
133     fclose(file);
134     }
135    
136 adx 30 /* hunt_server()
137     * Do the basic thing in delivering the message (command)
138     * across the relays to the specific server (server) for
139     * actions.
140     *
141     * Note: The command is a format string and *MUST* be
142     * of prefixed style (e.g. ":%s COMMAND %s ...").
143     * Command can have only max 8 parameters.
144     *
145     * server parv[server] is the parameter identifying the
146     * target server.
147     *
148     * *WARNING*
149     * parv[server] is replaced with the pointer to the
150     * real servername from the matched client (I'm lazy
151     * now --msa).
152     *
153     * returns: (see #defines)
154     */
155     int
156 michael 3156 hunt_server(struct Client *source_p, const char *command,
157 michael 1857 const int server, const int parc, char *parv[])
158 adx 30 {
159     struct Client *target_p = NULL;
160 michael 4206 dlink_node *ptr = NULL;
161 adx 30
162 michael 1344 /* Assume it's me, if no server */
163     if (parc <= server || EmptyString(parv[server]))
164     return HUNTED_ISME;
165 adx 30
166 michael 4206 if ((target_p = find_person(source_p, parv[server])) == NULL)
167     target_p = hash_find_server(parv[server]);
168 michael 1344
169 michael 4206 /*
170     * These are to pickup matches that would cause the following
171 adx 30 * message to go in the wrong direction while doing quick fast
172     * non-matching lookups.
173     */
174     if (target_p)
175     if (target_p->from == source_p->from && !MyConnect(target_p))
176     target_p = NULL;
177    
178 michael 4206 if (!target_p && has_wildcards(parv[server]))
179 adx 30 {
180 michael 4206 DLINK_FOREACH(ptr, global_client_list.head)
181 adx 30 {
182 michael 4206 struct Client *tmp = ptr->data;
183    
184     assert(IsMe(tmp) || IsServer(tmp) || IsClient(tmp));
185     if (!match(parv[server], tmp->name))
186 adx 30 {
187 michael 4206 if (tmp->from == source_p->from && !MyConnect(tmp))
188     continue;
189 michael 4210
190 michael 4206 target_p = ptr->data;
191 michael 4210 break;
192 adx 30 }
193     }
194     }
195    
196 michael 3246 if (target_p)
197 adx 30 {
198 michael 4206 assert(IsMe(target_p) || IsServer(target_p) || IsClient(target_p));
199 adx 30 if (IsMe(target_p) || MyClient(target_p))
200     return HUNTED_ISME;
201    
202 michael 4206 parv[server] = target_p->id;
203     sendto_one(target_p, command, source_p->id,
204 adx 30 parv[1], parv[2], parv[3], parv[4],
205     parv[5], parv[6], parv[7], parv[8]);
206 michael 2134 return HUNTED_PASS;
207 michael 2345 }
208 adx 30
209 michael 3109 sendto_one_numeric(source_p, &me, ERR_NOSUCHSERVER, parv[server]);
210 michael 2134 return HUNTED_NOSUCH;
211 adx 30 }
212    
213     /* try_connections()
214     *
215     * inputs - void pointer which is not used
216     * output - NONE
217     * side effects -
218     * scan through configuration and try new connections.
219     * Returns the calendar time when the next call to this
220     * function should be made latest. (No harm done if this
221     * is called earlier or later...)
222     */
223     void
224     try_connections(void *unused)
225     {
226 michael 1632 dlink_node *ptr = NULL;
227 michael 3335 int confrq = 0;
228 adx 30
229     /* TODO: change this to set active flag to 0 when added to event! --Habeeb */
230     if (GlobalSetOptions.autoconn == 0)
231     return;
232    
233     DLINK_FOREACH(ptr, server_items.head)
234     {
235 michael 3335 struct MaskItem *conf = ptr->data;
236 adx 30
237 michael 1636 assert(conf->type == CONF_SERVER);
238 michael 1632
239 michael 2345 /* Also when already connecting! (update holdtimes) --SRB
240 adx 30 */
241 michael 4196 if (!conf->port || !IsConfAllowAutoConn(conf))
242 adx 30 continue;
243    
244    
245     /* Skip this entry if the use of it is still on hold until
246     * future. Otherwise handle this entry (and set it on hold
247     * until next time). Will reset only hold times, if already
248     * made one successfull connection... [this algorithm is
249     * a bit fuzzy... -- msa >;) ]
250     */
251 michael 1649 if (conf->until > CurrentTime)
252 adx 30 continue;
253    
254 michael 4028 assert(conf->class);
255 adx 30
256 michael 4028 confrq = conf->class->con_freq;
257     if (confrq < MIN_CONN_FREQ)
258     confrq = MIN_CONN_FREQ;
259    
260 michael 1649 conf->until = CurrentTime + confrq;
261 adx 30
262 michael 3246 /*
263     * Found a CONNECT config with port specified, scan clients
264 adx 30 * and see if this server is already connected?
265     */
266 michael 3246 if (hash_find_server(conf->name))
267 adx 30 continue;
268    
269 michael 1632 if (conf->class->ref_count < conf->class->max_total)
270 adx 30 {
271     /* Go to the end of the list, if not already last */
272 michael 3246 if (ptr->next)
273 adx 30 {
274     dlinkDelete(ptr, &server_items);
275     dlinkAddTail(conf, &conf->node, &server_items);
276     }
277    
278     if (find_servconn_in_progress(conf->name))
279     return;
280    
281 michael 3246 /*
282     * We used to only print this if serv_connect() actually
283 adx 30 * succeeded, but since comm_tcp_connect() can call the callback
284     * immediately if there is an error, we were getting error messages
285     * in the wrong order. SO, we just print out the activated line,
286     * and let serv_connect() / serv_connect_callback() print an
287     * error afterwards if it fails.
288     * -- adrian
289     */
290     if (ConfigServerHide.hide_server_ips)
291 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
292     "Connection to %s activated.",
293 adx 30 conf->name);
294     else
295 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
296     "Connection to %s[%s] activated.",
297 michael 1632 conf->name, conf->host);
298 adx 30
299 michael 1632 serv_connect(conf, NULL);
300 adx 30 /* We connect only one at time... */
301     return;
302     }
303     }
304     }
305    
306     int
307 michael 1115 valid_servname(const char *name)
308     {
309 michael 3451 unsigned int dots = 0;
310 michael 1115 const char *p = name;
311    
312     for (; *p; ++p)
313     {
314     if (!IsServChar(*p))
315 michael 1118 return 0;
316 michael 1115
317     if (*p == '.')
318     ++dots;
319     }
320    
321 michael 3451 return dots && (p - name) <= HOSTLEN;
322 michael 1115 }
323    
324     int
325 michael 1302 check_server(const char *name, struct Client *client_p)
326 adx 30 {
327     dlink_node *ptr;
328 michael 1632 struct MaskItem *conf = NULL;
329     struct MaskItem *server_conf = NULL;
330 adx 30 int error = -1;
331    
332 michael 3246 assert(client_p);
333 adx 30
334     /* loop through looking for all possible connect items that might work */
335     DLINK_FOREACH(ptr, server_items.head)
336     {
337     conf = ptr->data;
338    
339 michael 1652 if (match(name, conf->name))
340 adx 30 continue;
341    
342     error = -3;
343    
344     /* XXX: Fix me for IPv6 */
345     /* XXX sockhost is the IPv4 ip as a string */
346 michael 2345 if (!match(conf->host, client_p->host) ||
347 michael 1652 !match(conf->host, client_p->sockhost))
348 adx 30 {
349     error = -2;
350    
351 michael 1632 if (!match_conf_password(client_p->localClient->passwd, conf))
352 michael 1414 return -2;
353 adx 30
354 michael 2228 if (!EmptyString(conf->certfp))
355 michael 2229 if (EmptyString(client_p->certfp) || strcasecmp(client_p->certfp, conf->certfp))
356 michael 2228 return -4;
357    
358 michael 1414 server_conf = conf;
359 adx 30 }
360     }
361    
362     if (server_conf == NULL)
363 michael 2182 return error;
364 adx 30
365     attach_conf(client_p, server_conf);
366    
367    
368 michael 3246 if (server_conf)
369 adx 30 {
370     struct sockaddr_in *v4;
371     #ifdef IPV6
372     struct sockaddr_in6 *v6;
373     #endif
374 michael 1632 switch (server_conf->aftype)
375 adx 30 {
376     #ifdef IPV6
377 michael 2345 case AF_INET6:
378 michael 1632 v6 = (struct sockaddr_in6 *)&server_conf->addr;
379 adx 30
380     if (IN6_IS_ADDR_UNSPECIFIED(&v6->sin6_addr))
381 michael 1632 memcpy(&server_conf->addr, &client_p->localClient->ip, sizeof(struct irc_ssaddr));
382 adx 30 break;
383     #endif
384     case AF_INET:
385 michael 1632 v4 = (struct sockaddr_in *)&server_conf->addr;
386 adx 30
387     if (v4->sin_addr.s_addr == INADDR_NONE)
388 michael 2345 memcpy(&server_conf->addr, &client_p->localClient->ip, sizeof(struct irc_ssaddr));
389 adx 30 break;
390     }
391     }
392    
393 michael 2182 return 0;
394 adx 30 }
395    
396     /* add_capability()
397     *
398     * inputs - string name of CAPAB
399     * - int flag of capability
400     * output - NONE
401     * side effects - Adds given capability name and bit mask to
402     * current supported capabilities. This allows
403     * modules to dynamically add or subtract their capability.
404     */
405     void
406     add_capability(const char *capab_name, int cap_flag, int add_to_default)
407     {
408 michael 3504 struct Capability *cap = MyCalloc(sizeof(*cap));
409 adx 30
410 michael 1646 cap->name = xstrdup(capab_name);
411 adx 30 cap->cap = cap_flag;
412     dlinkAdd(cap, &cap->node, &cap_list);
413 michael 885
414 adx 30 if (add_to_default)
415     default_server_capabs |= cap_flag;
416     }
417    
418     /* delete_capability()
419     *
420     * inputs - string name of CAPAB
421     * output - NONE
422     * side effects - delete given capability from ones known.
423     */
424     int
425     delete_capability(const char *capab_name)
426     {
427 michael 3335 dlink_node *ptr = NULL, *ptr_next = NULL;
428 adx 30
429 michael 3335 DLINK_FOREACH_SAFE(ptr, ptr_next, cap_list.head)
430 adx 30 {
431 michael 3335 struct Capability *cap = ptr->data;
432 adx 30
433 michael 3335 if (cap->cap)
434 adx 30 {
435 michael 3335 if (!irccmp(cap->name, capab_name))
436 adx 30 {
437 michael 2134 default_server_capabs &= ~(cap->cap);
438     dlinkDelete(ptr, &cap_list);
439     MyFree(cap->name);
440     MyFree(cap);
441 adx 30 }
442     }
443     }
444    
445 michael 896 return 0;
446 adx 30 }
447    
448     /*
449     * find_capability()
450     *
451     * inputs - string name of capab to find
452     * output - 0 if not found CAPAB otherwise
453     * side effects - none
454     */
455 michael 1877 unsigned int
456 adx 30 find_capability(const char *capab)
457     {
458 michael 896 const dlink_node *ptr = NULL;
459 adx 30
460     DLINK_FOREACH(ptr, cap_list.head)
461     {
462 michael 896 const struct Capability *cap = ptr->data;
463 adx 30
464 michael 896 if (cap->cap && !irccmp(cap->name, capab))
465     return cap->cap;
466 adx 30 }
467 michael 896
468     return 0;
469 adx 30 }
470    
471     /* send_capabilities()
472     *
473     * inputs - Client pointer to send to
474     * - int flag of capabilities that this server can send
475     * output - NONE
476     * side effects - send the CAPAB line to a server -orabidoo
477     *
478     */
479     void
480 michael 1632 send_capabilities(struct Client *client_p, int cap_can_send)
481 adx 30 {
482 michael 3746 char buf[IRCD_BUFSIZE] = "";
483     const dlink_node *ptr = NULL;
484 adx 30
485     DLINK_FOREACH(ptr, cap_list.head)
486     {
487 michael 3746 const struct Capability *cap = ptr->data;
488 adx 30
489     if (cap->cap & (cap_can_send|default_server_capabs))
490     {
491 michael 3746 strlcat(buf, cap->name, sizeof(buf));
492     if (ptr->next)
493     strlcat(buf, " ", sizeof(buf));
494 adx 30 }
495     }
496    
497 michael 3746 sendto_one(client_p, "CAPAB :%s", buf);
498 adx 30 }
499    
500     /*
501     * show_capabilities - show current server capabilities
502     *
503     * inputs - pointer to a struct Client
504     * output - pointer to static string
505     * side effects - build up string representing capabilities of server listed
506     */
507     const char *
508 michael 2282 show_capabilities(const struct Client *target_p)
509 adx 30 {
510 michael 2309 static char msgbuf[IRCD_BUFSIZE] = "";
511 michael 2282 const dlink_node *ptr = NULL;
512 adx 30
513 michael 2309 strlcpy(msgbuf, "TS", sizeof(msgbuf));
514    
515 adx 30 DLINK_FOREACH(ptr, cap_list.head)
516     {
517     const struct Capability *cap = ptr->data;
518    
519 michael 2282 if (!IsCapable(target_p, cap->cap))
520     continue;
521    
522     strlcat(msgbuf, " ", sizeof(msgbuf));
523     strlcat(msgbuf, cap->name, sizeof(msgbuf));
524 adx 30 }
525 michael 1302
526     return msgbuf;
527 adx 30 }
528    
529     /* make_server()
530     *
531     * inputs - pointer to client struct
532     * output - pointer to struct Server
533     * side effects - add's an Server information block to a client
534     * if it was not previously allocated.
535     */
536     struct Server *
537     make_server(struct Client *client_p)
538     {
539     if (client_p->serv == NULL)
540 michael 3504 client_p->serv = MyCalloc(sizeof(struct Server));
541 adx 30
542     return client_p->serv;
543     }
544    
545     /* New server connection code
546     * Based upon the stuff floating about in s_bsd.c
547     * -- adrian
548     */
549    
550     /* serv_connect() - initiate a server connection
551     *
552 michael 2345 * inputs - pointer to conf
553 adx 30 * - pointer to client doing the connect
554     * output -
555     * side effects -
556     *
557     * This code initiates a connection to a server. It first checks to make
558     * sure the given server exists. If this is the case, it creates a socket,
559     * creates a client, saves the socket information in the client, and
560     * initiates a connection to the server through comm_connect_tcp(). The
561     * completion of this goes through serv_completed_connection().
562     *
563     * We return 1 if the connection is attempted, since we don't know whether
564     * it suceeded or not, and 0 if it fails in here somewhere.
565     */
566     int
567 michael 1632 serv_connect(struct MaskItem *conf, struct Client *by)
568 adx 30 {
569 michael 3246 struct Client *client_p = NULL;
570     char buf[HOSTIPLEN + 1] = "";
571 adx 30
572     /* conversion structs */
573     struct sockaddr_in *v4;
574 michael 3246
575 michael 1632 /* Make sure conf is useful */
576 michael 3246 assert(conf);
577 adx 30
578 michael 1632 getnameinfo((struct sockaddr *)&conf->addr, conf->addr.ss_len,
579 michael 1123 buf, sizeof(buf), NULL, 0, NI_NUMERICHOST);
580 michael 1632 ilog(LOG_TYPE_IRCD, "Connect to %s[%s] @%s", conf->name, conf->host,
581 adx 30 buf);
582    
583     /* Still processing a DNS lookup? -> exit */
584 michael 1632 if (conf->dns_pending)
585 adx 30 {
586 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
587 michael 992 "Error connecting to %s: DNS lookup for connect{} in progress.",
588     conf->name);
589 michael 3246 return 0;
590 adx 30 }
591    
592 michael 1632 if (conf->dns_failed)
593 michael 992 {
594 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
595 michael 992 "Error connecting to %s: DNS lookup for connect{} failed.",
596     conf->name);
597 michael 3246 return 0;
598 michael 992 }
599    
600 adx 30 /* Make sure this server isn't already connected
601 michael 1632 * Note: conf should ALWAYS be a valid C: line
602 adx 30 */
603 michael 3246 if ((client_p = hash_find_server(conf->name)))
604 michael 2345 {
605 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
606 michael 2134 "Server %s already present from %s",
607     conf->name, get_client_name(client_p, SHOW_IP));
608 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
609 michael 2134 "Server %s already present from %s",
610     conf->name, get_client_name(client_p, MASK_IP));
611 adx 30 if (by && IsClient(by) && !MyClient(by))
612 michael 3110 sendto_one_notice(by, &me, ":Server %s already present from %s",
613     conf->name, get_client_name(client_p, MASK_IP));
614 michael 2134 return 0;
615 adx 30 }
616 michael 2345
617 adx 30 /* Create a local client */
618     client_p = make_client(NULL);
619    
620     /* Copy in the server, hostname, fd */
621     strlcpy(client_p->name, conf->name, sizeof(client_p->name));
622 michael 1632 strlcpy(client_p->host, conf->host, sizeof(client_p->host));
623 adx 30
624     /* We already converted the ip once, so lets use it - stu */
625 michael 1115 strlcpy(client_p->sockhost, buf, sizeof(client_p->sockhost));
626 adx 30
627 michael 2345 /* create a socket for the server connection */
628 michael 3335 if (comm_open(&client_p->localClient->fd, conf->addr.ss.ss_family, SOCK_STREAM, 0, NULL) < 0)
629 adx 30 {
630     /* Eek, failure to create the socket */
631 michael 3335 report_error(L_ALL, "opening stream socket to %s: %s", conf->name, errno);
632    
633 adx 30 SetDead(client_p);
634 michael 3171 exit_client(client_p, "Connection failed");
635 michael 2134 return 0;
636 adx 30 }
637    
638     /* servernames are always guaranteed under HOSTLEN chars */
639     fd_note(&client_p->localClient->fd, "Server: %s", conf->name);
640    
641     /* Attach config entries to client here rather than in
642     * serv_connect_callback(). This to avoid null pointer references.
643     */
644 michael 1632 if (!attach_connect_block(client_p, conf->name, conf->host))
645 adx 30 {
646 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
647 michael 2134 "Host %s is not enabled for connecting: no connect{} block",
648     conf->name);
649 michael 2345 if (by && IsClient(by) && !MyClient(by))
650 michael 3110 sendto_one_notice(by, &me, ":Connect to host %s failed.", client_p->name);
651    
652 adx 30 SetDead(client_p);
653 michael 3171 exit_client(client_p, "Connection failed");
654 michael 2134 return 0;
655 adx 30 }
656    
657     /* at this point we have a connection in progress and C/N lines
658     * attached to the client, the socket info should be saved in the
659     * client and it should either be resolved or have a valid address.
660     *
661     * The socket has been connected or connect is in progress.
662     */
663     make_server(client_p);
664    
665     if (by && IsClient(by))
666     strlcpy(client_p->serv->by, by->name, sizeof(client_p->serv->by));
667     else
668     strlcpy(client_p->serv->by, "AutoConn.", sizeof(client_p->serv->by));
669    
670     SetConnecting(client_p);
671 michael 1632 client_p->localClient->aftype = conf->aftype;
672 adx 30
673     /* Now, initiate the connection */
674 michael 2345 /* XXX assume that a non 0 type means a specific bind address
675 adx 30 * for this connect.
676     */
677 michael 1632 switch (conf->aftype)
678 adx 30 {
679     case AF_INET:
680 michael 1632 v4 = (struct sockaddr_in*)&conf->bind;
681 michael 3246 if (v4->sin_addr.s_addr)
682 adx 30 {
683     struct irc_ssaddr ipn;
684     memset(&ipn, 0, sizeof(struct irc_ssaddr));
685     ipn.ss.ss_family = AF_INET;
686     ipn.ss_port = 0;
687 michael 1632 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
688 michael 2134 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
689 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
690 michael 2134 serv_connect_callback, client_p, conf->aftype,
691     CONNECTTIMEOUT);
692 adx 30 }
693 michael 4340 else if (ConfigServerInfo.specific_ipv4_vhost)
694 adx 30 {
695     struct irc_ssaddr ipn;
696     memset(&ipn, 0, sizeof(struct irc_ssaddr));
697     ipn.ss.ss_family = AF_INET;
698     ipn.ss_port = 0;
699 michael 4340 memcpy(&ipn, &ConfigServerInfo.ip, sizeof(struct irc_ssaddr));
700 michael 1632 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
701 adx 30 (struct sockaddr *)&ipn, ipn.ss_len,
702 michael 1632 serv_connect_callback, client_p, conf->aftype,
703 michael 2134 CONNECTTIMEOUT);
704 adx 30 }
705     else
706 michael 2345 comm_connect_tcp(&client_p->localClient->fd, conf->host, conf->port,
707     NULL, 0, serv_connect_callback, client_p, conf->aftype,
708 adx 30 CONNECTTIMEOUT);
709     break;
710     #ifdef IPV6
711     case AF_INET6:
712     {
713 michael 2182 struct irc_ssaddr ipn;
714     struct sockaddr_in6 *v6;
715     struct sockaddr_in6 *v6conf;
716 adx 30
717 michael 2182 memset(&ipn, 0, sizeof(struct irc_ssaddr));
718     v6conf = (struct sockaddr_in6 *)&conf->bind;
719     v6 = (struct sockaddr_in6 *)&ipn;
720 adx 30
721 michael 3246 if (memcmp(&v6conf->sin6_addr, &v6->sin6_addr, sizeof(struct in6_addr)))
722 adx 30 {
723 michael 2182 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
724     ipn.ss.ss_family = AF_INET6;
725     ipn.ss_port = 0;
726     comm_connect_tcp(&client_p->localClient->fd,
727     conf->host, conf->port,
728 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
729 michael 2182 serv_connect_callback, client_p,
730     conf->aftype, CONNECTTIMEOUT);
731     }
732 michael 4340 else if (ConfigServerInfo.specific_ipv6_vhost)
733 michael 2182 {
734 michael 4340 memcpy(&ipn, &ConfigServerInfo.ip6, sizeof(struct irc_ssaddr));
735 michael 2182 ipn.ss.ss_family = AF_INET6;
736     ipn.ss_port = 0;
737     comm_connect_tcp(&client_p->localClient->fd,
738     conf->host, conf->port,
739     (struct sockaddr *)&ipn, ipn.ss_len,
740     serv_connect_callback, client_p,
741     conf->aftype, CONNECTTIMEOUT);
742     }
743     else
744     comm_connect_tcp(&client_p->localClient->fd,
745 michael 2345 conf->host, conf->port,
746 michael 2182 NULL, 0, serv_connect_callback, client_p,
747     conf->aftype, CONNECTTIMEOUT);
748 adx 30 }
749     #endif
750     }
751 michael 2182 return 1;
752 adx 30 }
753    
754 michael 1303 #ifdef HAVE_LIBCRYPTO
755     static void
756     finish_ssl_server_handshake(struct Client *client_p)
757     {
758 michael 1632 struct MaskItem *conf = NULL;
759 michael 1303
760     conf = find_conf_name(&client_p->localClient->confs,
761 michael 1632 client_p->name, CONF_SERVER);
762 michael 1303 if (conf == NULL)
763     {
764 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
765 michael 1303 "Lost connect{} block for %s", get_client_name(client_p, HIDE_IP));
766 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
767 michael 1303 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
768    
769 michael 3171 exit_client(client_p, "Lost connect{} block");
770 michael 1303 return;
771     }
772    
773 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
774 michael 1303
775 michael 1632 send_capabilities(client_p, 0);
776 michael 1303
777     sendto_one(client_p, "SERVER %s 1 :%s%s",
778     me.name, ConfigServerHide.hidden ? "(H) " : "",
779     me.info);
780    
781     /* If we've been marked dead because a send failed, just exit
782     * here now and save everyone the trouble of us ever existing.
783     */
784     if (IsDead(client_p))
785     {
786 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
787 michael 1303 "%s[%s] went dead during handshake",
788     client_p->name,
789     client_p->host);
790 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
791 michael 1303 "%s went dead during handshake", client_p->name);
792     return;
793     }
794    
795     /* don't move to serv_list yet -- we haven't sent a burst! */
796     /* If we get here, we're ok, so lets start reading some data */
797     comm_setselect(&client_p->localClient->fd, COMM_SELECT_READ, read_packet, client_p, 0);
798     }
799    
800     static void
801 michael 1306 ssl_server_handshake(fde_t *fd, struct Client *client_p)
802 michael 1303 {
803 michael 2463 X509 *cert = NULL;
804     int ret = 0;
805 michael 1303
806 michael 2463 if ((ret = SSL_connect(client_p->localClient->fd.ssl)) <= 0)
807 michael 1303 {
808 michael 2463 switch (SSL_get_error(client_p->localClient->fd.ssl, ret))
809 michael 1303 {
810     case SSL_ERROR_WANT_WRITE:
811     comm_setselect(&client_p->localClient->fd, COMM_SELECT_WRITE,
812 michael 1308 (PF *)ssl_server_handshake, client_p, 0);
813 michael 1303 return;
814     case SSL_ERROR_WANT_READ:
815     comm_setselect(&client_p->localClient->fd, COMM_SELECT_READ,
816 michael 1308 (PF *)ssl_server_handshake, client_p, 0);
817 michael 1303 return;
818     default:
819 michael 1308 {
820     const char *sslerr = ERR_error_string(ERR_get_error(), NULL);
821 michael 1618 sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
822 michael 1308 "Error connecting to %s: %s", client_p->name,
823     sslerr ? sslerr : "unknown SSL error");
824 michael 3171 exit_client(client_p, "Error during SSL handshake");
825 michael 1303 return;
826 michael 1308 }
827 michael 1303 }
828     }
829    
830 michael 2463 if ((cert = SSL_get_peer_certificate(client_p->localClient->fd.ssl)))
831     {
832     int res = SSL_get_verify_result(client_p->localClient->fd.ssl);
833 michael 3375 char buf[EVP_MAX_MD_SIZE * 2 + 1] = "";
834     unsigned char md[EVP_MAX_MD_SIZE] = "";
835 michael 2463
836     if (res == X509_V_OK || res == X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN ||
837     res == X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE ||
838     res == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT)
839     {
840 michael 3375 unsigned int n = 0;
841 michael 2463
842 michael 4340 if (X509_digest(cert, ConfigServerInfo.message_digest_algorithm, md, &n))
843 michael 2463 {
844 michael 4113 binary_to_hex(md, buf, n);
845 michael 2463 client_p->certfp = xstrdup(buf);
846     }
847     }
848     else
849     ilog(LOG_TYPE_IRCD, "Server %s!%s@%s gave bad SSL client certificate: %d",
850     client_p->name, client_p->username, client_p->host, res);
851     X509_free(cert);
852     }
853    
854 michael 1303 finish_ssl_server_handshake(client_p);
855     }
856    
857     static void
858 michael 1632 ssl_connect_init(struct Client *client_p, struct MaskItem *conf, fde_t *fd)
859 michael 1303 {
860 michael 4340 if ((client_p->localClient->fd.ssl = SSL_new(ConfigServerInfo.client_ctx)) == NULL)
861 michael 1303 {
862     ilog(LOG_TYPE_IRCD, "SSL_new() ERROR! -- %s",
863     ERR_error_string(ERR_get_error(), NULL));
864     SetDead(client_p);
865 michael 3171 exit_client(client_p, "SSL_new failed");
866 michael 1303 return;
867     }
868    
869     SSL_set_fd(fd->ssl, fd->fd);
870 michael 1306
871 michael 1632 if (!EmptyString(conf->cipher_list))
872     SSL_set_cipher_list(client_p->localClient->fd.ssl, conf->cipher_list);
873 michael 1306
874     ssl_server_handshake(NULL, client_p);
875 michael 1303 }
876     #endif
877    
878 adx 30 /* serv_connect_callback() - complete a server connection.
879 michael 2345 *
880 adx 30 * This routine is called after the server connection attempt has
881     * completed. If unsucessful, an error is sent to ops and the client
882     * is closed. If sucessful, it goes through the initialisation/check
883     * procedures, the capabilities are sent, and the socket is then
884     * marked for reading.
885     */
886     static void
887     serv_connect_callback(fde_t *fd, int status, void *data)
888     {
889     struct Client *client_p = data;
890 michael 1632 struct MaskItem *conf = NULL;
891 adx 30
892 michael 4298 /* First, make sure it's a real client! */
893 michael 3246 assert(client_p);
894 adx 30 assert(&client_p->localClient->fd == fd);
895    
896     /* Next, for backward purposes, record the ip of the server */
897     memcpy(&client_p->localClient->ip, &fd->connect.hostaddr,
898     sizeof(struct irc_ssaddr));
899 michael 3246
900 adx 30 /* Check the status */
901     if (status != COMM_OK)
902     {
903     /* We have an error, so report it and quit
904     * Admins get to see any IP, mere opers don't *sigh*
905     */
906     if (ConfigServerHide.hide_server_ips)
907 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
908 adx 30 "Error connecting to %s: %s",
909     client_p->name, comm_errstr(status));
910     else
911 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
912 michael 2134 "Error connecting to %s[%s]: %s", client_p->name,
913     client_p->host, comm_errstr(status));
914 adx 30
915 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
916 michael 2134 "Error connecting to %s: %s",
917     client_p->name, comm_errstr(status));
918 adx 30
919     /* If a fd goes bad, call dead_link() the socket is no
920     * longer valid for reading or writing.
921     */
922     dead_link_on_write(client_p, 0);
923     return;
924     }
925    
926     /* COMM_OK, so continue the connection procedure */
927     /* Get the C/N lines */
928     conf = find_conf_name(&client_p->localClient->confs,
929 michael 2134 client_p->name, CONF_SERVER);
930 adx 30 if (conf == NULL)
931     {
932 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
933 michael 2134 "Lost connect{} block for %s", get_client_name(client_p, HIDE_IP));
934 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
935 michael 2134 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
936 adx 30
937 michael 3171 exit_client(client_p, "Lost connect{} block");
938 adx 30 return;
939     }
940    
941     /* Next, send the initial handshake */
942     SetHandshake(client_p);
943    
944     #ifdef HAVE_LIBCRYPTO
945 michael 1632 if (IsConfSSL(conf))
946 michael 1303 {
947 michael 1632 ssl_connect_init(client_p, conf, fd);
948 michael 1303 return;
949     }
950 adx 30 #endif
951    
952 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
953 adx 30
954 michael 1632 send_capabilities(client_p, 0);
955 adx 30
956 michael 2134 sendto_one(client_p, "SERVER %s 1 :%s%s", me.name,
957     ConfigServerHide.hidden ? "(H) " : "", me.info);
958 adx 30
959     /* If we've been marked dead because a send failed, just exit
960     * here now and save everyone the trouble of us ever existing.
961     */
962 michael 2345 if (IsDead(client_p))
963 adx 30 {
964 michael 1618 sendto_realops_flags(UMODE_ALL, L_ADMIN, SEND_NOTICE,
965 michael 2134 "%s[%s] went dead during handshake",
966 adx 30 client_p->name,
967 michael 2134 client_p->host);
968 michael 1618 sendto_realops_flags(UMODE_ALL, L_OPER, SEND_NOTICE,
969 michael 2134 "%s went dead during handshake", client_p->name);
970 adx 30 return;
971     }
972    
973     /* don't move to serv_list yet -- we haven't sent a burst! */
974     /* If we get here, we're ok, so lets start reading some data */
975     comm_setselect(fd, COMM_SELECT_READ, read_packet, client_p, 0);
976     }
977    
978     struct Client *
979     find_servconn_in_progress(const char *name)
980     {
981     dlink_node *ptr;
982     struct Client *cptr;
983    
984     DLINK_FOREACH(ptr, unknown_list.head)
985     {
986     cptr = ptr->data;
987    
988     if (cptr && cptr->name[0])
989 michael 1652 if (!match(name, cptr->name))
990 adx 30 return cptr;
991     }
992 michael 2345
993 adx 30 return NULL;
994     }

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision