ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/server.c
Revision: 6494
Committed: Sat Sep 5 17:00:42 2015 UTC (9 years, 11 months ago) by michael
Content type: text/x-csrc
File size: 28797 byte(s)
Log Message:
- server.c:check_server(): removed redundant test on server_conf; constification

File Contents

# User Rev Content
1 adx 30 /*
2 michael 2916 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3 adx 30 *
4 michael 5347 * Copyright (c) 1997-2015 ircd-hybrid development team
5 adx 30 *
6     * This program is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * This program is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with this program; if not, write to the Free Software
18 michael 4565 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
19 adx 30 * USA
20     */
21    
22 michael 2916 /*! \file s_serv.c
23     * \brief Server related functions.
24     * \version $Id$
25     */
26    
27 adx 30 #include "stdinc.h"
28     #ifdef HAVE_LIBCRYPTO
29     #include <openssl/rsa.h>
30     #include "rsa.h"
31     #endif
32 michael 1011 #include "list.h"
33 adx 30 #include "client.h"
34     #include "event.h"
35     #include "hash.h"
36     #include "irc_string.h"
37     #include "ircd.h"
38     #include "ircd_defs.h"
39     #include "s_bsd.h"
40     #include "numeric.h"
41     #include "packet.h"
42 michael 1309 #include "conf.h"
43 michael 3347 #include "server.h"
44 michael 1309 #include "log.h"
45 michael 3347 #include "user.h"
46 adx 30 #include "send.h"
47     #include "memory.h"
48 michael 2916 #include "channel.h"
49 michael 1243 #include "parse.h"
50 adx 30
51 michael 2156 dlink_list flatten_links;
52 michael 5796 static dlink_list server_capabilities_list;
53 michael 4464 static void serv_connect_callback(fde_t *, int, void *);
54 adx 30
55    
56     /*
57     * write_links_file
58     *
59     * inputs - void pointer which is not used
60     * output - NONE
61     * side effects - called from an event, write out list of linked servers
62     * but in no particular order.
63     */
64     void
65 michael 4439 write_links_file(void *unused)
66 adx 30 {
67 michael 2156 FILE *file = NULL;
68 michael 4815 dlink_node *node = NULL, *node_next = NULL;
69 michael 3215 char buff[IRCD_BUFSIZE] = "";
70 adx 30
71 michael 2156 if ((file = fopen(LIPATH, "w")) == NULL)
72 adx 30 return;
73    
74 michael 4815 DLINK_FOREACH_SAFE(node, node_next, flatten_links.head)
75 adx 30 {
76 michael 4815 dlinkDelete(node, &flatten_links);
77     MyFree(node->data);
78     free_dlink_node(node);
79 adx 30 }
80    
81 michael 4815 DLINK_FOREACH(node, global_server_list.head)
82 adx 30 {
83 michael 4815 const struct Client *target_p = node->data;
84 adx 30
85 michael 2156 /*
86     * Skip hidden servers, aswell as ourselves, since we already send
87     * ourselves in /links
88     */
89     if (IsHidden(target_p) || IsMe(target_p))
90 adx 30 continue;
91    
92 michael 1851 if (HasFlag(target_p, FLAGS_SERVICE) && ConfigServerHide.hide_services)
93     continue;
94    
95 michael 1545 /*
96     * Attempt to format the file in such a way it follows the usual links output
97 adx 30 * ie "servername uplink :hops info"
98     * Mostly for aesthetic reasons - makes it look pretty in mIRC ;)
99     * - madmax
100     */
101 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s", target_p->name,
102     me.name, target_p->info);
103 michael 2212 dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
104 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s\n", target_p->name,
105     me.name, target_p->info);
106 adx 30
107 michael 1325 fputs(buff, file);
108 adx 30 }
109    
110 michael 1325 fclose(file);
111 adx 30 }
112    
113 michael 2216 void
114     read_links_file(void)
115     {
116     FILE *file = NULL;
117     char *p = NULL;
118 michael 3215 char buff[IRCD_BUFSIZE] = "";
119 michael 2216
120     if ((file = fopen(LIPATH, "r")) == NULL)
121     return;
122    
123     while (fgets(buff, sizeof(buff), file))
124     {
125 michael 3246 if ((p = strchr(buff, '\n')))
126 michael 2216 *p = '\0';
127    
128     dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
129     }
130    
131     fclose(file);
132     }
133    
134 adx 30 /* hunt_server()
135     * Do the basic thing in delivering the message (command)
136     * across the relays to the specific server (server) for
137     * actions.
138     *
139     * Note: The command is a format string and *MUST* be
140     * of prefixed style (e.g. ":%s COMMAND %s ...").
141     * Command can have only max 8 parameters.
142     *
143     * server parv[server] is the parameter identifying the
144     * target server.
145     *
146     * *WARNING*
147     * parv[server] is replaced with the pointer to the
148     * real servername from the matched client (I'm lazy
149     * now --msa).
150     *
151     * returns: (see #defines)
152     */
153     int
154 michael 3156 hunt_server(struct Client *source_p, const char *command,
155 michael 1857 const int server, const int parc, char *parv[])
156 adx 30 {
157     struct Client *target_p = NULL;
158 michael 4815 dlink_node *node = NULL;
159 adx 30
160 michael 1344 /* Assume it's me, if no server */
161     if (parc <= server || EmptyString(parv[server]))
162     return HUNTED_ISME;
163 adx 30
164 michael 4206 if ((target_p = find_person(source_p, parv[server])) == NULL)
165     target_p = hash_find_server(parv[server]);
166 michael 1344
167 michael 4206 /*
168     * These are to pickup matches that would cause the following
169 adx 30 * message to go in the wrong direction while doing quick fast
170     * non-matching lookups.
171     */
172     if (target_p)
173     if (target_p->from == source_p->from && !MyConnect(target_p))
174     target_p = NULL;
175    
176 michael 4206 if (!target_p && has_wildcards(parv[server]))
177 adx 30 {
178 michael 6060 DLINK_FOREACH(node, global_server_list.head)
179 adx 30 {
180 michael 4815 struct Client *tmp = node->data;
181 michael 4206
182 michael 6060 assert(IsMe(tmp) || IsServer(tmp));
183 michael 4206 if (!match(parv[server], tmp->name))
184 adx 30 {
185 michael 4206 if (tmp->from == source_p->from && !MyConnect(tmp))
186     continue;
187 michael 4210
188 michael 4815 target_p = node->data;
189 michael 4210 break;
190 adx 30 }
191     }
192 michael 6060
193     if (!target_p)
194     {
195     DLINK_FOREACH(node, global_client_list.head)
196     {
197     struct Client *tmp = node->data;
198    
199     assert(IsMe(tmp) || IsServer(tmp) || IsClient(tmp));
200     if (!match(parv[server], tmp->name))
201     {
202     if (tmp->from == source_p->from && !MyConnect(tmp))
203     continue;
204    
205     target_p = node->data;
206     break;
207     }
208     }
209     }
210 adx 30 }
211    
212 michael 3246 if (target_p)
213 adx 30 {
214 michael 4206 assert(IsMe(target_p) || IsServer(target_p) || IsClient(target_p));
215 adx 30 if (IsMe(target_p) || MyClient(target_p))
216     return HUNTED_ISME;
217    
218 michael 4206 parv[server] = target_p->id;
219     sendto_one(target_p, command, source_p->id,
220 adx 30 parv[1], parv[2], parv[3], parv[4],
221     parv[5], parv[6], parv[7], parv[8]);
222 michael 2134 return HUNTED_PASS;
223 michael 2345 }
224 adx 30
225 michael 3109 sendto_one_numeric(source_p, &me, ERR_NOSUCHSERVER, parv[server]);
226 michael 2134 return HUNTED_NOSUCH;
227 adx 30 }
228    
229     /* try_connections()
230     *
231     * inputs - void pointer which is not used
232     * output - NONE
233     * side effects -
234     * scan through configuration and try new connections.
235     * Returns the calendar time when the next call to this
236     * function should be made latest. (No harm done if this
237     * is called earlier or later...)
238     */
239     void
240     try_connections(void *unused)
241     {
242 michael 4815 dlink_node *node = NULL;
243 adx 30
244     /* TODO: change this to set active flag to 0 when added to event! --Habeeb */
245     if (GlobalSetOptions.autoconn == 0)
246     return;
247    
248 michael 4815 DLINK_FOREACH(node, server_items.head)
249 adx 30 {
250 michael 4815 struct MaskItem *conf = node->data;
251 adx 30
252 michael 1636 assert(conf->type == CONF_SERVER);
253 michael 1632
254 michael 2345 /* Also when already connecting! (update holdtimes) --SRB
255 adx 30 */
256 michael 4196 if (!conf->port || !IsConfAllowAutoConn(conf))
257 adx 30 continue;
258    
259    
260     /* Skip this entry if the use of it is still on hold until
261     * future. Otherwise handle this entry (and set it on hold
262     * until next time). Will reset only hold times, if already
263     * made one successfull connection... [this algorithm is
264     * a bit fuzzy... -- msa >;) ]
265     */
266 michael 1649 if (conf->until > CurrentTime)
267 adx 30 continue;
268    
269 michael 4028 assert(conf->class);
270 adx 30
271 michael 6390 conf->until = CurrentTime + conf->class->con_freq;
272 michael 4028
273 michael 3246 /*
274     * Found a CONNECT config with port specified, scan clients
275 adx 30 * and see if this server is already connected?
276     */
277 michael 3246 if (hash_find_server(conf->name))
278 adx 30 continue;
279    
280 michael 1632 if (conf->class->ref_count < conf->class->max_total)
281 adx 30 {
282 michael 6390 /* Move this entry to the end of the list, if not already last */
283 michael 4815 if (node->next)
284 adx 30 {
285 michael 4815 dlinkDelete(node, &server_items);
286 adx 30 dlinkAddTail(conf, &conf->node, &server_items);
287     }
288    
289     if (find_servconn_in_progress(conf->name))
290     return;
291    
292 michael 3246 /*
293     * We used to only print this if serv_connect() actually
294 adx 30 * succeeded, but since comm_tcp_connect() can call the callback
295     * immediately if there is an error, we were getting error messages
296     * in the wrong order. SO, we just print out the activated line,
297     * and let serv_connect() / serv_connect_callback() print an
298     * error afterwards if it fails.
299     * -- adrian
300     */
301     if (ConfigServerHide.hide_server_ips)
302 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
303 michael 1618 "Connection to %s activated.",
304 adx 30 conf->name);
305     else
306 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
307 michael 1618 "Connection to %s[%s] activated.",
308 michael 1632 conf->name, conf->host);
309 adx 30
310 michael 1632 serv_connect(conf, NULL);
311 adx 30 /* We connect only one at time... */
312     return;
313     }
314     }
315     }
316    
317     int
318 michael 1115 valid_servname(const char *name)
319     {
320 michael 3451 unsigned int dots = 0;
321 michael 1115 const char *p = name;
322    
323     for (; *p; ++p)
324     {
325     if (!IsServChar(*p))
326 michael 1118 return 0;
327 michael 1115
328     if (*p == '.')
329     ++dots;
330     }
331    
332 michael 3451 return dots && (p - name) <= HOSTLEN;
333 michael 1115 }
334    
335     int
336 michael 1302 check_server(const char *name, struct Client *client_p)
337 adx 30 {
338 michael 4815 dlink_node *node = NULL;
339 michael 1632 struct MaskItem *conf = NULL;
340     struct MaskItem *server_conf = NULL;
341 adx 30 int error = -1;
342    
343 michael 3246 assert(client_p);
344 adx 30
345 michael 6494 /* Loop through looking for all possible connect items that might work */
346 michael 4815 DLINK_FOREACH(node, server_items.head)
347 adx 30 {
348 michael 4815 conf = node->data;
349 adx 30
350 michael 1652 if (match(name, conf->name))
351 adx 30 continue;
352    
353     error = -3;
354    
355     /* XXX: Fix me for IPv6 */
356     /* XXX sockhost is the IPv4 ip as a string */
357 michael 2345 if (!match(conf->host, client_p->host) ||
358 michael 1652 !match(conf->host, client_p->sockhost))
359 adx 30 {
360     error = -2;
361    
362 michael 4588 if (!match_conf_password(client_p->connection->password, conf))
363 michael 1414 return -2;
364 adx 30
365 michael 2228 if (!EmptyString(conf->certfp))
366 michael 2229 if (EmptyString(client_p->certfp) || strcasecmp(client_p->certfp, conf->certfp))
367 michael 2228 return -4;
368    
369 michael 1414 server_conf = conf;
370 adx 30 }
371     }
372    
373     if (server_conf == NULL)
374 michael 2182 return error;
375 adx 30
376     attach_conf(client_p, server_conf);
377    
378 michael 6494 switch (server_conf->aftype)
379 adx 30 {
380 michael 6494 case AF_INET6:
381     {
382     const struct sockaddr_in6 *v6 = (struct sockaddr_in6 *)&server_conf->addr;
383 michael 4415
384 michael 6494 if (IN6_IS_ADDR_UNSPECIFIED(&v6->sin6_addr))
385     memcpy(&server_conf->addr, &client_p->connection->ip, sizeof(struct irc_ssaddr));
386     break;
387     }
388     case AF_INET:
389 adx 30 {
390 michael 6494 const struct sockaddr_in *v4 = (struct sockaddr_in *)&server_conf->addr;
391 adx 30
392 michael 6494 if (v4->sin_addr.s_addr == INADDR_NONE)
393     memcpy(&server_conf->addr, &client_p->connection->ip, sizeof(struct irc_ssaddr));
394     break;
395 adx 30 }
396     }
397    
398 michael 2182 return 0;
399 adx 30 }
400    
401     /* add_capability()
402     *
403     * inputs - string name of CAPAB
404     * - int flag of capability
405     * output - NONE
406     * side effects - Adds given capability name and bit mask to
407     * current supported capabilities. This allows
408     * modules to dynamically add or subtract their capability.
409     */
410     void
411 michael 5796 add_capability(const char *name, unsigned int flag)
412 adx 30 {
413 michael 3504 struct Capability *cap = MyCalloc(sizeof(*cap));
414 adx 30
415 michael 5796 cap->name = xstrdup(name);
416     cap->cap = flag;
417     dlinkAdd(cap, &cap->node, &server_capabilities_list);
418 adx 30 }
419    
420     /* delete_capability()
421     *
422     * inputs - string name of CAPAB
423     * output - NONE
424     * side effects - delete given capability from ones known.
425     */
426 michael 5776 void
427 michael 5796 delete_capability(const char *name)
428 adx 30 {
429 michael 4815 dlink_node *node = NULL, *node_next = NULL;
430 adx 30
431 michael 5796 DLINK_FOREACH_SAFE(node, node_next, server_capabilities_list.head)
432 adx 30 {
433 michael 4815 struct Capability *cap = node->data;
434 adx 30
435 michael 5796 if (!irccmp(cap->name, name))
436 adx 30 {
437 michael 5796 dlinkDelete(node, &server_capabilities_list);
438     MyFree(cap->name);
439     MyFree(cap);
440 adx 30 }
441     }
442     }
443    
444     /*
445     * find_capability()
446     *
447     * inputs - string name of capab to find
448     * output - 0 if not found CAPAB otherwise
449     * side effects - none
450     */
451 michael 1877 unsigned int
452 michael 5796 find_capability(const char *name)
453 adx 30 {
454 michael 4815 const dlink_node *node = NULL;
455 adx 30
456 michael 5796 DLINK_FOREACH(node, server_capabilities_list.head)
457 adx 30 {
458 michael 4815 const struct Capability *cap = node->data;
459 adx 30
460 michael 5796 if (!irccmp(cap->name, name))
461 michael 896 return cap->cap;
462 adx 30 }
463 michael 896
464     return 0;
465 adx 30 }
466    
467     /* send_capabilities()
468     *
469     * inputs - Client pointer to send to
470     * - int flag of capabilities that this server can send
471     * output - NONE
472     * side effects - send the CAPAB line to a server -orabidoo
473     *
474     */
475     void
476 michael 5796 send_capabilities(struct Client *client_p)
477 adx 30 {
478 michael 3746 char buf[IRCD_BUFSIZE] = "";
479 michael 4815 const dlink_node *node = NULL;
480 adx 30
481 michael 5796 DLINK_FOREACH(node, server_capabilities_list.head)
482 adx 30 {
483 michael 4815 const struct Capability *cap = node->data;
484 adx 30
485 michael 5796 strlcat(buf, cap->name, sizeof(buf));
486    
487     if (node->next)
488     strlcat(buf, " ", sizeof(buf));
489 adx 30 }
490    
491 michael 3746 sendto_one(client_p, "CAPAB :%s", buf);
492 adx 30 }
493    
494     /*
495     * show_capabilities - show current server capabilities
496     *
497     * inputs - pointer to a struct Client
498     * output - pointer to static string
499     * side effects - build up string representing capabilities of server listed
500     */
501     const char *
502 michael 2282 show_capabilities(const struct Client *target_p)
503 adx 30 {
504 michael 2309 static char msgbuf[IRCD_BUFSIZE] = "";
505 michael 4815 const dlink_node *node = NULL;
506 adx 30
507 michael 2309 strlcpy(msgbuf, "TS", sizeof(msgbuf));
508    
509 michael 5796 DLINK_FOREACH(node, server_capabilities_list.head)
510 adx 30 {
511 michael 4815 const struct Capability *cap = node->data;
512 adx 30
513 michael 2282 if (!IsCapable(target_p, cap->cap))
514     continue;
515    
516     strlcat(msgbuf, " ", sizeof(msgbuf));
517     strlcat(msgbuf, cap->name, sizeof(msgbuf));
518 adx 30 }
519 michael 1302
520     return msgbuf;
521 adx 30 }
522    
523     /* make_server()
524     *
525     * inputs - pointer to client struct
526     * output - pointer to struct Server
527     * side effects - add's an Server information block to a client
528     * if it was not previously allocated.
529     */
530     struct Server *
531     make_server(struct Client *client_p)
532     {
533     if (client_p->serv == NULL)
534 michael 3504 client_p->serv = MyCalloc(sizeof(struct Server));
535 adx 30
536     return client_p->serv;
537     }
538    
539     /* New server connection code
540     * Based upon the stuff floating about in s_bsd.c
541     * -- adrian
542     */
543    
544     /* serv_connect() - initiate a server connection
545     *
546 michael 2345 * inputs - pointer to conf
547 adx 30 * - pointer to client doing the connect
548     * output -
549     * side effects -
550     *
551     * This code initiates a connection to a server. It first checks to make
552     * sure the given server exists. If this is the case, it creates a socket,
553     * creates a client, saves the socket information in the client, and
554     * initiates a connection to the server through comm_connect_tcp(). The
555     * completion of this goes through serv_completed_connection().
556     *
557     * We return 1 if the connection is attempted, since we don't know whether
558     * it suceeded or not, and 0 if it fails in here somewhere.
559     */
560     int
561 michael 1632 serv_connect(struct MaskItem *conf, struct Client *by)
562 adx 30 {
563 michael 3246 struct Client *client_p = NULL;
564     char buf[HOSTIPLEN + 1] = "";
565 adx 30
566     /* conversion structs */
567     struct sockaddr_in *v4;
568 michael 3246
569 michael 1632 /* Make sure conf is useful */
570 michael 3246 assert(conf);
571 adx 30
572 michael 5051 getnameinfo((const struct sockaddr *)&conf->addr, conf->addr.ss_len,
573 michael 1123 buf, sizeof(buf), NULL, 0, NI_NUMERICHOST);
574 michael 1632 ilog(LOG_TYPE_IRCD, "Connect to %s[%s] @%s", conf->name, conf->host,
575 adx 30 buf);
576    
577     /* Still processing a DNS lookup? -> exit */
578 michael 1632 if (conf->dns_pending)
579 adx 30 {
580 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
581 michael 992 "Error connecting to %s: DNS lookup for connect{} in progress.",
582     conf->name);
583 michael 3246 return 0;
584 adx 30 }
585    
586 michael 1632 if (conf->dns_failed)
587 michael 992 {
588 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
589 michael 992 "Error connecting to %s: DNS lookup for connect{} failed.",
590     conf->name);
591 michael 3246 return 0;
592 michael 992 }
593    
594 adx 30 /* Make sure this server isn't already connected
595 michael 1632 * Note: conf should ALWAYS be a valid C: line
596 adx 30 */
597 michael 3246 if ((client_p = hash_find_server(conf->name)))
598 michael 2345 {
599 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
600 michael 2134 "Server %s already present from %s",
601     conf->name, get_client_name(client_p, SHOW_IP));
602 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
603 michael 2134 "Server %s already present from %s",
604     conf->name, get_client_name(client_p, MASK_IP));
605 adx 30 if (by && IsClient(by) && !MyClient(by))
606 michael 3110 sendto_one_notice(by, &me, ":Server %s already present from %s",
607     conf->name, get_client_name(client_p, MASK_IP));
608 michael 2134 return 0;
609 adx 30 }
610 michael 2345
611 adx 30 /* Create a local client */
612     client_p = make_client(NULL);
613    
614     /* Copy in the server, hostname, fd */
615     strlcpy(client_p->name, conf->name, sizeof(client_p->name));
616 michael 1632 strlcpy(client_p->host, conf->host, sizeof(client_p->host));
617 adx 30
618     /* We already converted the ip once, so lets use it - stu */
619 michael 1115 strlcpy(client_p->sockhost, buf, sizeof(client_p->sockhost));
620 adx 30
621 michael 2345 /* create a socket for the server connection */
622 michael 4588 if (comm_open(&client_p->connection->fd, conf->addr.ss.ss_family, SOCK_STREAM, 0, NULL) < 0)
623 adx 30 {
624     /* Eek, failure to create the socket */
625 michael 3335 report_error(L_ALL, "opening stream socket to %s: %s", conf->name, errno);
626    
627 adx 30 SetDead(client_p);
628 michael 3171 exit_client(client_p, "Connection failed");
629 michael 2134 return 0;
630 adx 30 }
631    
632     /* servernames are always guaranteed under HOSTLEN chars */
633 michael 4588 fd_note(&client_p->connection->fd, "Server: %s", conf->name);
634 adx 30
635     /* Attach config entries to client here rather than in
636     * serv_connect_callback(). This to avoid null pointer references.
637     */
638 michael 1632 if (!attach_connect_block(client_p, conf->name, conf->host))
639 adx 30 {
640 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
641 michael 4677 "Host %s is not enabled for connecting: no connect {} block",
642 michael 2134 conf->name);
643 michael 2345 if (by && IsClient(by) && !MyClient(by))
644 michael 4677 sendto_one_notice(by, &me, ":Connect to host %s failed: no connect {} block", client_p->name);
645 michael 3110
646 adx 30 SetDead(client_p);
647 michael 3171 exit_client(client_p, "Connection failed");
648 michael 2134 return 0;
649 adx 30 }
650    
651     /* at this point we have a connection in progress and C/N lines
652     * attached to the client, the socket info should be saved in the
653     * client and it should either be resolved or have a valid address.
654     *
655     * The socket has been connected or connect is in progress.
656     */
657     make_server(client_p);
658    
659     if (by && IsClient(by))
660     strlcpy(client_p->serv->by, by->name, sizeof(client_p->serv->by));
661     else
662     strlcpy(client_p->serv->by, "AutoConn.", sizeof(client_p->serv->by));
663    
664     SetConnecting(client_p);
665 michael 4588 client_p->connection->aftype = conf->aftype;
666 adx 30
667     /* Now, initiate the connection */
668 michael 2345 /* XXX assume that a non 0 type means a specific bind address
669 adx 30 * for this connect.
670     */
671 michael 1632 switch (conf->aftype)
672 adx 30 {
673     case AF_INET:
674 michael 1632 v4 = (struct sockaddr_in*)&conf->bind;
675 michael 3246 if (v4->sin_addr.s_addr)
676 adx 30 {
677     struct irc_ssaddr ipn;
678     memset(&ipn, 0, sizeof(struct irc_ssaddr));
679     ipn.ss.ss_family = AF_INET;
680     ipn.ss_port = 0;
681 michael 1632 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
682 michael 4588 comm_connect_tcp(&client_p->connection->fd, conf->host, conf->port,
683 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
684 michael 2134 serv_connect_callback, client_p, conf->aftype,
685     CONNECTTIMEOUT);
686 adx 30 }
687 michael 4340 else if (ConfigServerInfo.specific_ipv4_vhost)
688 adx 30 {
689     struct irc_ssaddr ipn;
690     memset(&ipn, 0, sizeof(struct irc_ssaddr));
691     ipn.ss.ss_family = AF_INET;
692     ipn.ss_port = 0;
693 michael 4340 memcpy(&ipn, &ConfigServerInfo.ip, sizeof(struct irc_ssaddr));
694 michael 4588 comm_connect_tcp(&client_p->connection->fd, conf->host, conf->port,
695 adx 30 (struct sockaddr *)&ipn, ipn.ss_len,
696 michael 1632 serv_connect_callback, client_p, conf->aftype,
697 michael 2134 CONNECTTIMEOUT);
698 adx 30 }
699     else
700 michael 4588 comm_connect_tcp(&client_p->connection->fd, conf->host, conf->port,
701 michael 2345 NULL, 0, serv_connect_callback, client_p, conf->aftype,
702 adx 30 CONNECTTIMEOUT);
703     break;
704     case AF_INET6:
705     {
706 michael 2182 struct irc_ssaddr ipn;
707     struct sockaddr_in6 *v6;
708     struct sockaddr_in6 *v6conf;
709 adx 30
710 michael 2182 memset(&ipn, 0, sizeof(struct irc_ssaddr));
711     v6conf = (struct sockaddr_in6 *)&conf->bind;
712     v6 = (struct sockaddr_in6 *)&ipn;
713 adx 30
714 michael 3246 if (memcmp(&v6conf->sin6_addr, &v6->sin6_addr, sizeof(struct in6_addr)))
715 adx 30 {
716 michael 2182 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
717     ipn.ss.ss_family = AF_INET6;
718     ipn.ss_port = 0;
719 michael 4588 comm_connect_tcp(&client_p->connection->fd,
720 michael 2182 conf->host, conf->port,
721 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
722 michael 2182 serv_connect_callback, client_p,
723     conf->aftype, CONNECTTIMEOUT);
724     }
725 michael 4340 else if (ConfigServerInfo.specific_ipv6_vhost)
726 michael 2182 {
727 michael 4340 memcpy(&ipn, &ConfigServerInfo.ip6, sizeof(struct irc_ssaddr));
728 michael 2182 ipn.ss.ss_family = AF_INET6;
729     ipn.ss_port = 0;
730 michael 4588 comm_connect_tcp(&client_p->connection->fd,
731 michael 2182 conf->host, conf->port,
732     (struct sockaddr *)&ipn, ipn.ss_len,
733     serv_connect_callback, client_p,
734     conf->aftype, CONNECTTIMEOUT);
735     }
736     else
737 michael 4588 comm_connect_tcp(&client_p->connection->fd,
738 michael 2345 conf->host, conf->port,
739 michael 2182 NULL, 0, serv_connect_callback, client_p,
740     conf->aftype, CONNECTTIMEOUT);
741 adx 30 }
742     }
743 michael 4415
744 michael 2182 return 1;
745 adx 30 }
746    
747 michael 1303 #ifdef HAVE_LIBCRYPTO
748     static void
749     finish_ssl_server_handshake(struct Client *client_p)
750     {
751 michael 1632 struct MaskItem *conf = NULL;
752 michael 1303
753 michael 4588 conf = find_conf_name(&client_p->connection->confs,
754 michael 1632 client_p->name, CONF_SERVER);
755 michael 1303 if (conf == NULL)
756     {
757 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
758 michael 6428 "Lost connect{} block for %s", get_client_name(client_p, SHOW_IP));
759 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
760 michael 1303 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
761    
762 michael 3171 exit_client(client_p, "Lost connect{} block");
763 michael 1303 return;
764     }
765    
766 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
767 michael 1303
768 michael 5796 send_capabilities(client_p);
769 michael 1303
770     sendto_one(client_p, "SERVER %s 1 :%s%s",
771     me.name, ConfigServerHide.hidden ? "(H) " : "",
772     me.info);
773    
774 michael 6428 /*
775     * If we've been marked dead because a send failed, just exit
776 michael 1303 * here now and save everyone the trouble of us ever existing.
777     */
778     if (IsDead(client_p))
779     {
780 michael 6428 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
781     "%s went dead during handshake", get_client_name(client_p, SHOW_IP));
782     sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
783     "%s went dead during handshake", get_client_name(client_p, MASK_IP));
784     return;
785 michael 1303 }
786    
787     /* don't move to serv_list yet -- we haven't sent a burst! */
788     /* If we get here, we're ok, so lets start reading some data */
789 michael 4588 comm_setselect(&client_p->connection->fd, COMM_SELECT_READ, read_packet, client_p, 0);
790 michael 1303 }
791    
792     static void
793 michael 4461 ssl_server_handshake(fde_t *fd, void *data)
794 michael 1303 {
795 michael 4461 struct Client *client_p = data;
796 michael 2463 X509 *cert = NULL;
797     int ret = 0;
798 michael 1303
799 michael 4588 if ((ret = SSL_connect(client_p->connection->fd.ssl)) <= 0)
800 michael 1303 {
801 michael 4737 if ((CurrentTime - client_p->connection->firsttime) > CONNECTTIMEOUT)
802 michael 4732 {
803     exit_client(client_p, "Timeout during SSL handshake");
804     return;
805     }
806    
807 michael 4588 switch (SSL_get_error(client_p->connection->fd.ssl, ret))
808 michael 1303 {
809     case SSL_ERROR_WANT_WRITE:
810 michael 4588 comm_setselect(&client_p->connection->fd, COMM_SELECT_WRITE,
811 michael 4737 ssl_server_handshake, client_p, CONNECTTIMEOUT);
812 michael 1303 return;
813     case SSL_ERROR_WANT_READ:
814 michael 4588 comm_setselect(&client_p->connection->fd, COMM_SELECT_READ,
815 michael 4737 ssl_server_handshake, client_p, CONNECTTIMEOUT);
816 michael 1303 return;
817     default:
818 michael 1308 {
819     const char *sslerr = ERR_error_string(ERR_get_error(), NULL);
820 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
821 michael 1308 "Error connecting to %s: %s", client_p->name,
822     sslerr ? sslerr : "unknown SSL error");
823 michael 3171 exit_client(client_p, "Error during SSL handshake");
824 michael 1303 return;
825 michael 1308 }
826 michael 1303 }
827     }
828    
829 michael 4732 comm_settimeout(&client_p->connection->fd, 0, NULL, NULL);
830    
831 michael 4588 if ((cert = SSL_get_peer_certificate(client_p->connection->fd.ssl)))
832 michael 2463 {
833 michael 4588 int res = SSL_get_verify_result(client_p->connection->fd.ssl);
834 michael 3375 char buf[EVP_MAX_MD_SIZE * 2 + 1] = "";
835     unsigned char md[EVP_MAX_MD_SIZE] = "";
836 michael 2463
837     if (res == X509_V_OK || res == X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN ||
838     res == X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE ||
839     res == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT)
840     {
841 michael 3375 unsigned int n = 0;
842 michael 2463
843 michael 4340 if (X509_digest(cert, ConfigServerInfo.message_digest_algorithm, md, &n))
844 michael 2463 {
845 michael 4113 binary_to_hex(md, buf, n);
846 michael 2463 client_p->certfp = xstrdup(buf);
847     }
848     }
849     else
850     ilog(LOG_TYPE_IRCD, "Server %s!%s@%s gave bad SSL client certificate: %d",
851     client_p->name, client_p->username, client_p->host, res);
852     X509_free(cert);
853     }
854    
855 michael 1303 finish_ssl_server_handshake(client_p);
856     }
857    
858     static void
859 michael 6397 ssl_connect_init(struct Client *client_p, const struct MaskItem *conf, fde_t *fd)
860 michael 1303 {
861 michael 4588 if ((client_p->connection->fd.ssl = SSL_new(ConfigServerInfo.client_ctx)) == NULL)
862 michael 1303 {
863     ilog(LOG_TYPE_IRCD, "SSL_new() ERROR! -- %s",
864     ERR_error_string(ERR_get_error(), NULL));
865     SetDead(client_p);
866 michael 3171 exit_client(client_p, "SSL_new failed");
867 michael 1303 return;
868     }
869    
870     SSL_set_fd(fd->ssl, fd->fd);
871 michael 1306
872 michael 1632 if (!EmptyString(conf->cipher_list))
873 michael 4588 SSL_set_cipher_list(client_p->connection->fd.ssl, conf->cipher_list);
874 michael 1306
875     ssl_server_handshake(NULL, client_p);
876 michael 1303 }
877     #endif
878    
879 adx 30 /* serv_connect_callback() - complete a server connection.
880 michael 2345 *
881 adx 30 * This routine is called after the server connection attempt has
882     * completed. If unsucessful, an error is sent to ops and the client
883     * is closed. If sucessful, it goes through the initialisation/check
884     * procedures, the capabilities are sent, and the socket is then
885     * marked for reading.
886     */
887     static void
888     serv_connect_callback(fde_t *fd, int status, void *data)
889     {
890 michael 6397 struct Client *const client_p = data;
891     const struct MaskItem *conf = NULL;
892 adx 30
893 michael 4298 /* First, make sure it's a real client! */
894 michael 3246 assert(client_p);
895 michael 4588 assert(&client_p->connection->fd == fd);
896 adx 30
897     /* Next, for backward purposes, record the ip of the server */
898 michael 4588 memcpy(&client_p->connection->ip, &fd->connect.hostaddr,
899 adx 30 sizeof(struct irc_ssaddr));
900 michael 3246
901 adx 30 /* Check the status */
902     if (status != COMM_OK)
903     {
904 michael 6428 /* We have an error, so report it and quit */
905     sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
906     "Error connecting to %s: %s",
907     get_client_name(client_p, SHOW_IP), comm_errstr(status));
908     sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
909     "Error connecting to %s: %s",
910     get_client_name(client_p, MASK_IP), comm_errstr(status));
911    
912     /*
913     * If a fd goes bad, call dead_link() the socket is no
914     * longer valid for reading or writing.
915 adx 30 */
916 michael 6428 dead_link_on_write(client_p, 0);
917     return;
918 adx 30 }
919    
920     /* COMM_OK, so continue the connection procedure */
921     /* Get the C/N lines */
922 michael 4588 conf = find_conf_name(&client_p->connection->confs,
923 michael 2134 client_p->name, CONF_SERVER);
924 adx 30 if (conf == NULL)
925     {
926 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
927 michael 6428 "Lost connect{} block for %s", get_client_name(client_p, SHOW_IP));
928 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
929 michael 2134 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
930 adx 30
931 michael 3171 exit_client(client_p, "Lost connect{} block");
932 adx 30 return;
933     }
934    
935     /* Next, send the initial handshake */
936     SetHandshake(client_p);
937    
938     #ifdef HAVE_LIBCRYPTO
939 michael 1632 if (IsConfSSL(conf))
940 michael 1303 {
941 michael 1632 ssl_connect_init(client_p, conf, fd);
942 michael 1303 return;
943     }
944 adx 30 #endif
945    
946 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
947 adx 30
948 michael 5796 send_capabilities(client_p);
949 adx 30
950 michael 2134 sendto_one(client_p, "SERVER %s 1 :%s%s", me.name,
951     ConfigServerHide.hidden ? "(H) " : "", me.info);
952 adx 30
953 michael 6428 /*
954     * If we've been marked dead because a send failed, just exit
955 adx 30 * here now and save everyone the trouble of us ever existing.
956     */
957 michael 2345 if (IsDead(client_p))
958 adx 30 {
959 michael 6428 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
960     "%s went dead during handshake", get_client_name(client_p, SHOW_IP));
961     sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
962     "%s went dead during handshake", get_client_name(client_p, MASK_IP));
963     return;
964 adx 30 }
965    
966     /* don't move to serv_list yet -- we haven't sent a burst! */
967     /* If we get here, we're ok, so lets start reading some data */
968     comm_setselect(fd, COMM_SELECT_READ, read_packet, client_p, 0);
969     }
970    
971     struct Client *
972     find_servconn_in_progress(const char *name)
973     {
974     dlink_node *ptr;
975     struct Client *cptr;
976    
977     DLINK_FOREACH(ptr, unknown_list.head)
978     {
979     cptr = ptr->data;
980    
981     if (cptr && cptr->name[0])
982 michael 1652 if (!match(name, cptr->name))
983 adx 30 return cptr;
984     }
985 michael 2345
986 adx 30 return NULL;
987     }

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision