ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/server.c
Revision: 7271
Committed: Sat Feb 6 20:47:15 2016 UTC (9 years, 6 months ago) by michael
Content type: text/x-csrc
File size: 28259 byte(s)
Log Message:
- Don't exit out with GnuTLS when there's no key and/or certificate

File Contents

# User Rev Content
1 adx 30 /*
2 michael 2916 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3 adx 30 *
4 michael 7006 * Copyright (c) 1997-2016 ircd-hybrid development team
5 adx 30 *
6     * This program is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * This program is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with this program; if not, write to the Free Software
18 michael 4565 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
19 adx 30 * USA
20     */
21    
22 michael 2916 /*! \file s_serv.c
23     * \brief Server related functions.
24     * \version $Id$
25     */
26    
27 adx 30 #include "stdinc.h"
28 michael 1011 #include "list.h"
29 adx 30 #include "client.h"
30     #include "event.h"
31     #include "hash.h"
32     #include "irc_string.h"
33     #include "ircd.h"
34     #include "ircd_defs.h"
35     #include "s_bsd.h"
36     #include "numeric.h"
37     #include "packet.h"
38 michael 1309 #include "conf.h"
39 michael 3347 #include "server.h"
40 michael 1309 #include "log.h"
41 michael 3347 #include "user.h"
42 adx 30 #include "send.h"
43     #include "memory.h"
44 michael 2916 #include "channel.h"
45 michael 1243 #include "parse.h"
46 adx 30
47 michael 6527
48 michael 2156 dlink_list flatten_links;
49 michael 5796 static dlink_list server_capabilities_list;
50 michael 4464 static void serv_connect_callback(fde_t *, int, void *);
51 adx 30
52    
53     /*
54     * write_links_file
55     *
56     * inputs - void pointer which is not used
57     * output - NONE
58     * side effects - called from an event, write out list of linked servers
59     * but in no particular order.
60     */
61     void
62 michael 4439 write_links_file(void *unused)
63 adx 30 {
64 michael 2156 FILE *file = NULL;
65 michael 4815 dlink_node *node = NULL, *node_next = NULL;
66 michael 3215 char buff[IRCD_BUFSIZE] = "";
67 adx 30
68 michael 6599 if (EmptyString(ConfigServerHide.flatten_links_file))
69 adx 30 return;
70    
71 michael 6599 if ((file = fopen(ConfigServerHide.flatten_links_file, "w")) == NULL)
72 michael 6602 {
73     ilog(LOG_TYPE_IRCD, "Couldn't open \"%s\": %s", ConfigServerHide.flatten_links_file,
74     strerror(errno));
75 michael 6599 return;
76 michael 6602 }
77 michael 6599
78 michael 4815 DLINK_FOREACH_SAFE(node, node_next, flatten_links.head)
79 adx 30 {
80 michael 4815 dlinkDelete(node, &flatten_links);
81 michael 7032 xfree(node->data);
82 michael 4815 free_dlink_node(node);
83 adx 30 }
84    
85 michael 4815 DLINK_FOREACH(node, global_server_list.head)
86 adx 30 {
87 michael 4815 const struct Client *target_p = node->data;
88 adx 30
89 michael 2156 /*
90     * Skip hidden servers, aswell as ourselves, since we already send
91     * ourselves in /links
92     */
93     if (IsHidden(target_p) || IsMe(target_p))
94 adx 30 continue;
95    
96 michael 1851 if (HasFlag(target_p, FLAGS_SERVICE) && ConfigServerHide.hide_services)
97     continue;
98    
99 michael 1545 /*
100     * Attempt to format the file in such a way it follows the usual links output
101 adx 30 * ie "servername uplink :hops info"
102     * Mostly for aesthetic reasons - makes it look pretty in mIRC ;)
103     * - madmax
104     */
105 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s", target_p->name,
106     me.name, target_p->info);
107 michael 2212 dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
108 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s\n", target_p->name,
109     me.name, target_p->info);
110 adx 30
111 michael 1325 fputs(buff, file);
112 adx 30 }
113    
114 michael 1325 fclose(file);
115 adx 30 }
116    
117 michael 2216 void
118     read_links_file(void)
119     {
120     FILE *file = NULL;
121     char *p = NULL;
122 michael 3215 char buff[IRCD_BUFSIZE] = "";
123 michael 2216
124 michael 6599 if (EmptyString(ConfigServerHide.flatten_links_file))
125 michael 2216 return;
126    
127 michael 6599 if ((file = fopen(ConfigServerHide.flatten_links_file, "r")) == NULL)
128 michael 6602 {
129     ilog(LOG_TYPE_IRCD, "Couldn't open \"%s\": %s", ConfigServerHide.flatten_links_file,
130     strerror(errno));
131 michael 6599 return;
132 michael 6602 }
133 michael 6599
134 michael 2216 while (fgets(buff, sizeof(buff), file))
135     {
136 michael 3246 if ((p = strchr(buff, '\n')))
137 michael 2216 *p = '\0';
138    
139     dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
140     }
141    
142     fclose(file);
143     }
144    
145 adx 30 /* hunt_server()
146     * Do the basic thing in delivering the message (command)
147     * across the relays to the specific server (server) for
148     * actions.
149     *
150     * Note: The command is a format string and *MUST* be
151     * of prefixed style (e.g. ":%s COMMAND %s ...").
152     * Command can have only max 8 parameters.
153     *
154     * server parv[server] is the parameter identifying the
155     * target server.
156     *
157     * *WARNING*
158     * parv[server] is replaced with the pointer to the
159     * real servername from the matched client (I'm lazy
160     * now --msa).
161     *
162     * returns: (see #defines)
163     */
164     int
165 michael 3156 hunt_server(struct Client *source_p, const char *command,
166 michael 1857 const int server, const int parc, char *parv[])
167 adx 30 {
168     struct Client *target_p = NULL;
169 michael 4815 dlink_node *node = NULL;
170 adx 30
171 michael 1344 /* Assume it's me, if no server */
172     if (parc <= server || EmptyString(parv[server]))
173     return HUNTED_ISME;
174 adx 30
175 michael 4206 if ((target_p = find_person(source_p, parv[server])) == NULL)
176     target_p = hash_find_server(parv[server]);
177 michael 1344
178 michael 4206 /*
179     * These are to pickup matches that would cause the following
180 adx 30 * message to go in the wrong direction while doing quick fast
181     * non-matching lookups.
182     */
183     if (target_p)
184     if (target_p->from == source_p->from && !MyConnect(target_p))
185     target_p = NULL;
186    
187 michael 4206 if (!target_p && has_wildcards(parv[server]))
188 adx 30 {
189 michael 6060 DLINK_FOREACH(node, global_server_list.head)
190 adx 30 {
191 michael 4815 struct Client *tmp = node->data;
192 michael 4206
193 michael 6060 assert(IsMe(tmp) || IsServer(tmp));
194 michael 4206 if (!match(parv[server], tmp->name))
195 adx 30 {
196 michael 4206 if (tmp->from == source_p->from && !MyConnect(tmp))
197     continue;
198 michael 4210
199 michael 4815 target_p = node->data;
200 michael 4210 break;
201 adx 30 }
202     }
203 michael 6060
204     if (!target_p)
205     {
206     DLINK_FOREACH(node, global_client_list.head)
207     {
208     struct Client *tmp = node->data;
209    
210     assert(IsMe(tmp) || IsServer(tmp) || IsClient(tmp));
211     if (!match(parv[server], tmp->name))
212     {
213     if (tmp->from == source_p->from && !MyConnect(tmp))
214     continue;
215    
216     target_p = node->data;
217     break;
218     }
219     }
220     }
221 adx 30 }
222    
223 michael 3246 if (target_p)
224 adx 30 {
225 michael 4206 assert(IsMe(target_p) || IsServer(target_p) || IsClient(target_p));
226 adx 30 if (IsMe(target_p) || MyClient(target_p))
227     return HUNTED_ISME;
228    
229 michael 4206 parv[server] = target_p->id;
230     sendto_one(target_p, command, source_p->id,
231 adx 30 parv[1], parv[2], parv[3], parv[4],
232     parv[5], parv[6], parv[7], parv[8]);
233 michael 2134 return HUNTED_PASS;
234 michael 2345 }
235 adx 30
236 michael 3109 sendto_one_numeric(source_p, &me, ERR_NOSUCHSERVER, parv[server]);
237 michael 2134 return HUNTED_NOSUCH;
238 adx 30 }
239    
240     /* try_connections()
241     *
242     * inputs - void pointer which is not used
243     * output - NONE
244     * side effects -
245     * scan through configuration and try new connections.
246     * Returns the calendar time when the next call to this
247     * function should be made latest. (No harm done if this
248     * is called earlier or later...)
249     */
250     void
251     try_connections(void *unused)
252     {
253 michael 4815 dlink_node *node = NULL;
254 adx 30
255     if (GlobalSetOptions.autoconn == 0)
256     return;
257    
258 michael 4815 DLINK_FOREACH(node, server_items.head)
259 adx 30 {
260 michael 4815 struct MaskItem *conf = node->data;
261 adx 30
262 michael 1636 assert(conf->type == CONF_SERVER);
263 michael 1632
264 michael 6721 /* Also when already connecting! (update holdtimes) --SRB */
265 michael 4196 if (!conf->port || !IsConfAllowAutoConn(conf))
266 adx 30 continue;
267    
268 michael 6721 /*
269     * Skip this entry if the use of it is still on hold until
270 adx 30 * future. Otherwise handle this entry (and set it on hold
271     * until next time). Will reset only hold times, if already
272     * made one successfull connection... [this algorithm is
273     * a bit fuzzy... -- msa >;) ]
274     */
275 michael 1649 if (conf->until > CurrentTime)
276 adx 30 continue;
277    
278 michael 4028 assert(conf->class);
279 adx 30
280 michael 6390 conf->until = CurrentTime + conf->class->con_freq;
281 michael 4028
282 michael 3246 /*
283     * Found a CONNECT config with port specified, scan clients
284 adx 30 * and see if this server is already connected?
285     */
286 michael 3246 if (hash_find_server(conf->name))
287 adx 30 continue;
288    
289 michael 1632 if (conf->class->ref_count < conf->class->max_total)
290 adx 30 {
291 michael 6390 /* Move this entry to the end of the list, if not already last */
292 michael 4815 if (node->next)
293 adx 30 {
294 michael 4815 dlinkDelete(node, &server_items);
295 adx 30 dlinkAddTail(conf, &conf->node, &server_items);
296     }
297    
298     if (find_servconn_in_progress(conf->name))
299     return;
300    
301 michael 3246 /*
302     * We used to only print this if serv_connect() actually
303 adx 30 * succeeded, but since comm_tcp_connect() can call the callback
304     * immediately if there is an error, we were getting error messages
305     * in the wrong order. SO, we just print out the activated line,
306     * and let serv_connect() / serv_connect_callback() print an
307     * error afterwards if it fails.
308     * -- adrian
309     */
310     if (ConfigServerHide.hide_server_ips)
311 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
312 michael 1618 "Connection to %s activated.",
313 adx 30 conf->name);
314     else
315 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
316 michael 1618 "Connection to %s[%s] activated.",
317 michael 1632 conf->name, conf->host);
318 adx 30
319 michael 1632 serv_connect(conf, NULL);
320 adx 30 /* We connect only one at time... */
321     return;
322     }
323     }
324     }
325    
326     int
327 michael 1115 valid_servname(const char *name)
328     {
329 michael 3451 unsigned int dots = 0;
330 michael 1115 const char *p = name;
331    
332     for (; *p; ++p)
333     {
334     if (!IsServChar(*p))
335 michael 1118 return 0;
336 michael 1115
337     if (*p == '.')
338     ++dots;
339     }
340    
341 michael 3451 return dots && (p - name) <= HOSTLEN;
342 michael 1115 }
343    
344     int
345 michael 1302 check_server(const char *name, struct Client *client_p)
346 adx 30 {
347 michael 4815 dlink_node *node = NULL;
348 michael 1632 struct MaskItem *conf = NULL;
349     struct MaskItem *server_conf = NULL;
350 adx 30 int error = -1;
351    
352 michael 3246 assert(client_p);
353 adx 30
354 michael 6494 /* Loop through looking for all possible connect items that might work */
355 michael 4815 DLINK_FOREACH(node, server_items.head)
356 adx 30 {
357 michael 4815 conf = node->data;
358 adx 30
359 michael 1652 if (match(name, conf->name))
360 adx 30 continue;
361    
362     error = -3;
363    
364 michael 2345 if (!match(conf->host, client_p->host) ||
365 michael 1652 !match(conf->host, client_p->sockhost))
366 adx 30 {
367     error = -2;
368    
369 michael 4588 if (!match_conf_password(client_p->connection->password, conf))
370 michael 1414 return -2;
371 adx 30
372 michael 2228 if (!EmptyString(conf->certfp))
373 michael 2229 if (EmptyString(client_p->certfp) || strcasecmp(client_p->certfp, conf->certfp))
374 michael 2228 return -4;
375    
376 michael 1414 server_conf = conf;
377 adx 30 }
378     }
379    
380     if (server_conf == NULL)
381 michael 2182 return error;
382 adx 30
383     attach_conf(client_p, server_conf);
384    
385 michael 6494 switch (server_conf->aftype)
386 adx 30 {
387 michael 6494 case AF_INET6:
388     {
389     const struct sockaddr_in6 *v6 = (struct sockaddr_in6 *)&server_conf->addr;
390 michael 4415
391 michael 6494 if (IN6_IS_ADDR_UNSPECIFIED(&v6->sin6_addr))
392     memcpy(&server_conf->addr, &client_p->connection->ip, sizeof(struct irc_ssaddr));
393     break;
394     }
395     case AF_INET:
396 adx 30 {
397 michael 6494 const struct sockaddr_in *v4 = (struct sockaddr_in *)&server_conf->addr;
398 adx 30
399 michael 6494 if (v4->sin_addr.s_addr == INADDR_NONE)
400     memcpy(&server_conf->addr, &client_p->connection->ip, sizeof(struct irc_ssaddr));
401     break;
402 adx 30 }
403     }
404    
405 michael 2182 return 0;
406 adx 30 }
407    
408     /* add_capability()
409     *
410     * inputs - string name of CAPAB
411     * - int flag of capability
412     * output - NONE
413     * side effects - Adds given capability name and bit mask to
414     * current supported capabilities. This allows
415     * modules to dynamically add or subtract their capability.
416     */
417     void
418 michael 5796 add_capability(const char *name, unsigned int flag)
419 adx 30 {
420 michael 7032 struct Capability *cap = xcalloc(sizeof(*cap));
421 adx 30
422 michael 5796 cap->name = xstrdup(name);
423     cap->cap = flag;
424     dlinkAdd(cap, &cap->node, &server_capabilities_list);
425 adx 30 }
426    
427     /* delete_capability()
428     *
429     * inputs - string name of CAPAB
430     * output - NONE
431     * side effects - delete given capability from ones known.
432     */
433 michael 5776 void
434 michael 5796 delete_capability(const char *name)
435 adx 30 {
436 michael 4815 dlink_node *node = NULL, *node_next = NULL;
437 adx 30
438 michael 5796 DLINK_FOREACH_SAFE(node, node_next, server_capabilities_list.head)
439 adx 30 {
440 michael 4815 struct Capability *cap = node->data;
441 adx 30
442 michael 5796 if (!irccmp(cap->name, name))
443 adx 30 {
444 michael 5796 dlinkDelete(node, &server_capabilities_list);
445 michael 7032 xfree(cap->name);
446     xfree(cap);
447 adx 30 }
448     }
449     }
450    
451     /*
452     * find_capability()
453     *
454     * inputs - string name of capab to find
455     * output - 0 if not found CAPAB otherwise
456     * side effects - none
457     */
458 michael 1877 unsigned int
459 michael 5796 find_capability(const char *name)
460 adx 30 {
461 michael 4815 const dlink_node *node = NULL;
462 adx 30
463 michael 5796 DLINK_FOREACH(node, server_capabilities_list.head)
464 adx 30 {
465 michael 4815 const struct Capability *cap = node->data;
466 adx 30
467 michael 5796 if (!irccmp(cap->name, name))
468 michael 896 return cap->cap;
469 adx 30 }
470 michael 896
471     return 0;
472 adx 30 }
473    
474     /* send_capabilities()
475     *
476     * inputs - Client pointer to send to
477     * - int flag of capabilities that this server can send
478     * output - NONE
479     * side effects - send the CAPAB line to a server -orabidoo
480     *
481     */
482     void
483 michael 5796 send_capabilities(struct Client *client_p)
484 adx 30 {
485 michael 3746 char buf[IRCD_BUFSIZE] = "";
486 michael 4815 const dlink_node *node = NULL;
487 adx 30
488 michael 5796 DLINK_FOREACH(node, server_capabilities_list.head)
489 adx 30 {
490 michael 4815 const struct Capability *cap = node->data;
491 adx 30
492 michael 5796 strlcat(buf, cap->name, sizeof(buf));
493    
494     if (node->next)
495     strlcat(buf, " ", sizeof(buf));
496 adx 30 }
497    
498 michael 3746 sendto_one(client_p, "CAPAB :%s", buf);
499 adx 30 }
500    
501     /*
502     * show_capabilities - show current server capabilities
503     *
504     * inputs - pointer to a struct Client
505     * output - pointer to static string
506     * side effects - build up string representing capabilities of server listed
507     */
508     const char *
509 michael 2282 show_capabilities(const struct Client *target_p)
510 adx 30 {
511 michael 2309 static char msgbuf[IRCD_BUFSIZE] = "";
512 michael 4815 const dlink_node *node = NULL;
513 adx 30
514 michael 2309 strlcpy(msgbuf, "TS", sizeof(msgbuf));
515    
516 michael 5796 DLINK_FOREACH(node, server_capabilities_list.head)
517 adx 30 {
518 michael 4815 const struct Capability *cap = node->data;
519 adx 30
520 michael 2282 if (!IsCapable(target_p, cap->cap))
521     continue;
522    
523     strlcat(msgbuf, " ", sizeof(msgbuf));
524     strlcat(msgbuf, cap->name, sizeof(msgbuf));
525 adx 30 }
526 michael 1302
527     return msgbuf;
528 adx 30 }
529    
530     /* make_server()
531     *
532     * inputs - pointer to client struct
533     * output - pointer to struct Server
534     * side effects - add's an Server information block to a client
535     * if it was not previously allocated.
536     */
537     struct Server *
538     make_server(struct Client *client_p)
539     {
540     if (client_p->serv == NULL)
541 michael 7032 client_p->serv = xcalloc(sizeof(struct Server));
542 adx 30
543     return client_p->serv;
544     }
545    
546     /* New server connection code
547     * Based upon the stuff floating about in s_bsd.c
548     * -- adrian
549     */
550    
551     /* serv_connect() - initiate a server connection
552     *
553 michael 2345 * inputs - pointer to conf
554 adx 30 * - pointer to client doing the connect
555     * output -
556     * side effects -
557     *
558     * This code initiates a connection to a server. It first checks to make
559     * sure the given server exists. If this is the case, it creates a socket,
560     * creates a client, saves the socket information in the client, and
561     * initiates a connection to the server through comm_connect_tcp(). The
562     * completion of this goes through serv_completed_connection().
563     *
564     * We return 1 if the connection is attempted, since we don't know whether
565     * it suceeded or not, and 0 if it fails in here somewhere.
566     */
567     int
568 michael 1632 serv_connect(struct MaskItem *conf, struct Client *by)
569 adx 30 {
570 michael 3246 struct Client *client_p = NULL;
571     char buf[HOSTIPLEN + 1] = "";
572 adx 30
573     /* conversion structs */
574     struct sockaddr_in *v4;
575 michael 3246
576 michael 1632 /* Make sure conf is useful */
577 michael 3246 assert(conf);
578 adx 30
579 michael 5051 getnameinfo((const struct sockaddr *)&conf->addr, conf->addr.ss_len,
580 michael 1123 buf, sizeof(buf), NULL, 0, NI_NUMERICHOST);
581 michael 1632 ilog(LOG_TYPE_IRCD, "Connect to %s[%s] @%s", conf->name, conf->host,
582 adx 30 buf);
583    
584     /* Still processing a DNS lookup? -> exit */
585 michael 1632 if (conf->dns_pending)
586 adx 30 {
587 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
588 michael 992 "Error connecting to %s: DNS lookup for connect{} in progress.",
589     conf->name);
590 michael 3246 return 0;
591 adx 30 }
592    
593 michael 1632 if (conf->dns_failed)
594 michael 992 {
595 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
596 michael 992 "Error connecting to %s: DNS lookup for connect{} failed.",
597     conf->name);
598 michael 3246 return 0;
599 michael 992 }
600    
601 michael 6725 /*
602     * Make sure this server isn't already connected.
603     * Note: conf should ALWAYS be a valid connect {} block
604 adx 30 */
605 michael 3246 if ((client_p = hash_find_server(conf->name)))
606 michael 2345 {
607 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
608 michael 2134 "Server %s already present from %s",
609     conf->name, get_client_name(client_p, SHOW_IP));
610 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
611 michael 2134 "Server %s already present from %s",
612     conf->name, get_client_name(client_p, MASK_IP));
613 adx 30 if (by && IsClient(by) && !MyClient(by))
614 michael 3110 sendto_one_notice(by, &me, ":Server %s already present from %s",
615     conf->name, get_client_name(client_p, MASK_IP));
616 michael 2134 return 0;
617 adx 30 }
618 michael 2345
619 adx 30 /* Create a local client */
620     client_p = make_client(NULL);
621    
622     /* Copy in the server, hostname, fd */
623     strlcpy(client_p->name, conf->name, sizeof(client_p->name));
624 michael 1632 strlcpy(client_p->host, conf->host, sizeof(client_p->host));
625 adx 30
626     /* We already converted the ip once, so lets use it - stu */
627 michael 1115 strlcpy(client_p->sockhost, buf, sizeof(client_p->sockhost));
628 adx 30
629 michael 6725 /* Create a socket for the server connection */
630 michael 4588 if (comm_open(&client_p->connection->fd, conf->addr.ss.ss_family, SOCK_STREAM, 0, NULL) < 0)
631 adx 30 {
632     /* Eek, failure to create the socket */
633 michael 3335 report_error(L_ALL, "opening stream socket to %s: %s", conf->name, errno);
634    
635 adx 30 SetDead(client_p);
636 michael 3171 exit_client(client_p, "Connection failed");
637 michael 2134 return 0;
638 adx 30 }
639    
640 michael 6725 /* Server names are always guaranteed under HOSTLEN chars */
641 michael 6633 fd_note(&client_p->connection->fd, "Server: %s", client_p->name);
642 adx 30
643 michael 6725 /*
644     * Attach config entries to client here rather than in serv_connect_callback().
645     * This to avoid null pointer references.
646 adx 30 */
647 michael 1632 if (!attach_connect_block(client_p, conf->name, conf->host))
648 adx 30 {
649 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
650 michael 4677 "Host %s is not enabled for connecting: no connect {} block",
651 michael 2134 conf->name);
652 michael 2345 if (by && IsClient(by) && !MyClient(by))
653 michael 4677 sendto_one_notice(by, &me, ":Connect to host %s failed: no connect {} block", client_p->name);
654 michael 3110
655 adx 30 SetDead(client_p);
656 michael 3171 exit_client(client_p, "Connection failed");
657 michael 2134 return 0;
658 adx 30 }
659    
660 michael 6725 /*
661     * At this point we have a connection in progress and a connect {} block
662     * attached to the client, the socket info should be saved in the client
663     * and it should either be resolved or have a valid address.
664 adx 30 *
665     * The socket has been connected or connect is in progress.
666     */
667     make_server(client_p);
668    
669     if (by && IsClient(by))
670     strlcpy(client_p->serv->by, by->name, sizeof(client_p->serv->by));
671     else
672     strlcpy(client_p->serv->by, "AutoConn.", sizeof(client_p->serv->by));
673    
674     SetConnecting(client_p);
675 michael 4588 client_p->connection->aftype = conf->aftype;
676 adx 30
677     /* Now, initiate the connection */
678 michael 2345 /* XXX assume that a non 0 type means a specific bind address
679 adx 30 * for this connect.
680     */
681 michael 1632 switch (conf->aftype)
682 adx 30 {
683     case AF_INET:
684 michael 1632 v4 = (struct sockaddr_in*)&conf->bind;
685 michael 3246 if (v4->sin_addr.s_addr)
686 adx 30 {
687     struct irc_ssaddr ipn;
688     memset(&ipn, 0, sizeof(struct irc_ssaddr));
689     ipn.ss.ss_family = AF_INET;
690     ipn.ss_port = 0;
691 michael 1632 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
692 michael 4588 comm_connect_tcp(&client_p->connection->fd, conf->host, conf->port,
693 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
694 michael 2134 serv_connect_callback, client_p, conf->aftype,
695     CONNECTTIMEOUT);
696 adx 30 }
697 michael 4340 else if (ConfigServerInfo.specific_ipv4_vhost)
698 adx 30 {
699     struct irc_ssaddr ipn;
700     memset(&ipn, 0, sizeof(struct irc_ssaddr));
701     ipn.ss.ss_family = AF_INET;
702     ipn.ss_port = 0;
703 michael 4340 memcpy(&ipn, &ConfigServerInfo.ip, sizeof(struct irc_ssaddr));
704 michael 4588 comm_connect_tcp(&client_p->connection->fd, conf->host, conf->port,
705 adx 30 (struct sockaddr *)&ipn, ipn.ss_len,
706 michael 1632 serv_connect_callback, client_p, conf->aftype,
707 michael 2134 CONNECTTIMEOUT);
708 adx 30 }
709     else
710 michael 4588 comm_connect_tcp(&client_p->connection->fd, conf->host, conf->port,
711 michael 2345 NULL, 0, serv_connect_callback, client_p, conf->aftype,
712 adx 30 CONNECTTIMEOUT);
713     break;
714     case AF_INET6:
715     {
716 michael 2182 struct irc_ssaddr ipn;
717     struct sockaddr_in6 *v6;
718     struct sockaddr_in6 *v6conf;
719 adx 30
720 michael 2182 memset(&ipn, 0, sizeof(struct irc_ssaddr));
721     v6conf = (struct sockaddr_in6 *)&conf->bind;
722     v6 = (struct sockaddr_in6 *)&ipn;
723 adx 30
724 michael 3246 if (memcmp(&v6conf->sin6_addr, &v6->sin6_addr, sizeof(struct in6_addr)))
725 adx 30 {
726 michael 2182 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
727     ipn.ss.ss_family = AF_INET6;
728     ipn.ss_port = 0;
729 michael 4588 comm_connect_tcp(&client_p->connection->fd,
730 michael 2182 conf->host, conf->port,
731 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
732 michael 2182 serv_connect_callback, client_p,
733     conf->aftype, CONNECTTIMEOUT);
734     }
735 michael 4340 else if (ConfigServerInfo.specific_ipv6_vhost)
736 michael 2182 {
737 michael 4340 memcpy(&ipn, &ConfigServerInfo.ip6, sizeof(struct irc_ssaddr));
738 michael 2182 ipn.ss.ss_family = AF_INET6;
739     ipn.ss_port = 0;
740 michael 4588 comm_connect_tcp(&client_p->connection->fd,
741 michael 2182 conf->host, conf->port,
742     (struct sockaddr *)&ipn, ipn.ss_len,
743     serv_connect_callback, client_p,
744     conf->aftype, CONNECTTIMEOUT);
745     }
746     else
747 michael 4588 comm_connect_tcp(&client_p->connection->fd,
748 michael 2345 conf->host, conf->port,
749 michael 2182 NULL, 0, serv_connect_callback, client_p,
750     conf->aftype, CONNECTTIMEOUT);
751 adx 30 }
752     }
753 michael 4415
754 michael 2182 return 1;
755 adx 30 }
756    
757 michael 1303 static void
758     finish_ssl_server_handshake(struct Client *client_p)
759     {
760 michael 1632 struct MaskItem *conf = NULL;
761 michael 1303
762 michael 4588 conf = find_conf_name(&client_p->connection->confs,
763 michael 1632 client_p->name, CONF_SERVER);
764 michael 1303 if (conf == NULL)
765     {
766 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
767 michael 6428 "Lost connect{} block for %s", get_client_name(client_p, SHOW_IP));
768 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
769 michael 1303 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
770    
771 michael 3171 exit_client(client_p, "Lost connect{} block");
772 michael 1303 return;
773     }
774    
775 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
776 michael 1303
777 michael 5796 send_capabilities(client_p);
778 michael 1303
779     sendto_one(client_p, "SERVER %s 1 :%s%s",
780     me.name, ConfigServerHide.hidden ? "(H) " : "",
781     me.info);
782    
783 michael 6428 /*
784     * If we've been marked dead because a send failed, just exit
785 michael 1303 * here now and save everyone the trouble of us ever existing.
786     */
787     if (IsDead(client_p))
788     {
789 michael 6428 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
790     "%s went dead during handshake", get_client_name(client_p, SHOW_IP));
791     sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
792     "%s went dead during handshake", get_client_name(client_p, MASK_IP));
793     return;
794 michael 1303 }
795    
796     /* don't move to serv_list yet -- we haven't sent a burst! */
797     /* If we get here, we're ok, so lets start reading some data */
798 michael 4588 comm_setselect(&client_p->connection->fd, COMM_SELECT_READ, read_packet, client_p, 0);
799 michael 1303 }
800    
801     static void
802 michael 4461 ssl_server_handshake(fde_t *fd, void *data)
803 michael 1303 {
804 michael 4461 struct Client *client_p = data;
805 michael 7105 const char *sslerr = NULL;
806 michael 1303
807 michael 7105 tls_handshake_status_t ret = tls_handshake(&client_p->connection->fd.ssl, TLS_ROLE_CLIENT, &sslerr);
808     if (ret != TLS_HANDSHAKE_DONE)
809 michael 1303 {
810 michael 4737 if ((CurrentTime - client_p->connection->firsttime) > CONNECTTIMEOUT)
811 michael 4732 {
812 michael 7105 exit_client(client_p, "Timeout during TLS handshake");
813 michael 4732 return;
814     }
815    
816 michael 7105 switch (ret)
817 michael 1303 {
818 michael 7105 case TLS_HANDSHAKE_WANT_WRITE:
819 michael 4588 comm_setselect(&client_p->connection->fd, COMM_SELECT_WRITE,
820 michael 4737 ssl_server_handshake, client_p, CONNECTTIMEOUT);
821 michael 1303 return;
822 michael 7105 case TLS_HANDSHAKE_WANT_READ:
823 michael 4588 comm_setselect(&client_p->connection->fd, COMM_SELECT_READ,
824 michael 4737 ssl_server_handshake, client_p, CONNECTTIMEOUT);
825 michael 1303 return;
826     default:
827 michael 1308 {
828 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
829 michael 1308 "Error connecting to %s: %s", client_p->name,
830 michael 7105 sslerr ? sslerr : "unknown TLS error");
831     exit_client(client_p, "Error during TLS handshake");
832 michael 1303 return;
833 michael 1308 }
834 michael 1303 }
835     }
836    
837 michael 4732 comm_settimeout(&client_p->connection->fd, 0, NULL, NULL);
838    
839 michael 7142 if (!tls_verify_cert(&client_p->connection->fd.ssl, ConfigServerInfo.message_digest_algorithm, &client_p->certfp))
840     ilog(LOG_TYPE_IRCD, "Server %s!%s@%s gave bad TLS client certificate",
841     client_p->name, client_p->username, client_p->host);
842 michael 2463
843 michael 1303 finish_ssl_server_handshake(client_p);
844     }
845    
846     static void
847 michael 6397 ssl_connect_init(struct Client *client_p, const struct MaskItem *conf, fde_t *fd)
848 michael 1303 {
849 michael 7105 if (!tls_new(&client_p->connection->fd.ssl, fd->fd, TLS_ROLE_CLIENT))
850 michael 1303 {
851     SetDead(client_p);
852 michael 7105 exit_client(client_p, "TLS context initialization failed");
853 michael 1303 return;
854     }
855    
856 michael 1632 if (!EmptyString(conf->cipher_list))
857 michael 7105 tls_set_ciphers(&client_p->connection->fd.ssl, conf->cipher_list);
858 michael 1306
859     ssl_server_handshake(NULL, client_p);
860 michael 1303 }
861    
862 adx 30 /* serv_connect_callback() - complete a server connection.
863 michael 2345 *
864 adx 30 * This routine is called after the server connection attempt has
865     * completed. If unsucessful, an error is sent to ops and the client
866     * is closed. If sucessful, it goes through the initialisation/check
867     * procedures, the capabilities are sent, and the socket is then
868     * marked for reading.
869     */
870     static void
871     serv_connect_callback(fde_t *fd, int status, void *data)
872     {
873 michael 6397 struct Client *const client_p = data;
874     const struct MaskItem *conf = NULL;
875 adx 30
876 michael 4298 /* First, make sure it's a real client! */
877 michael 3246 assert(client_p);
878 michael 4588 assert(&client_p->connection->fd == fd);
879 adx 30
880     /* Next, for backward purposes, record the ip of the server */
881 michael 4588 memcpy(&client_p->connection->ip, &fd->connect.hostaddr,
882 adx 30 sizeof(struct irc_ssaddr));
883 michael 3246
884 adx 30 /* Check the status */
885     if (status != COMM_OK)
886     {
887 michael 6428 /* We have an error, so report it and quit */
888     sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
889     "Error connecting to %s: %s",
890     get_client_name(client_p, SHOW_IP), comm_errstr(status));
891     sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
892     "Error connecting to %s: %s",
893     get_client_name(client_p, MASK_IP), comm_errstr(status));
894    
895     /*
896     * If a fd goes bad, call dead_link() the socket is no
897     * longer valid for reading or writing.
898 adx 30 */
899 michael 6428 dead_link_on_write(client_p, 0);
900     return;
901 adx 30 }
902    
903     /* COMM_OK, so continue the connection procedure */
904     /* Get the C/N lines */
905 michael 4588 conf = find_conf_name(&client_p->connection->confs,
906 michael 2134 client_p->name, CONF_SERVER);
907 adx 30 if (conf == NULL)
908     {
909 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
910 michael 6428 "Lost connect{} block for %s", get_client_name(client_p, SHOW_IP));
911 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
912 michael 2134 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
913 adx 30
914 michael 3171 exit_client(client_p, "Lost connect{} block");
915 adx 30 return;
916     }
917    
918     /* Next, send the initial handshake */
919     SetHandshake(client_p);
920    
921 michael 7271 if (tls_is_initialized() && IsConfSSL(conf))
922 michael 1303 {
923 michael 1632 ssl_connect_init(client_p, conf, fd);
924 michael 1303 return;
925     }
926 adx 30
927 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
928 adx 30
929 michael 5796 send_capabilities(client_p);
930 adx 30
931 michael 2134 sendto_one(client_p, "SERVER %s 1 :%s%s", me.name,
932     ConfigServerHide.hidden ? "(H) " : "", me.info);
933 adx 30
934 michael 6428 /*
935     * If we've been marked dead because a send failed, just exit
936 adx 30 * here now and save everyone the trouble of us ever existing.
937     */
938 michael 2345 if (IsDead(client_p))
939 adx 30 {
940 michael 6428 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
941     "%s went dead during handshake", get_client_name(client_p, SHOW_IP));
942     sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
943     "%s went dead during handshake", get_client_name(client_p, MASK_IP));
944     return;
945 adx 30 }
946    
947     /* don't move to serv_list yet -- we haven't sent a burst! */
948     /* If we get here, we're ok, so lets start reading some data */
949     comm_setselect(fd, COMM_SELECT_READ, read_packet, client_p, 0);
950     }
951    
952     struct Client *
953     find_servconn_in_progress(const char *name)
954     {
955     dlink_node *ptr;
956     struct Client *cptr;
957    
958     DLINK_FOREACH(ptr, unknown_list.head)
959     {
960     cptr = ptr->data;
961    
962     if (cptr && cptr->name[0])
963 michael 1652 if (!match(name, cptr->name))
964 adx 30 return cptr;
965     }
966 michael 2345
967 adx 30 return NULL;
968     }

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision