ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/server.c
Revision: 7348
Committed: Sun Feb 21 11:44:35 2016 UTC (9 years, 6 months ago) by michael
Content type: text/x-csrc
File size: 28175 byte(s)
Log Message:
- Remove unused header includes

File Contents

# User Rev Content
1 adx 30 /*
2 michael 2916 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3 adx 30 *
4 michael 7006 * Copyright (c) 1997-2016 ircd-hybrid development team
5 adx 30 *
6     * This program is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * This program is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with this program; if not, write to the Free Software
18 michael 4565 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
19 adx 30 * USA
20     */
21    
22 michael 2916 /*! \file s_serv.c
23     * \brief Server related functions.
24     * \version $Id$
25     */
26    
27 adx 30 #include "stdinc.h"
28 michael 1011 #include "list.h"
29 adx 30 #include "client.h"
30     #include "event.h"
31     #include "hash.h"
32     #include "irc_string.h"
33     #include "ircd.h"
34     #include "ircd_defs.h"
35     #include "s_bsd.h"
36     #include "packet.h"
37 michael 1309 #include "conf.h"
38 michael 3347 #include "server.h"
39 michael 1309 #include "log.h"
40 adx 30 #include "send.h"
41     #include "memory.h"
42 michael 1243 #include "parse.h"
43 adx 30
44 michael 6527
45 michael 2156 dlink_list flatten_links;
46 michael 5796 static dlink_list server_capabilities_list;
47 michael 4464 static void serv_connect_callback(fde_t *, int, void *);
48 adx 30
49    
50     /*
51     * write_links_file
52     *
53     * inputs - void pointer which is not used
54     * output - NONE
55     * side effects - called from an event, write out list of linked servers
56     * but in no particular order.
57     */
58     void
59 michael 4439 write_links_file(void *unused)
60 adx 30 {
61 michael 2156 FILE *file = NULL;
62 michael 4815 dlink_node *node = NULL, *node_next = NULL;
63 michael 3215 char buff[IRCD_BUFSIZE] = "";
64 adx 30
65 michael 6599 if (EmptyString(ConfigServerHide.flatten_links_file))
66 adx 30 return;
67    
68 michael 6599 if ((file = fopen(ConfigServerHide.flatten_links_file, "w")) == NULL)
69 michael 6602 {
70     ilog(LOG_TYPE_IRCD, "Couldn't open \"%s\": %s", ConfigServerHide.flatten_links_file,
71     strerror(errno));
72 michael 6599 return;
73 michael 6602 }
74 michael 6599
75 michael 4815 DLINK_FOREACH_SAFE(node, node_next, flatten_links.head)
76 adx 30 {
77 michael 4815 dlinkDelete(node, &flatten_links);
78 michael 7032 xfree(node->data);
79 michael 4815 free_dlink_node(node);
80 adx 30 }
81    
82 michael 4815 DLINK_FOREACH(node, global_server_list.head)
83 adx 30 {
84 michael 4815 const struct Client *target_p = node->data;
85 adx 30
86 michael 2156 /*
87     * Skip hidden servers, aswell as ourselves, since we already send
88     * ourselves in /links
89     */
90     if (IsHidden(target_p) || IsMe(target_p))
91 adx 30 continue;
92    
93 michael 1851 if (HasFlag(target_p, FLAGS_SERVICE) && ConfigServerHide.hide_services)
94     continue;
95    
96 michael 1545 /*
97     * Attempt to format the file in such a way it follows the usual links output
98 adx 30 * ie "servername uplink :hops info"
99     * Mostly for aesthetic reasons - makes it look pretty in mIRC ;)
100     * - madmax
101     */
102 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s", target_p->name,
103     me.name, target_p->info);
104 michael 2212 dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
105 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s\n", target_p->name,
106     me.name, target_p->info);
107 adx 30
108 michael 1325 fputs(buff, file);
109 adx 30 }
110    
111 michael 1325 fclose(file);
112 adx 30 }
113    
114 michael 2216 void
115     read_links_file(void)
116     {
117     FILE *file = NULL;
118     char *p = NULL;
119 michael 3215 char buff[IRCD_BUFSIZE] = "";
120 michael 2216
121 michael 6599 if (EmptyString(ConfigServerHide.flatten_links_file))
122 michael 2216 return;
123    
124 michael 6599 if ((file = fopen(ConfigServerHide.flatten_links_file, "r")) == NULL)
125 michael 6602 {
126     ilog(LOG_TYPE_IRCD, "Couldn't open \"%s\": %s", ConfigServerHide.flatten_links_file,
127     strerror(errno));
128 michael 6599 return;
129 michael 6602 }
130 michael 6599
131 michael 2216 while (fgets(buff, sizeof(buff), file))
132     {
133 michael 3246 if ((p = strchr(buff, '\n')))
134 michael 2216 *p = '\0';
135    
136     dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
137     }
138    
139     fclose(file);
140     }
141    
142 adx 30 /* hunt_server()
143     * Do the basic thing in delivering the message (command)
144     * across the relays to the specific server (server) for
145     * actions.
146     *
147     * Note: The command is a format string and *MUST* be
148     * of prefixed style (e.g. ":%s COMMAND %s ...").
149     * Command can have only max 8 parameters.
150     *
151     * server parv[server] is the parameter identifying the
152     * target server.
153     *
154     * *WARNING*
155     * parv[server] is replaced with the pointer to the
156     * real servername from the matched client (I'm lazy
157     * now --msa).
158     *
159     * returns: (see #defines)
160     */
161     int
162 michael 3156 hunt_server(struct Client *source_p, const char *command,
163 michael 1857 const int server, const int parc, char *parv[])
164 adx 30 {
165     struct Client *target_p = NULL;
166 michael 4815 dlink_node *node = NULL;
167 adx 30
168 michael 1344 /* Assume it's me, if no server */
169     if (parc <= server || EmptyString(parv[server]))
170     return HUNTED_ISME;
171 adx 30
172 michael 4206 if ((target_p = find_person(source_p, parv[server])) == NULL)
173     target_p = hash_find_server(parv[server]);
174 michael 1344
175 michael 4206 /*
176     * These are to pickup matches that would cause the following
177 adx 30 * message to go in the wrong direction while doing quick fast
178     * non-matching lookups.
179     */
180     if (target_p)
181     if (target_p->from == source_p->from && !MyConnect(target_p))
182     target_p = NULL;
183    
184 michael 4206 if (!target_p && has_wildcards(parv[server]))
185 adx 30 {
186 michael 6060 DLINK_FOREACH(node, global_server_list.head)
187 adx 30 {
188 michael 4815 struct Client *tmp = node->data;
189 michael 4206
190 michael 6060 assert(IsMe(tmp) || IsServer(tmp));
191 michael 4206 if (!match(parv[server], tmp->name))
192 adx 30 {
193 michael 4206 if (tmp->from == source_p->from && !MyConnect(tmp))
194     continue;
195 michael 4210
196 michael 4815 target_p = node->data;
197 michael 4210 break;
198 adx 30 }
199     }
200 michael 6060
201     if (!target_p)
202     {
203     DLINK_FOREACH(node, global_client_list.head)
204     {
205     struct Client *tmp = node->data;
206    
207     assert(IsMe(tmp) || IsServer(tmp) || IsClient(tmp));
208     if (!match(parv[server], tmp->name))
209     {
210     if (tmp->from == source_p->from && !MyConnect(tmp))
211     continue;
212    
213     target_p = node->data;
214     break;
215     }
216     }
217     }
218 adx 30 }
219    
220 michael 3246 if (target_p)
221 adx 30 {
222 michael 4206 assert(IsMe(target_p) || IsServer(target_p) || IsClient(target_p));
223 adx 30 if (IsMe(target_p) || MyClient(target_p))
224     return HUNTED_ISME;
225    
226 michael 4206 parv[server] = target_p->id;
227     sendto_one(target_p, command, source_p->id,
228 adx 30 parv[1], parv[2], parv[3], parv[4],
229     parv[5], parv[6], parv[7], parv[8]);
230 michael 2134 return HUNTED_PASS;
231 michael 2345 }
232 adx 30
233 michael 3109 sendto_one_numeric(source_p, &me, ERR_NOSUCHSERVER, parv[server]);
234 michael 2134 return HUNTED_NOSUCH;
235 adx 30 }
236    
237     /* try_connections()
238     *
239     * inputs - void pointer which is not used
240     * output - NONE
241     * side effects -
242     * scan through configuration and try new connections.
243     * Returns the calendar time when the next call to this
244     * function should be made latest. (No harm done if this
245     * is called earlier or later...)
246     */
247     void
248     try_connections(void *unused)
249     {
250 michael 4815 dlink_node *node = NULL;
251 adx 30
252     if (GlobalSetOptions.autoconn == 0)
253     return;
254    
255 michael 4815 DLINK_FOREACH(node, server_items.head)
256 adx 30 {
257 michael 4815 struct MaskItem *conf = node->data;
258 adx 30
259 michael 1636 assert(conf->type == CONF_SERVER);
260 michael 1632
261 michael 6721 /* Also when already connecting! (update holdtimes) --SRB */
262 michael 4196 if (!conf->port || !IsConfAllowAutoConn(conf))
263 adx 30 continue;
264    
265 michael 6721 /*
266     * Skip this entry if the use of it is still on hold until
267 adx 30 * future. Otherwise handle this entry (and set it on hold
268     * until next time). Will reset only hold times, if already
269     * made one successfull connection... [this algorithm is
270     * a bit fuzzy... -- msa >;) ]
271     */
272 michael 1649 if (conf->until > CurrentTime)
273 adx 30 continue;
274    
275 michael 4028 assert(conf->class);
276 adx 30
277 michael 6390 conf->until = CurrentTime + conf->class->con_freq;
278 michael 4028
279 michael 3246 /*
280     * Found a CONNECT config with port specified, scan clients
281 adx 30 * and see if this server is already connected?
282     */
283 michael 3246 if (hash_find_server(conf->name))
284 adx 30 continue;
285    
286 michael 1632 if (conf->class->ref_count < conf->class->max_total)
287 adx 30 {
288 michael 6390 /* Move this entry to the end of the list, if not already last */
289 michael 4815 if (node->next)
290 adx 30 {
291 michael 4815 dlinkDelete(node, &server_items);
292 adx 30 dlinkAddTail(conf, &conf->node, &server_items);
293     }
294    
295     if (find_servconn_in_progress(conf->name))
296     return;
297    
298 michael 3246 /*
299     * We used to only print this if serv_connect() actually
300 adx 30 * succeeded, but since comm_tcp_connect() can call the callback
301     * immediately if there is an error, we were getting error messages
302     * in the wrong order. SO, we just print out the activated line,
303     * and let serv_connect() / serv_connect_callback() print an
304     * error afterwards if it fails.
305     * -- adrian
306     */
307     if (ConfigServerHide.hide_server_ips)
308 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
309 michael 1618 "Connection to %s activated.",
310 adx 30 conf->name);
311     else
312 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
313 michael 1618 "Connection to %s[%s] activated.",
314 michael 1632 conf->name, conf->host);
315 adx 30
316 michael 1632 serv_connect(conf, NULL);
317 adx 30 /* We connect only one at time... */
318     return;
319     }
320     }
321     }
322    
323     int
324 michael 1115 valid_servname(const char *name)
325     {
326 michael 3451 unsigned int dots = 0;
327 michael 1115 const char *p = name;
328    
329     for (; *p; ++p)
330     {
331     if (!IsServChar(*p))
332 michael 1118 return 0;
333 michael 1115
334     if (*p == '.')
335     ++dots;
336     }
337    
338 michael 3451 return dots && (p - name) <= HOSTLEN;
339 michael 1115 }
340    
341     int
342 michael 1302 check_server(const char *name, struct Client *client_p)
343 adx 30 {
344 michael 4815 dlink_node *node = NULL;
345 michael 1632 struct MaskItem *conf = NULL;
346     struct MaskItem *server_conf = NULL;
347 adx 30 int error = -1;
348    
349 michael 3246 assert(client_p);
350 adx 30
351 michael 6494 /* Loop through looking for all possible connect items that might work */
352 michael 4815 DLINK_FOREACH(node, server_items.head)
353 adx 30 {
354 michael 4815 conf = node->data;
355 adx 30
356 michael 1652 if (match(name, conf->name))
357 adx 30 continue;
358    
359     error = -3;
360    
361 michael 2345 if (!match(conf->host, client_p->host) ||
362 michael 1652 !match(conf->host, client_p->sockhost))
363 adx 30 {
364     error = -2;
365    
366 michael 4588 if (!match_conf_password(client_p->connection->password, conf))
367 michael 1414 return -2;
368 adx 30
369 michael 2228 if (!EmptyString(conf->certfp))
370 michael 2229 if (EmptyString(client_p->certfp) || strcasecmp(client_p->certfp, conf->certfp))
371 michael 2228 return -4;
372    
373 michael 1414 server_conf = conf;
374 adx 30 }
375     }
376    
377     if (server_conf == NULL)
378 michael 2182 return error;
379 adx 30
380     attach_conf(client_p, server_conf);
381    
382 michael 6494 switch (server_conf->aftype)
383 adx 30 {
384 michael 6494 case AF_INET6:
385     {
386     const struct sockaddr_in6 *v6 = (struct sockaddr_in6 *)&server_conf->addr;
387 michael 4415
388 michael 6494 if (IN6_IS_ADDR_UNSPECIFIED(&v6->sin6_addr))
389     memcpy(&server_conf->addr, &client_p->connection->ip, sizeof(struct irc_ssaddr));
390     break;
391     }
392     case AF_INET:
393 adx 30 {
394 michael 6494 const struct sockaddr_in *v4 = (struct sockaddr_in *)&server_conf->addr;
395 adx 30
396 michael 6494 if (v4->sin_addr.s_addr == INADDR_NONE)
397     memcpy(&server_conf->addr, &client_p->connection->ip, sizeof(struct irc_ssaddr));
398     break;
399 adx 30 }
400     }
401    
402 michael 2182 return 0;
403 adx 30 }
404    
405     /* add_capability()
406     *
407     * inputs - string name of CAPAB
408     * - int flag of capability
409     * output - NONE
410     * side effects - Adds given capability name and bit mask to
411     * current supported capabilities. This allows
412     * modules to dynamically add or subtract their capability.
413     */
414     void
415 michael 5796 add_capability(const char *name, unsigned int flag)
416 adx 30 {
417 michael 7032 struct Capability *cap = xcalloc(sizeof(*cap));
418 adx 30
419 michael 5796 cap->name = xstrdup(name);
420     cap->cap = flag;
421     dlinkAdd(cap, &cap->node, &server_capabilities_list);
422 adx 30 }
423    
424     /* delete_capability()
425     *
426     * inputs - string name of CAPAB
427     * output - NONE
428     * side effects - delete given capability from ones known.
429     */
430 michael 5776 void
431 michael 5796 delete_capability(const char *name)
432 adx 30 {
433 michael 4815 dlink_node *node = NULL, *node_next = NULL;
434 adx 30
435 michael 5796 DLINK_FOREACH_SAFE(node, node_next, server_capabilities_list.head)
436 adx 30 {
437 michael 4815 struct Capability *cap = node->data;
438 adx 30
439 michael 5796 if (!irccmp(cap->name, name))
440 adx 30 {
441 michael 5796 dlinkDelete(node, &server_capabilities_list);
442 michael 7032 xfree(cap->name);
443     xfree(cap);
444 adx 30 }
445     }
446     }
447    
448     /*
449     * find_capability()
450     *
451     * inputs - string name of capab to find
452     * output - 0 if not found CAPAB otherwise
453     * side effects - none
454     */
455 michael 1877 unsigned int
456 michael 5796 find_capability(const char *name)
457 adx 30 {
458 michael 4815 const dlink_node *node = NULL;
459 adx 30
460 michael 5796 DLINK_FOREACH(node, server_capabilities_list.head)
461 adx 30 {
462 michael 4815 const struct Capability *cap = node->data;
463 adx 30
464 michael 5796 if (!irccmp(cap->name, name))
465 michael 896 return cap->cap;
466 adx 30 }
467 michael 896
468     return 0;
469 adx 30 }
470    
471     /* send_capabilities()
472     *
473     * inputs - Client pointer to send to
474     * - int flag of capabilities that this server can send
475     * output - NONE
476     * side effects - send the CAPAB line to a server -orabidoo
477     *
478     */
479     void
480 michael 5796 send_capabilities(struct Client *client_p)
481 adx 30 {
482 michael 3746 char buf[IRCD_BUFSIZE] = "";
483 michael 4815 const dlink_node *node = NULL;
484 adx 30
485 michael 5796 DLINK_FOREACH(node, server_capabilities_list.head)
486 adx 30 {
487 michael 4815 const struct Capability *cap = node->data;
488 adx 30
489 michael 5796 strlcat(buf, cap->name, sizeof(buf));
490    
491     if (node->next)
492     strlcat(buf, " ", sizeof(buf));
493 adx 30 }
494    
495 michael 3746 sendto_one(client_p, "CAPAB :%s", buf);
496 adx 30 }
497    
498     /*
499     * show_capabilities - show current server capabilities
500     *
501     * inputs - pointer to a struct Client
502     * output - pointer to static string
503     * side effects - build up string representing capabilities of server listed
504     */
505     const char *
506 michael 2282 show_capabilities(const struct Client *target_p)
507 adx 30 {
508 michael 2309 static char msgbuf[IRCD_BUFSIZE] = "";
509 michael 4815 const dlink_node *node = NULL;
510 adx 30
511 michael 2309 strlcpy(msgbuf, "TS", sizeof(msgbuf));
512    
513 michael 5796 DLINK_FOREACH(node, server_capabilities_list.head)
514 adx 30 {
515 michael 4815 const struct Capability *cap = node->data;
516 adx 30
517 michael 2282 if (!IsCapable(target_p, cap->cap))
518     continue;
519    
520     strlcat(msgbuf, " ", sizeof(msgbuf));
521     strlcat(msgbuf, cap->name, sizeof(msgbuf));
522 adx 30 }
523 michael 1302
524     return msgbuf;
525 adx 30 }
526    
527     /* make_server()
528     *
529     * inputs - pointer to client struct
530     * output - pointer to struct Server
531     * side effects - add's an Server information block to a client
532     * if it was not previously allocated.
533     */
534     struct Server *
535     make_server(struct Client *client_p)
536     {
537     if (client_p->serv == NULL)
538 michael 7032 client_p->serv = xcalloc(sizeof(struct Server));
539 adx 30
540     return client_p->serv;
541     }
542    
543     /* New server connection code
544     * Based upon the stuff floating about in s_bsd.c
545     * -- adrian
546     */
547    
548     /* serv_connect() - initiate a server connection
549     *
550 michael 2345 * inputs - pointer to conf
551 adx 30 * - pointer to client doing the connect
552     * output -
553     * side effects -
554     *
555     * This code initiates a connection to a server. It first checks to make
556     * sure the given server exists. If this is the case, it creates a socket,
557     * creates a client, saves the socket information in the client, and
558     * initiates a connection to the server through comm_connect_tcp(). The
559     * completion of this goes through serv_completed_connection().
560     *
561     * We return 1 if the connection is attempted, since we don't know whether
562     * it suceeded or not, and 0 if it fails in here somewhere.
563     */
564     int
565 michael 1632 serv_connect(struct MaskItem *conf, struct Client *by)
566 adx 30 {
567 michael 3246 struct Client *client_p = NULL;
568     char buf[HOSTIPLEN + 1] = "";
569 adx 30
570     /* conversion structs */
571     struct sockaddr_in *v4;
572 michael 3246
573 michael 1632 /* Make sure conf is useful */
574 michael 3246 assert(conf);
575 adx 30
576 michael 5051 getnameinfo((const struct sockaddr *)&conf->addr, conf->addr.ss_len,
577 michael 1123 buf, sizeof(buf), NULL, 0, NI_NUMERICHOST);
578 michael 1632 ilog(LOG_TYPE_IRCD, "Connect to %s[%s] @%s", conf->name, conf->host,
579 adx 30 buf);
580    
581     /* Still processing a DNS lookup? -> exit */
582 michael 1632 if (conf->dns_pending)
583 adx 30 {
584 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
585 michael 992 "Error connecting to %s: DNS lookup for connect{} in progress.",
586     conf->name);
587 michael 3246 return 0;
588 adx 30 }
589    
590 michael 1632 if (conf->dns_failed)
591 michael 992 {
592 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
593 michael 992 "Error connecting to %s: DNS lookup for connect{} failed.",
594     conf->name);
595 michael 3246 return 0;
596 michael 992 }
597    
598 michael 6725 /*
599     * Make sure this server isn't already connected.
600     * Note: conf should ALWAYS be a valid connect {} block
601 adx 30 */
602 michael 3246 if ((client_p = hash_find_server(conf->name)))
603 michael 2345 {
604 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
605 michael 2134 "Server %s already present from %s",
606     conf->name, get_client_name(client_p, SHOW_IP));
607 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
608 michael 2134 "Server %s already present from %s",
609     conf->name, get_client_name(client_p, MASK_IP));
610 adx 30 if (by && IsClient(by) && !MyClient(by))
611 michael 3110 sendto_one_notice(by, &me, ":Server %s already present from %s",
612     conf->name, get_client_name(client_p, MASK_IP));
613 michael 2134 return 0;
614 adx 30 }
615 michael 2345
616 adx 30 /* Create a local client */
617     client_p = make_client(NULL);
618    
619     /* Copy in the server, hostname, fd */
620     strlcpy(client_p->name, conf->name, sizeof(client_p->name));
621 michael 1632 strlcpy(client_p->host, conf->host, sizeof(client_p->host));
622 adx 30
623     /* We already converted the ip once, so lets use it - stu */
624 michael 1115 strlcpy(client_p->sockhost, buf, sizeof(client_p->sockhost));
625 adx 30
626 michael 6725 /* Create a socket for the server connection */
627 michael 4588 if (comm_open(&client_p->connection->fd, conf->addr.ss.ss_family, SOCK_STREAM, 0, NULL) < 0)
628 adx 30 {
629     /* Eek, failure to create the socket */
630 michael 3335 report_error(L_ALL, "opening stream socket to %s: %s", conf->name, errno);
631    
632 adx 30 SetDead(client_p);
633 michael 3171 exit_client(client_p, "Connection failed");
634 michael 2134 return 0;
635 adx 30 }
636    
637 michael 6725 /* Server names are always guaranteed under HOSTLEN chars */
638 michael 6633 fd_note(&client_p->connection->fd, "Server: %s", client_p->name);
639 adx 30
640 michael 6725 /*
641     * Attach config entries to client here rather than in serv_connect_callback().
642     * This to avoid null pointer references.
643 adx 30 */
644 michael 1632 if (!attach_connect_block(client_p, conf->name, conf->host))
645 adx 30 {
646 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
647 michael 4677 "Host %s is not enabled for connecting: no connect {} block",
648 michael 2134 conf->name);
649 michael 2345 if (by && IsClient(by) && !MyClient(by))
650 michael 4677 sendto_one_notice(by, &me, ":Connect to host %s failed: no connect {} block", client_p->name);
651 michael 3110
652 adx 30 SetDead(client_p);
653 michael 3171 exit_client(client_p, "Connection failed");
654 michael 2134 return 0;
655 adx 30 }
656    
657 michael 6725 /*
658     * At this point we have a connection in progress and a connect {} block
659     * attached to the client, the socket info should be saved in the client
660     * and it should either be resolved or have a valid address.
661 adx 30 *
662     * The socket has been connected or connect is in progress.
663     */
664     make_server(client_p);
665    
666     if (by && IsClient(by))
667     strlcpy(client_p->serv->by, by->name, sizeof(client_p->serv->by));
668     else
669     strlcpy(client_p->serv->by, "AutoConn.", sizeof(client_p->serv->by));
670    
671     SetConnecting(client_p);
672 michael 4588 client_p->connection->aftype = conf->aftype;
673 adx 30
674     /* Now, initiate the connection */
675 michael 2345 /* XXX assume that a non 0 type means a specific bind address
676 adx 30 * for this connect.
677     */
678 michael 1632 switch (conf->aftype)
679 adx 30 {
680     case AF_INET:
681 michael 1632 v4 = (struct sockaddr_in*)&conf->bind;
682 michael 3246 if (v4->sin_addr.s_addr)
683 adx 30 {
684     struct irc_ssaddr ipn;
685     memset(&ipn, 0, sizeof(struct irc_ssaddr));
686     ipn.ss.ss_family = AF_INET;
687     ipn.ss_port = 0;
688 michael 1632 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
689 michael 4588 comm_connect_tcp(&client_p->connection->fd, conf->host, conf->port,
690 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
691 michael 2134 serv_connect_callback, client_p, conf->aftype,
692     CONNECTTIMEOUT);
693 adx 30 }
694 michael 4340 else if (ConfigServerInfo.specific_ipv4_vhost)
695 adx 30 {
696     struct irc_ssaddr ipn;
697     memset(&ipn, 0, sizeof(struct irc_ssaddr));
698     ipn.ss.ss_family = AF_INET;
699     ipn.ss_port = 0;
700 michael 4340 memcpy(&ipn, &ConfigServerInfo.ip, sizeof(struct irc_ssaddr));
701 michael 4588 comm_connect_tcp(&client_p->connection->fd, conf->host, conf->port,
702 adx 30 (struct sockaddr *)&ipn, ipn.ss_len,
703 michael 1632 serv_connect_callback, client_p, conf->aftype,
704 michael 2134 CONNECTTIMEOUT);
705 adx 30 }
706     else
707 michael 4588 comm_connect_tcp(&client_p->connection->fd, conf->host, conf->port,
708 michael 2345 NULL, 0, serv_connect_callback, client_p, conf->aftype,
709 adx 30 CONNECTTIMEOUT);
710     break;
711     case AF_INET6:
712     {
713 michael 2182 struct irc_ssaddr ipn;
714     struct sockaddr_in6 *v6;
715     struct sockaddr_in6 *v6conf;
716 adx 30
717 michael 2182 memset(&ipn, 0, sizeof(struct irc_ssaddr));
718     v6conf = (struct sockaddr_in6 *)&conf->bind;
719     v6 = (struct sockaddr_in6 *)&ipn;
720 adx 30
721 michael 3246 if (memcmp(&v6conf->sin6_addr, &v6->sin6_addr, sizeof(struct in6_addr)))
722 adx 30 {
723 michael 2182 memcpy(&ipn, &conf->bind, sizeof(struct irc_ssaddr));
724     ipn.ss.ss_family = AF_INET6;
725     ipn.ss_port = 0;
726 michael 4588 comm_connect_tcp(&client_p->connection->fd,
727 michael 2182 conf->host, conf->port,
728 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
729 michael 2182 serv_connect_callback, client_p,
730     conf->aftype, CONNECTTIMEOUT);
731     }
732 michael 4340 else if (ConfigServerInfo.specific_ipv6_vhost)
733 michael 2182 {
734 michael 4340 memcpy(&ipn, &ConfigServerInfo.ip6, sizeof(struct irc_ssaddr));
735 michael 2182 ipn.ss.ss_family = AF_INET6;
736     ipn.ss_port = 0;
737 michael 4588 comm_connect_tcp(&client_p->connection->fd,
738 michael 2182 conf->host, conf->port,
739     (struct sockaddr *)&ipn, ipn.ss_len,
740     serv_connect_callback, client_p,
741     conf->aftype, CONNECTTIMEOUT);
742     }
743     else
744 michael 4588 comm_connect_tcp(&client_p->connection->fd,
745 michael 2345 conf->host, conf->port,
746 michael 2182 NULL, 0, serv_connect_callback, client_p,
747     conf->aftype, CONNECTTIMEOUT);
748 adx 30 }
749     }
750 michael 4415
751 michael 2182 return 1;
752 adx 30 }
753    
754 michael 1303 static void
755     finish_ssl_server_handshake(struct Client *client_p)
756     {
757 michael 1632 struct MaskItem *conf = NULL;
758 michael 1303
759 michael 4588 conf = find_conf_name(&client_p->connection->confs,
760 michael 1632 client_p->name, CONF_SERVER);
761 michael 1303 if (conf == NULL)
762     {
763 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
764 michael 6428 "Lost connect{} block for %s", get_client_name(client_p, SHOW_IP));
765 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
766 michael 1303 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
767    
768 michael 3171 exit_client(client_p, "Lost connect{} block");
769 michael 1303 return;
770     }
771    
772 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
773 michael 1303
774 michael 5796 send_capabilities(client_p);
775 michael 1303
776     sendto_one(client_p, "SERVER %s 1 :%s%s",
777     me.name, ConfigServerHide.hidden ? "(H) " : "",
778     me.info);
779    
780 michael 6428 /*
781     * If we've been marked dead because a send failed, just exit
782 michael 1303 * here now and save everyone the trouble of us ever existing.
783     */
784     if (IsDead(client_p))
785     {
786 michael 6428 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
787     "%s went dead during handshake", get_client_name(client_p, SHOW_IP));
788     sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
789     "%s went dead during handshake", get_client_name(client_p, MASK_IP));
790     return;
791 michael 1303 }
792    
793     /* don't move to serv_list yet -- we haven't sent a burst! */
794     /* If we get here, we're ok, so lets start reading some data */
795 michael 4588 comm_setselect(&client_p->connection->fd, COMM_SELECT_READ, read_packet, client_p, 0);
796 michael 1303 }
797    
798     static void
799 michael 4461 ssl_server_handshake(fde_t *fd, void *data)
800 michael 1303 {
801 michael 4461 struct Client *client_p = data;
802 michael 7105 const char *sslerr = NULL;
803 michael 1303
804 michael 7105 tls_handshake_status_t ret = tls_handshake(&client_p->connection->fd.ssl, TLS_ROLE_CLIENT, &sslerr);
805     if (ret != TLS_HANDSHAKE_DONE)
806 michael 1303 {
807 michael 4737 if ((CurrentTime - client_p->connection->firsttime) > CONNECTTIMEOUT)
808 michael 4732 {
809 michael 7105 exit_client(client_p, "Timeout during TLS handshake");
810 michael 4732 return;
811     }
812    
813 michael 7105 switch (ret)
814 michael 1303 {
815 michael 7105 case TLS_HANDSHAKE_WANT_WRITE:
816 michael 4588 comm_setselect(&client_p->connection->fd, COMM_SELECT_WRITE,
817 michael 4737 ssl_server_handshake, client_p, CONNECTTIMEOUT);
818 michael 1303 return;
819 michael 7105 case TLS_HANDSHAKE_WANT_READ:
820 michael 4588 comm_setselect(&client_p->connection->fd, COMM_SELECT_READ,
821 michael 4737 ssl_server_handshake, client_p, CONNECTTIMEOUT);
822 michael 1303 return;
823     default:
824 michael 1308 {
825 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
826 michael 1308 "Error connecting to %s: %s", client_p->name,
827 michael 7105 sslerr ? sslerr : "unknown TLS error");
828     exit_client(client_p, "Error during TLS handshake");
829 michael 1303 return;
830 michael 1308 }
831 michael 1303 }
832     }
833    
834 michael 4732 comm_settimeout(&client_p->connection->fd, 0, NULL, NULL);
835    
836 michael 7142 if (!tls_verify_cert(&client_p->connection->fd.ssl, ConfigServerInfo.message_digest_algorithm, &client_p->certfp))
837     ilog(LOG_TYPE_IRCD, "Server %s!%s@%s gave bad TLS client certificate",
838     client_p->name, client_p->username, client_p->host);
839 michael 2463
840 michael 1303 finish_ssl_server_handshake(client_p);
841     }
842    
843     static void
844 michael 6397 ssl_connect_init(struct Client *client_p, const struct MaskItem *conf, fde_t *fd)
845 michael 1303 {
846 michael 7105 if (!tls_new(&client_p->connection->fd.ssl, fd->fd, TLS_ROLE_CLIENT))
847 michael 1303 {
848     SetDead(client_p);
849 michael 7105 exit_client(client_p, "TLS context initialization failed");
850 michael 1303 return;
851     }
852    
853 michael 1632 if (!EmptyString(conf->cipher_list))
854 michael 7105 tls_set_ciphers(&client_p->connection->fd.ssl, conf->cipher_list);
855 michael 1306
856     ssl_server_handshake(NULL, client_p);
857 michael 1303 }
858    
859 adx 30 /* serv_connect_callback() - complete a server connection.
860 michael 2345 *
861 adx 30 * This routine is called after the server connection attempt has
862     * completed. If unsucessful, an error is sent to ops and the client
863     * is closed. If sucessful, it goes through the initialisation/check
864     * procedures, the capabilities are sent, and the socket is then
865     * marked for reading.
866     */
867     static void
868     serv_connect_callback(fde_t *fd, int status, void *data)
869     {
870 michael 6397 struct Client *const client_p = data;
871     const struct MaskItem *conf = NULL;
872 adx 30
873 michael 4298 /* First, make sure it's a real client! */
874 michael 3246 assert(client_p);
875 michael 4588 assert(&client_p->connection->fd == fd);
876 adx 30
877     /* Next, for backward purposes, record the ip of the server */
878 michael 4588 memcpy(&client_p->connection->ip, &fd->connect.hostaddr,
879 adx 30 sizeof(struct irc_ssaddr));
880 michael 3246
881 adx 30 /* Check the status */
882     if (status != COMM_OK)
883     {
884 michael 6428 /* We have an error, so report it and quit */
885     sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
886     "Error connecting to %s: %s",
887     get_client_name(client_p, SHOW_IP), comm_errstr(status));
888     sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
889     "Error connecting to %s: %s",
890     get_client_name(client_p, MASK_IP), comm_errstr(status));
891    
892     /*
893     * If a fd goes bad, call dead_link() the socket is no
894     * longer valid for reading or writing.
895 adx 30 */
896 michael 6428 dead_link_on_write(client_p, 0);
897     return;
898 adx 30 }
899    
900     /* COMM_OK, so continue the connection procedure */
901     /* Get the C/N lines */
902 michael 4588 conf = find_conf_name(&client_p->connection->confs,
903 michael 2134 client_p->name, CONF_SERVER);
904 adx 30 if (conf == NULL)
905     {
906 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
907 michael 6428 "Lost connect{} block for %s", get_client_name(client_p, SHOW_IP));
908 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
909 michael 2134 "Lost connect{} block for %s", get_client_name(client_p, MASK_IP));
910 adx 30
911 michael 3171 exit_client(client_p, "Lost connect{} block");
912 adx 30 return;
913     }
914    
915     /* Next, send the initial handshake */
916     SetHandshake(client_p);
917    
918 michael 7274 if (IsConfSSL(conf))
919 michael 1303 {
920 michael 1632 ssl_connect_init(client_p, conf, fd);
921 michael 1303 return;
922     }
923 adx 30
924 michael 2134 sendto_one(client_p, "PASS %s TS %d %s", conf->spasswd, TS_CURRENT, me.id);
925 adx 30
926 michael 5796 send_capabilities(client_p);
927 adx 30
928 michael 2134 sendto_one(client_p, "SERVER %s 1 :%s%s", me.name,
929     ConfigServerHide.hidden ? "(H) " : "", me.info);
930 adx 30
931 michael 6428 /*
932     * If we've been marked dead because a send failed, just exit
933 adx 30 * here now and save everyone the trouble of us ever existing.
934     */
935 michael 2345 if (IsDead(client_p))
936 adx 30 {
937 michael 6428 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
938     "%s went dead during handshake", get_client_name(client_p, SHOW_IP));
939     sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
940     "%s went dead during handshake", get_client_name(client_p, MASK_IP));
941     return;
942 adx 30 }
943    
944     /* don't move to serv_list yet -- we haven't sent a burst! */
945     /* If we get here, we're ok, so lets start reading some data */
946     comm_setselect(fd, COMM_SELECT_READ, read_packet, client_p, 0);
947     }
948    
949     struct Client *
950     find_servconn_in_progress(const char *name)
951     {
952     dlink_node *ptr;
953     struct Client *cptr;
954    
955     DLINK_FOREACH(ptr, unknown_list.head)
956     {
957     cptr = ptr->data;
958    
959     if (cptr && cptr->name[0])
960 michael 1652 if (!match(name, cptr->name))
961 adx 30 return cptr;
962     }
963 michael 2345
964 adx 30 return NULL;
965     }

Properties

Name Value
svn:eol-style native
svn:keywords Id Revision