ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/server.c
Revision: 8395
Committed: Sun Mar 18 13:14:35 2018 UTC (7 years, 5 months ago) by michael
Content type: text/x-csrc
File size: 23111 byte(s)
Log Message:
- Rename attach_conf() -> conf_attach(), detach_conf() -> conf_detach(); clean up documentation

File Contents

# User Rev Content
1 adx 30 /*
2 michael 2916 * ircd-hybrid: an advanced, lightweight Internet Relay Chat Daemon (ircd)
3 adx 30 *
4 michael 8279 * Copyright (c) 1997-2018 ircd-hybrid development team
5 adx 30 *
6     * This program is free software; you can redistribute it and/or modify
7     * it under the terms of the GNU General Public License as published by
8     * the Free Software Foundation; either version 2 of the License, or
9     * (at your option) any later version.
10     *
11     * This program is distributed in the hope that it will be useful,
12     * but WITHOUT ANY WARRANTY; without even the implied warranty of
13     * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14     * GNU General Public License for more details.
15     *
16     * You should have received a copy of the GNU General Public License
17     * along with this program; if not, write to the Free Software
18 michael 4565 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
19 adx 30 * USA
20     */
21    
22 michael 2916 /*! \file s_serv.c
23     * \brief Server related functions.
24     * \version $Id$
25     */
26    
27 adx 30 #include "stdinc.h"
28 michael 1011 #include "list.h"
29 adx 30 #include "client.h"
30     #include "event.h"
31     #include "hash.h"
32     #include "irc_string.h"
33     #include "ircd.h"
34     #include "ircd_defs.h"
35     #include "s_bsd.h"
36     #include "packet.h"
37 michael 1309 #include "conf.h"
38 michael 3347 #include "server.h"
39 michael 8166 #include "server_capab.h"
40 michael 1309 #include "log.h"
41 adx 30 #include "send.h"
42     #include "memory.h"
43 michael 1243 #include "parse.h"
44 adx 30
45 michael 6527
46 michael 2156 dlink_list flatten_links;
47 michael 4464 static void serv_connect_callback(fde_t *, int, void *);
48 adx 30
49    
50     /*
51     * write_links_file
52     *
53     * inputs - void pointer which is not used
54     * output - NONE
55     * side effects - called from an event, write out list of linked servers
56     * but in no particular order.
57     */
58     void
59 michael 4439 write_links_file(void *unused)
60 adx 30 {
61 michael 2156 FILE *file = NULL;
62 michael 7995 dlink_node *node, *node_next;
63 michael 3215 char buff[IRCD_BUFSIZE] = "";
64 adx 30
65 michael 6599 if (EmptyString(ConfigServerHide.flatten_links_file))
66 adx 30 return;
67    
68 michael 6599 if ((file = fopen(ConfigServerHide.flatten_links_file, "w")) == NULL)
69 michael 6602 {
70     ilog(LOG_TYPE_IRCD, "Couldn't open \"%s\": %s", ConfigServerHide.flatten_links_file,
71     strerror(errno));
72 michael 6599 return;
73 michael 6602 }
74 michael 6599
75 michael 4815 DLINK_FOREACH_SAFE(node, node_next, flatten_links.head)
76 adx 30 {
77 michael 4815 dlinkDelete(node, &flatten_links);
78 michael 7032 xfree(node->data);
79 michael 4815 free_dlink_node(node);
80 adx 30 }
81    
82 michael 4815 DLINK_FOREACH(node, global_server_list.head)
83 adx 30 {
84 michael 4815 const struct Client *target_p = node->data;
85 adx 30
86 michael 2156 /*
87     * Skip hidden servers, aswell as ourselves, since we already send
88     * ourselves in /links
89     */
90     if (IsHidden(target_p) || IsMe(target_p))
91 adx 30 continue;
92    
93 michael 1851 if (HasFlag(target_p, FLAGS_SERVICE) && ConfigServerHide.hide_services)
94     continue;
95    
96 michael 1545 /*
97     * Attempt to format the file in such a way it follows the usual links output
98 adx 30 * ie "servername uplink :hops info"
99     * Mostly for aesthetic reasons - makes it look pretty in mIRC ;)
100     * - madmax
101     */
102 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s", target_p->name,
103     me.name, target_p->info);
104 michael 2212 dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
105 michael 2156 snprintf(buff, sizeof(buff), "%s %s :1 %s\n", target_p->name,
106     me.name, target_p->info);
107 adx 30
108 michael 1325 fputs(buff, file);
109 adx 30 }
110    
111 michael 1325 fclose(file);
112 adx 30 }
113    
114 michael 2216 void
115     read_links_file(void)
116     {
117     FILE *file = NULL;
118     char *p = NULL;
119 michael 3215 char buff[IRCD_BUFSIZE] = "";
120 michael 2216
121 michael 6599 if (EmptyString(ConfigServerHide.flatten_links_file))
122 michael 2216 return;
123    
124 michael 6599 if ((file = fopen(ConfigServerHide.flatten_links_file, "r")) == NULL)
125 michael 6602 {
126     ilog(LOG_TYPE_IRCD, "Couldn't open \"%s\": %s", ConfigServerHide.flatten_links_file,
127     strerror(errno));
128 michael 6599 return;
129 michael 6602 }
130 michael 6599
131 michael 2216 while (fgets(buff, sizeof(buff), file))
132     {
133 michael 3246 if ((p = strchr(buff, '\n')))
134 michael 2216 *p = '\0';
135    
136     dlinkAddTail(xstrdup(buff), make_dlink_node(), &flatten_links);
137     }
138    
139     fclose(file);
140     }
141    
142 michael 7953 /* server_hunt()
143 adx 30 * Do the basic thing in delivering the message (command)
144     * across the relays to the specific server (server) for
145     * actions.
146     *
147     * Note: The command is a format string and *MUST* be
148     * of prefixed style (e.g. ":%s COMMAND %s ...").
149     * Command can have only max 8 parameters.
150     *
151     * server parv[server] is the parameter identifying the
152     * target server.
153     *
154     * *WARNING*
155     * parv[server] is replaced with the pointer to the
156     * real servername from the matched client (I'm lazy
157     * now --msa).
158     *
159     * returns: (see #defines)
160     */
161 michael 7973 const struct server_hunt *
162 michael 7953 server_hunt(struct Client *source_p, const char *command,
163 michael 1857 const int server, const int parc, char *parv[])
164 adx 30 {
165 michael 7971 static struct server_hunt hunt;
166 michael 7995 struct server_hunt *const h = &hunt;
167 michael 7971 dlink_node *node;
168 adx 30
169 michael 1344 /* Assume it's me, if no server */
170     if (parc <= server || EmptyString(parv[server]))
171 michael 7971 {
172 michael 7991 h->target_p = &me;
173 michael 7971 h->ret = HUNTED_ISME;
174     return h;
175     }
176 adx 30
177 michael 7971 if ((h->target_p = find_person(source_p, parv[server])) == NULL)
178     h->target_p = hash_find_server(parv[server]);
179 michael 1344
180 michael 4206 /*
181     * These are to pickup matches that would cause the following
182 adx 30 * message to go in the wrong direction while doing quick fast
183     * non-matching lookups.
184     */
185 michael 7971 if (h->target_p)
186     if (h->target_p->from == source_p->from && !MyConnect(h->target_p))
187     h->target_p = NULL;
188 adx 30
189 michael 7971 if (!h->target_p && has_wildcards(parv[server]))
190 adx 30 {
191 michael 6060 DLINK_FOREACH(node, global_server_list.head)
192 adx 30 {
193 michael 4815 struct Client *tmp = node->data;
194 michael 4206
195 michael 6060 assert(IsMe(tmp) || IsServer(tmp));
196 michael 4206 if (!match(parv[server], tmp->name))
197 adx 30 {
198 michael 4206 if (tmp->from == source_p->from && !MyConnect(tmp))
199     continue;
200 michael 4210
201 michael 7991 h->target_p = tmp;
202 michael 4210 break;
203 adx 30 }
204     }
205 michael 6060
206 michael 7971 if (!h->target_p)
207 michael 6060 {
208     DLINK_FOREACH(node, global_client_list.head)
209     {
210     struct Client *tmp = node->data;
211    
212 michael 7963 assert(IsClient(tmp));
213 michael 6060 if (!match(parv[server], tmp->name))
214     {
215     if (tmp->from == source_p->from && !MyConnect(tmp))
216     continue;
217    
218 michael 7991 h->target_p = tmp;
219 michael 6060 break;
220     }
221     }
222     }
223 adx 30 }
224    
225 michael 7971 if (h->target_p)
226 adx 30 {
227 michael 7971 assert(IsMe(h->target_p) || IsServer(h->target_p) || IsClient(h->target_p));
228     if (IsMe(h->target_p) || MyClient(h->target_p))
229     {
230     h->ret = HUNTED_ISME;
231     return h;
232     }
233 adx 30
234 michael 7971 parv[server] = h->target_p->id;
235     sendto_one(h->target_p, command, source_p->id,
236 adx 30 parv[1], parv[2], parv[3], parv[4],
237     parv[5], parv[6], parv[7], parv[8]);
238 michael 7971 h->ret = HUNTED_PASS;
239     return h;
240 michael 2345 }
241 adx 30
242 michael 3109 sendto_one_numeric(source_p, &me, ERR_NOSUCHSERVER, parv[server]);
243 michael 7971 h->ret = HUNTED_NOSUCH;
244     return h;
245 adx 30 }
246    
247     /* try_connections()
248     *
249     * inputs - void pointer which is not used
250     * output - NONE
251     * side effects -
252     * scan through configuration and try new connections.
253     * Returns the calendar time when the next call to this
254     * function should be made latest. (No harm done if this
255     * is called earlier or later...)
256     */
257     void
258     try_connections(void *unused)
259     {
260 michael 7995 dlink_node *node;
261 adx 30
262     if (GlobalSetOptions.autoconn == 0)
263     return;
264    
265 michael 7401 DLINK_FOREACH(node, connect_items.head)
266 adx 30 {
267 michael 4815 struct MaskItem *conf = node->data;
268 adx 30
269 michael 1636 assert(conf->type == CONF_SERVER);
270 michael 7995 assert(conf->class);
271 michael 1632
272 michael 6721 /* Also when already connecting! (update holdtimes) --SRB */
273 michael 4196 if (!conf->port || !IsConfAllowAutoConn(conf))
274 adx 30 continue;
275    
276 michael 6721 /*
277     * Skip this entry if the use of it is still on hold until
278 adx 30 * future. Otherwise handle this entry (and set it on hold
279     * until next time). Will reset only hold times, if already
280     * made one successfull connection... [this algorithm is
281     * a bit fuzzy... -- msa >;) ]
282     */
283 michael 1649 if (conf->until > CurrentTime)
284 adx 30 continue;
285    
286 michael 6390 conf->until = CurrentTime + conf->class->con_freq;
287 michael 4028
288 michael 3246 /*
289     * Found a CONNECT config with port specified, scan clients
290 adx 30 * and see if this server is already connected?
291     */
292 michael 3246 if (hash_find_server(conf->name))
293 adx 30 continue;
294    
295 michael 1632 if (conf->class->ref_count < conf->class->max_total)
296 adx 30 {
297 michael 6390 /* Move this entry to the end of the list, if not already last */
298 michael 4815 if (node->next)
299 adx 30 {
300 michael 7401 dlinkDelete(node, &connect_items);
301     dlinkAddTail(conf, &conf->node, &connect_items);
302 adx 30 }
303    
304     if (find_servconn_in_progress(conf->name))
305     return;
306    
307 michael 3246 /*
308     * We used to only print this if serv_connect() actually
309 adx 30 * succeeded, but since comm_tcp_connect() can call the callback
310     * immediately if there is an error, we were getting error messages
311     * in the wrong order. SO, we just print out the activated line,
312     * and let serv_connect() / serv_connect_callback() print an
313     * error afterwards if it fails.
314     * -- adrian
315     */
316     if (ConfigServerHide.hide_server_ips)
317 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
318 michael 1618 "Connection to %s activated.",
319 adx 30 conf->name);
320     else
321 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
322 michael 1618 "Connection to %s[%s] activated.",
323 michael 1632 conf->name, conf->host);
324 adx 30
325 michael 1632 serv_connect(conf, NULL);
326 adx 30 /* We connect only one at time... */
327     return;
328     }
329     }
330     }
331    
332     int
333 michael 1115 valid_servname(const char *name)
334     {
335 michael 3451 unsigned int dots = 0;
336 michael 1115 const char *p = name;
337    
338     for (; *p; ++p)
339     {
340     if (!IsServChar(*p))
341 michael 1118 return 0;
342 michael 1115
343     if (*p == '.')
344     ++dots;
345     }
346    
347 michael 3451 return dots && (p - name) <= HOSTLEN;
348 michael 1115 }
349    
350 adx 30 /* make_server()
351     *
352     * inputs - pointer to client struct
353     * output - pointer to struct Server
354     * side effects - add's an Server information block to a client
355     * if it was not previously allocated.
356     */
357     struct Server *
358     make_server(struct Client *client_p)
359     {
360     if (client_p->serv == NULL)
361 michael 8310 client_p->serv = xcalloc(sizeof(*client_p->serv));
362 adx 30
363     return client_p->serv;
364     }
365    
366     /* New server connection code
367     * Based upon the stuff floating about in s_bsd.c
368     * -- adrian
369     */
370    
371     /* serv_connect() - initiate a server connection
372     *
373 michael 2345 * inputs - pointer to conf
374 adx 30 * - pointer to client doing the connect
375     * output -
376     * side effects -
377     *
378     * This code initiates a connection to a server. It first checks to make
379     * sure the given server exists. If this is the case, it creates a socket,
380     * creates a client, saves the socket information in the client, and
381     * initiates a connection to the server through comm_connect_tcp(). The
382     * completion of this goes through serv_completed_connection().
383     *
384     * We return 1 if the connection is attempted, since we don't know whether
385     * it suceeded or not, and 0 if it fails in here somewhere.
386     */
387     int
388 michael 1632 serv_connect(struct MaskItem *conf, struct Client *by)
389 adx 30 {
390 michael 3246 char buf[HOSTIPLEN + 1] = "";
391 adx 30
392     /* conversion structs */
393     struct sockaddr_in *v4;
394 michael 3246
395 michael 1632 /* Make sure conf is useful */
396 michael 3246 assert(conf);
397 michael 8391 assert(conf->type == CONF_SERVER);
398     assert(hash_find_server(conf->name) == NULL); /* This should have been checked by the caller */
399 adx 30
400 michael 5051 getnameinfo((const struct sockaddr *)&conf->addr, conf->addr.ss_len,
401 michael 1123 buf, sizeof(buf), NULL, 0, NI_NUMERICHOST);
402 michael 1632 ilog(LOG_TYPE_IRCD, "Connect to %s[%s] @%s", conf->name, conf->host,
403 adx 30 buf);
404    
405     /* Still processing a DNS lookup? -> exit */
406 michael 1632 if (conf->dns_pending)
407 adx 30 {
408 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
409 michael 992 "Error connecting to %s: DNS lookup for connect{} in progress.",
410     conf->name);
411 michael 3246 return 0;
412 adx 30 }
413    
414 michael 1632 if (conf->dns_failed)
415 michael 992 {
416 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
417 michael 992 "Error connecting to %s: DNS lookup for connect{} failed.",
418     conf->name);
419 michael 3246 return 0;
420 michael 992 }
421    
422 michael 8391 /* Create a socket for the server connection */
423     int fd = comm_socket(conf->addr.ss.ss_family, SOCK_STREAM, 0);
424     if (fd == -1)
425 michael 2345 {
426 michael 8391 /* Eek, failure to create the socket */
427     report_error(L_ALL, "opening stream socket to %s: %s", conf->name, errno);
428 michael 2134 return 0;
429 adx 30 }
430 michael 2345
431 adx 30 /* Create a local client */
432 michael 8391 struct Client *client_p = client_make(NULL);
433 adx 30
434     /* Copy in the server, hostname, fd */
435     strlcpy(client_p->name, conf->name, sizeof(client_p->name));
436 michael 1632 strlcpy(client_p->host, conf->host, sizeof(client_p->host));
437 adx 30
438     /* We already converted the ip once, so lets use it - stu */
439 michael 1115 strlcpy(client_p->sockhost, buf, sizeof(client_p->sockhost));
440 adx 30
441 michael 8339 client_p->connection->fd = fd_open(fd, 1, NULL);
442    
443 michael 6725 /* Server names are always guaranteed under HOSTLEN chars */
444 michael 8339 fd_note(client_p->connection->fd, "Server: %s", client_p->name);
445 adx 30
446 michael 6725 /*
447     * Attach config entries to client here rather than in serv_connect_callback().
448     * This to avoid null pointer references.
449 adx 30 */
450 michael 8395 conf_attach(client_p, conf);
451 michael 3110
452 michael 6725 /*
453     * At this point we have a connection in progress and a connect {} block
454     * attached to the client, the socket info should be saved in the client
455     * and it should either be resolved or have a valid address.
456 adx 30 *
457     * The socket has been connected or connect is in progress.
458     */
459     make_server(client_p);
460    
461     if (by && IsClient(by))
462     strlcpy(client_p->serv->by, by->name, sizeof(client_p->serv->by));
463     else
464     strlcpy(client_p->serv->by, "AutoConn.", sizeof(client_p->serv->by));
465    
466     SetConnecting(client_p);
467 michael 4588 client_p->connection->aftype = conf->aftype;
468 adx 30
469     /* Now, initiate the connection */
470 michael 2345 /* XXX assume that a non 0 type means a specific bind address
471 adx 30 * for this connect.
472     */
473 michael 1632 switch (conf->aftype)
474 adx 30 {
475     case AF_INET:
476 michael 1632 v4 = (struct sockaddr_in*)&conf->bind;
477 michael 8310
478 michael 3246 if (v4->sin_addr.s_addr)
479 adx 30 {
480     struct irc_ssaddr ipn;
481 michael 8310
482     memset(&ipn, 0, sizeof(ipn));
483 adx 30 ipn.ss.ss_family = AF_INET;
484     ipn.ss_port = 0;
485 michael 8310 memcpy(&ipn, &conf->bind, sizeof(ipn));
486    
487 michael 8339 comm_connect_tcp(client_p->connection->fd, conf->host, conf->port,
488 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
489 michael 2134 serv_connect_callback, client_p, conf->aftype,
490     CONNECTTIMEOUT);
491 adx 30 }
492 michael 4340 else if (ConfigServerInfo.specific_ipv4_vhost)
493 adx 30 {
494     struct irc_ssaddr ipn;
495 michael 8310
496     memset(&ipn, 0, sizeof(ipn));
497 adx 30 ipn.ss.ss_family = AF_INET;
498     ipn.ss_port = 0;
499 michael 8310 memcpy(&ipn, &ConfigServerInfo.ip, sizeof(ipn));
500    
501 michael 8339 comm_connect_tcp(client_p->connection->fd, conf->host, conf->port,
502 adx 30 (struct sockaddr *)&ipn, ipn.ss_len,
503 michael 1632 serv_connect_callback, client_p, conf->aftype,
504 michael 2134 CONNECTTIMEOUT);
505 adx 30 }
506     else
507 michael 8339 comm_connect_tcp(client_p->connection->fd, conf->host, conf->port,
508 michael 2345 NULL, 0, serv_connect_callback, client_p, conf->aftype,
509 adx 30 CONNECTTIMEOUT);
510     break;
511     case AF_INET6:
512     {
513 michael 2182 struct irc_ssaddr ipn;
514     struct sockaddr_in6 *v6;
515     struct sockaddr_in6 *v6conf;
516 adx 30
517 michael 8310 memset(&ipn, 0, sizeof(ipn));
518 michael 2182 v6conf = (struct sockaddr_in6 *)&conf->bind;
519     v6 = (struct sockaddr_in6 *)&ipn;
520 adx 30
521 michael 3246 if (memcmp(&v6conf->sin6_addr, &v6->sin6_addr, sizeof(struct in6_addr)))
522 adx 30 {
523 michael 8310 memcpy(&ipn, &conf->bind, sizeof(ipn));
524 michael 2182 ipn.ss.ss_family = AF_INET6;
525     ipn.ss_port = 0;
526 michael 8310
527 michael 8339 comm_connect_tcp(client_p->connection->fd,
528 michael 2182 conf->host, conf->port,
529 michael 2345 (struct sockaddr *)&ipn, ipn.ss_len,
530 michael 2182 serv_connect_callback, client_p,
531     conf->aftype, CONNECTTIMEOUT);
532     }
533 michael 4340 else if (ConfigServerInfo.specific_ipv6_vhost)
534 michael 2182 {
535 michael 8310 memcpy(&ipn, &ConfigServerInfo.ip6, sizeof(ipn));
536 michael 2182 ipn.ss.ss_family = AF_INET6;
537     ipn.ss_port = 0;
538 michael 8310
539 michael 8339 comm_connect_tcp(client_p->connection->fd,
540 michael 2182 conf->host, conf->port,
541     (struct sockaddr *)&ipn, ipn.ss_len,
542     serv_connect_callback, client_p,
543     conf->aftype, CONNECTTIMEOUT);
544     }
545     else
546 michael 8339 comm_connect_tcp(client_p->connection->fd,
547 michael 2345 conf->host, conf->port,
548 michael 2182 NULL, 0, serv_connect_callback, client_p,
549     conf->aftype, CONNECTTIMEOUT);
550 adx 30 }
551     }
552 michael 4415
553 michael 2182 return 1;
554 adx 30 }
555    
556 michael 1303 static void
557     finish_ssl_server_handshake(struct Client *client_p)
558     {
559 michael 7588 const struct MaskItem *conf = find_conf_name(&client_p->connection->confs,
560     client_p->name, CONF_SERVER);
561     if (!conf)
562 michael 1303 {
563 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
564 michael 7997 "Lost connect{} block for %s", client_get_name(client_p, SHOW_IP));
565 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
566 michael 7997 "Lost connect{} block for %s", client_get_name(client_p, MASK_IP));
567 michael 1303
568 michael 3171 exit_client(client_p, "Lost connect{} block");
569 michael 1303 return;
570     }
571    
572 michael 7355 sendto_one(client_p, "PASS %s TS %u %s", conf->spasswd, TS_CURRENT, me.id);
573 michael 1303
574 michael 8166 sendto_one(client_p, "CAPAB :%s", capab_get(NULL));
575 michael 1303
576     sendto_one(client_p, "SERVER %s 1 :%s%s",
577     me.name, ConfigServerHide.hidden ? "(H) " : "",
578     me.info);
579    
580 michael 6428 /*
581     * If we've been marked dead because a send failed, just exit
582 michael 1303 * here now and save everyone the trouble of us ever existing.
583     */
584     if (IsDead(client_p))
585     {
586 michael 6428 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
587 michael 7997 "%s went dead during handshake", client_get_name(client_p, SHOW_IP));
588 michael 6428 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
589 michael 7997 "%s went dead during handshake", client_get_name(client_p, MASK_IP));
590 michael 6428 return;
591 michael 1303 }
592    
593     /* don't move to serv_list yet -- we haven't sent a burst! */
594     /* If we get here, we're ok, so lets start reading some data */
595 michael 8339 comm_setselect(client_p->connection->fd, COMM_SELECT_READ, read_packet, client_p, 0);
596 michael 1303 }
597    
598     static void
599 michael 8339 ssl_server_handshake(fde_t *F, void *data)
600 michael 1303 {
601 michael 4461 struct Client *client_p = data;
602 michael 7105 const char *sslerr = NULL;
603 michael 1303
604 michael 8339 assert(client_p);
605     assert(client_p->connection);
606     assert(client_p->connection->fd);
607     assert(client_p->connection->fd == F);
608    
609     tls_handshake_status_t ret = tls_handshake(&F->ssl, TLS_ROLE_CLIENT, &sslerr);
610 michael 7105 if (ret != TLS_HANDSHAKE_DONE)
611 michael 1303 {
612 michael 4737 if ((CurrentTime - client_p->connection->firsttime) > CONNECTTIMEOUT)
613 michael 4732 {
614 michael 7105 exit_client(client_p, "Timeout during TLS handshake");
615 michael 4732 return;
616     }
617    
618 michael 7105 switch (ret)
619 michael 1303 {
620 michael 7105 case TLS_HANDSHAKE_WANT_WRITE:
621 michael 8339 comm_setselect(F, COMM_SELECT_WRITE,
622 michael 4737 ssl_server_handshake, client_p, CONNECTTIMEOUT);
623 michael 1303 return;
624 michael 7105 case TLS_HANDSHAKE_WANT_READ:
625 michael 8339 comm_setselect(F, COMM_SELECT_READ,
626 michael 4737 ssl_server_handshake, client_p, CONNECTTIMEOUT);
627 michael 1303 return;
628     default:
629 michael 1308 {
630 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ALL, SEND_NOTICE,
631 michael 1308 "Error connecting to %s: %s", client_p->name,
632 michael 7105 sslerr ? sslerr : "unknown TLS error");
633     exit_client(client_p, "Error during TLS handshake");
634 michael 1303 return;
635 michael 1308 }
636 michael 1303 }
637     }
638    
639 michael 8339 comm_settimeout(F, 0, NULL, NULL);
640 michael 4732
641 michael 8339 if (!tls_verify_cert(&F->ssl, ConfigServerInfo.message_digest_algorithm, &client_p->certfp))
642 michael 7142 ilog(LOG_TYPE_IRCD, "Server %s!%s@%s gave bad TLS client certificate",
643     client_p->name, client_p->username, client_p->host);
644 michael 2463
645 michael 1303 finish_ssl_server_handshake(client_p);
646     }
647    
648     static void
649 michael 8339 ssl_connect_init(struct Client *client_p, const struct MaskItem *conf, fde_t *F)
650 michael 1303 {
651 michael 8339 assert(client_p);
652     assert(client_p->connection);
653     assert(client_p->connection->fd);
654     assert(client_p->connection->fd == F);
655    
656     if (!tls_new(&F->ssl, F->fd, TLS_ROLE_CLIENT))
657 michael 1303 {
658     SetDead(client_p);
659 michael 7105 exit_client(client_p, "TLS context initialization failed");
660 michael 1303 return;
661     }
662    
663 michael 1632 if (!EmptyString(conf->cipher_list))
664 michael 8339 tls_set_ciphers(&F->ssl, conf->cipher_list);
665 michael 1306
666 michael 8339 ssl_server_handshake(F, client_p);
667 michael 1303 }
668    
669 adx 30 /* serv_connect_callback() - complete a server connection.
670 michael 2345 *
671 adx 30 * This routine is called after the server connection attempt has
672     * completed. If unsucessful, an error is sent to ops and the client
673     * is closed. If sucessful, it goes through the initialisation/check
674     * procedures, the capabilities are sent, and the socket is then
675     * marked for reading.
676     */
677     static void
678 michael 8339 serv_connect_callback(fde_t *F, int status, void *data)
679 adx 30 {
680 michael 6397 struct Client *const client_p = data;
681 adx 30
682 michael 4298 /* First, make sure it's a real client! */
683 michael 3246 assert(client_p);
684 michael 8339 assert(client_p->connection);
685     assert(client_p->connection->fd);
686     assert(client_p->connection->fd == F);
687 adx 30
688     /* Next, for backward purposes, record the ip of the server */
689 michael 8339 memcpy(&client_p->connection->ip, &F->connect.hostaddr, sizeof(client_p->connection->ip));
690 michael 3246
691 adx 30 /* Check the status */
692     if (status != COMM_OK)
693     {
694 michael 6428 /* We have an error, so report it and quit */
695     sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
696     "Error connecting to %s: %s",
697 michael 7997 client_get_name(client_p, SHOW_IP), comm_errstr(status));
698 michael 6428 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
699     "Error connecting to %s: %s",
700 michael 7997 client_get_name(client_p, MASK_IP), comm_errstr(status));
701 michael 6428
702     /*
703     * If a fd goes bad, call dead_link() the socket is no
704     * longer valid for reading or writing.
705 adx 30 */
706 michael 6428 dead_link_on_write(client_p, 0);
707     return;
708 adx 30 }
709    
710     /* COMM_OK, so continue the connection procedure */
711 michael 7588 /* Get the connect {} block */
712     const struct MaskItem *conf = find_conf_name(&client_p->connection->confs,
713     client_p->name, CONF_SERVER);
714     if (!conf)
715 adx 30 {
716 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
717 michael 7997 "Lost connect{} block for %s", client_get_name(client_p, SHOW_IP));
718 michael 6318 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
719 michael 7997 "Lost connect{} block for %s", client_get_name(client_p, MASK_IP));
720 adx 30
721 michael 3171 exit_client(client_p, "Lost connect{} block");
722 adx 30 return;
723     }
724    
725     /* Next, send the initial handshake */
726     SetHandshake(client_p);
727    
728 michael 7274 if (IsConfSSL(conf))
729 michael 1303 {
730 michael 8339 ssl_connect_init(client_p, conf, F);
731 michael 1303 return;
732     }
733 adx 30
734 michael 7355 sendto_one(client_p, "PASS %s TS %u %s", conf->spasswd, TS_CURRENT, me.id);
735 adx 30
736 michael 8166 sendto_one(client_p, "CAPAB :%s", capab_get(NULL));
737 adx 30
738 michael 2134 sendto_one(client_p, "SERVER %s 1 :%s%s", me.name,
739     ConfigServerHide.hidden ? "(H) " : "", me.info);
740 adx 30
741 michael 6428 /*
742     * If we've been marked dead because a send failed, just exit
743 adx 30 * here now and save everyone the trouble of us ever existing.
744     */
745 michael 2345 if (IsDead(client_p))
746 adx 30 {
747 michael 6428 sendto_realops_flags(UMODE_SERVNOTICE, L_ADMIN, SEND_NOTICE,
748 michael 7997 "%s went dead during handshake", client_get_name(client_p, SHOW_IP));
749 michael 6428 sendto_realops_flags(UMODE_SERVNOTICE, L_OPER, SEND_NOTICE,
750 michael 7997 "%s went dead during handshake", client_get_name(client_p, MASK_IP));
751 michael 6428 return;
752 adx 30 }
753    
754     /* don't move to serv_list yet -- we haven't sent a burst! */
755     /* If we get here, we're ok, so lets start reading some data */
756 michael 8339 comm_setselect(F, COMM_SELECT_READ, read_packet, client_p, 0);
757 adx 30 }
758    
759     struct Client *
760     find_servconn_in_progress(const char *name)
761     {
762     dlink_node *ptr;
763    
764     DLINK_FOREACH(ptr, unknown_list.head)
765     {
766 michael 7533 struct Client *cptr = ptr->data;
767 adx 30
768 michael 7533 if (cptr->name[0])
769     if (!irccmp(name, cptr->name))
770 adx 30 return cptr;
771     }
772 michael 2345
773 adx 30 return NULL;
774     }

Properties

Name Value
svn:eol-style native
svn:keywords Id