/* * ircd-ratbox: A slightly useful ircd. * m_kline.c: Bans/unbans a user. * * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center * Copyright (C) 1996-2002 Hybrid Development Team * Copyright (C) 2002-2005 ircd-ratbox development team * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 * USA * * $Id: m_kline.c 3466 2007-05-19 23:36:51Z jilles $ */ #include "stdinc.h" #include "channel.h" #include "class.h" #include "client.h" #include "common.h" #include "irc_string.h" #include "sprintf_irc.h" #include "ircd.h" #include "hostmask.h" #include "numeric.h" #include "s_conf.h" #include "s_newconf.h" #include "s_log.h" #include "send.h" #include "hash.h" #include "s_serv.h" #include "msg.h" #include "parse.h" #include "modules.h" #include "reject.h" static int mo_kline(struct Client *, struct Client *, int, const char **); static int ms_kline(struct Client *, struct Client *, int, const char **); static int me_kline(struct Client *, struct Client *, int, const char **); static int mo_unkline(struct Client *, struct Client *, int, const char **); static int ms_unkline(struct Client *, struct Client *, int, const char **); static int me_unkline(struct Client *, struct Client *, int, const char **); struct Message kline_msgtab = { "KLINE", 0, 0, 0, MFLG_SLOW, {mg_unreg, mg_not_oper, {ms_kline, 5}, {ms_kline, 5}, {me_kline, 5}, {mo_kline, 3}} }; struct Message unkline_msgtab = { "UNKLINE", 0, 0, 0, MFLG_SLOW, {mg_unreg, mg_not_oper, {ms_unkline, 4}, {ms_unkline, 4}, {me_unkline, 3}, {mo_unkline, 2}} }; mapi_clist_av1 kline_clist[] = { &kline_msgtab, &unkline_msgtab, NULL }; DECLARE_MODULE_AV1(kline, NULL, NULL, kline_clist, NULL, NULL, "$Revision: 3466 $"); /* Local function prototypes */ static int find_user_host(struct Client *source_p, const char *userhost, char *user, char *host); static int valid_comment(struct Client *source_p, char *comment); static int valid_user_host(struct Client *source_p, const char *user, const char *host); static int valid_wild_card(struct Client *source_p, const char *user, const char *host); static void handle_remote_kline(struct Client *source_p, int tkline_time, const char *user, const char *host, const char *reason); static void apply_kline(struct Client *source_p, struct ConfItem *aconf, const char *reason, const char *oper_reason, const char *current_date); static void apply_tkline(struct Client *source_p, struct ConfItem *aconf, const char *, const char *, const char *, int); static int already_placed_kline(struct Client *, const char *, const char *, int); static void handle_remote_unkline(struct Client *source_p, const char *user, const char *host); static void remove_permkline_match(struct Client *, struct ConfItem *); static int flush_write(struct Client *, FILE *, const char *, const char *); static int remove_temp_kline(struct Client *, struct ConfItem *); /* mo_kline() * * parv[1] - temp time or user@host * parv[2] - user@host, "ON", or reason * parv[3] - "ON", reason, or server to target * parv[4] - server to target, or reason * parv[5] - reason */ static int mo_kline(struct Client *client_p, struct Client *source_p, int parc, const char **parv) { char def[] = "No Reason"; char user[USERLEN + 2]; char host[HOSTLEN + 2]; char buffer[IRCD_BUFSIZE]; char *reason = def; char *oper_reason; const char *current_date; const char *target_server = NULL; struct ConfItem *aconf; int tkline_time = 0; int loc = 1; if(!IsOperK(source_p)) { sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "kline"); return 0; } if((tkline_time = valid_temp_time(parv[loc])) >= 0) loc++; /* we just set tkline_time to -1! */ else tkline_time = 0; if(find_user_host(source_p, parv[loc], user, host) == 0) return 0; loc++; if(parc >= loc+2 && !irccmp(parv[loc], "ON")) { if(!IsOperRemoteBan(source_p)) { sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "remoteban"); return 0; } target_server = parv[loc+1]; loc += 2; } if(parc <= loc || EmptyString(parv[loc])) { sendto_one(source_p, form_str(ERR_NEEDMOREPARAMS), me.name, source_p->name, "KLINE"); return 0; } reason = LOCAL_COPY(parv[loc]); if(target_server != NULL) { propagate_generic(source_p, "KLINE", target_server, CAP_KLN, "%d %s %s :%s", tkline_time, user, host, reason); /* If we are sending it somewhere that doesnt include us, stop */ if(!match(target_server, me.name)) return 0; } /* if we have cluster servers, send it to them.. */ else if(rb_dlink_list_length(&cluster_conf_list) > 0) cluster_generic(source_p, "KLINE", (tkline_time > 0) ? SHARED_TKLINE : SHARED_PKLINE, CAP_KLN, "%lu %s %s :%s", tkline_time, user, host, reason); if(!valid_user_host(source_p, user, host) || !valid_wild_card(source_p, user, host) || !valid_comment(source_p, reason)) return 0; if(already_placed_kline(source_p, user, host, tkline_time)) return 0; set_time(); current_date = smalldate(); aconf = make_conf(); aconf->status = CONF_KILL; aconf->host = rb_strdup(host); aconf->user = rb_strdup(user); aconf->port = 0; /* Look for an oper reason */ if((oper_reason = strchr(reason, '|')) != NULL) { *oper_reason = '\0'; oper_reason++; if(!EmptyString(oper_reason)) aconf->spasswd = rb_strdup(oper_reason); } if(tkline_time > 0) { rb_snprintf(buffer, sizeof(buffer), "Temporary K-line %d min. - %s (%s)", (int) (tkline_time / 60), reason, current_date); aconf->passwd = rb_strdup(buffer); apply_tkline(source_p, aconf, reason, oper_reason, current_date, tkline_time); } else { rb_snprintf(buffer, sizeof(buffer), "%s (%s)", reason, current_date); aconf->passwd = rb_strdup(buffer); apply_kline(source_p, aconf, reason, oper_reason, current_date); } if(ConfigFileEntry.kline_delay) { if(kline_queued == 0) { rb_event_addonce("check_klines", check_klines_event, NULL, ConfigFileEntry.kline_delay); kline_queued = 1; } } else check_klines(); return 0; } /* ms_kline() * * parv[1] - server targeted at * parv[2] - tkline time (0 if perm) * parv[3] - user * parv[4] - host * parv[5] - reason */ static int ms_kline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) { int tkline_time = atoi(parv[2]); /* 1.5-3 and earlier contains a bug that allows remote klines to be * sent with an empty reason field. This is a protocol violation, * but its not worth dropping the link over.. --anfl */ if(parc < 6 || EmptyString(parv[5])) return 0; propagate_generic(source_p, "KLINE", parv[1], CAP_KLN, "%d %s %s :%s", tkline_time, parv[3], parv[4], parv[5]); if(!match(parv[1], me.name)) return 0; if(!IsPerson(source_p)) return 0; handle_remote_kline(source_p, tkline_time, parv[3], parv[4], parv[5]); return 0; } static int me_kline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) { /* : */ if(!IsPerson(source_p)) return 0; handle_remote_kline(source_p, atoi(parv[1]), parv[2], parv[3], parv[4]); return 0; } static void handle_remote_kline(struct Client *source_p, int tkline_time, const char *user, const char *host, const char *kreason) { char buffer[BUFSIZE]; const char *current_date; char *reason = LOCAL_COPY(kreason); struct ConfItem *aconf = NULL; char *oper_reason; if(!find_shared_conf(source_p->username, source_p->host, source_p->servptr->name, (tkline_time > 0) ? SHARED_TKLINE : SHARED_PKLINE)) return; if(!valid_user_host(source_p, user, host) || !valid_wild_card(source_p, user, host) || !valid_comment(source_p, reason)) return; if(already_placed_kline(source_p, user, host, tkline_time)) return; aconf = make_conf(); aconf->status = CONF_KILL; aconf->user = rb_strdup(user); aconf->host = rb_strdup(host); /* Look for an oper reason */ if((oper_reason = strchr(reason, '|')) != NULL) { *oper_reason = '\0'; oper_reason++; if(!EmptyString(oper_reason)) aconf->spasswd = rb_strdup(oper_reason); } current_date = smalldate(); if(tkline_time > 0) { rb_snprintf(buffer, sizeof(buffer), "Temporary K-line %d min. - %s (%s)", (int) (tkline_time / 60), reason, current_date); aconf->passwd = rb_strdup(buffer); apply_tkline(source_p, aconf, reason, oper_reason, current_date, tkline_time); } else { rb_snprintf(buffer, sizeof(buffer), "%s (%s)", reason, current_date); aconf->passwd = rb_strdup(buffer); apply_kline(source_p, aconf, reason, oper_reason, current_date); } if(ConfigFileEntry.kline_delay) { if(kline_queued == 0) { rb_event_addonce("check_klines", check_klines_event, NULL, ConfigFileEntry.kline_delay); kline_queued = 1; } } else check_klines(); return; } /* mo_unkline() * * parv[1] - kline to remove * parv[2] - optional "ON" * parv[3] - optional target server */ static int mo_unkline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) { const char *user; char *host; char splat[] = "*"; char *h = LOCAL_COPY(parv[1]); struct ConfItem *aconf; if(!IsOperUnkline(source_p)) { sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "unkline"); return 0; } if((host = strchr(h, '@')) || *h == '*' || strchr(h, '.') || strchr(h, ':')) { /* Explicit user@host mask given */ if(host) /* Found user@host */ { *host++ = '\0'; /* check for @host */ if(*h) user = h; else user = splat; /* check for user@ */ if(!*host) host = splat; } else { user = splat; /* no @ found, assume its *@somehost */ host = h; } } else { sendto_one_notice(source_p, ":Invalid parameters"); return 0; } /* possible remote kline.. */ if((parc > 3) && (irccmp(parv[2], "ON") == 0)) { if(!IsOperRemoteBan(source_p)) { sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "remoteban"); return 0; } propagate_generic(source_p, "UNKLINE", parv[3], CAP_UNKLN, "%s %s", user, host); if(match(parv[3], me.name) == 0) return 0; } else if(rb_dlink_list_length(&cluster_conf_list) > 0) cluster_generic(source_p, "UNKLINE", SHARED_UNKLINE, CAP_UNKLN, "%s %s", user, host); aconf = find_exact_conf_by_address(host, CONF_KILL, user); if(aconf == NULL) { sendto_one_notice(source_p, ":No K-Line for %s@%s", user, host); return 0; } if(remove_temp_kline(source_p, aconf)) return 0; remove_permkline_match(source_p, aconf); return 0; } /* ms_unkline() * * parv[1] - target server * parv[2] - user to unkline * parv[3] - host to unkline */ static int ms_unkline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) { /* parv[0] parv[1] parv[2] parv[3] * oper target server user host */ propagate_generic(source_p, "UNKLINE", parv[1], CAP_UNKLN, "%s %s", parv[2], parv[3]); if(!match(parv[1], me.name)) return 0; if(!IsPerson(source_p)) return 0; handle_remote_unkline(source_p, parv[2], parv[3]); return 0; } static int me_unkline(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) { /* user host */ if(!IsPerson(source_p)) return 0; handle_remote_unkline(source_p, parv[1], parv[2]); return 0; } static void handle_remote_unkline(struct Client *source_p, const char *user, const char *host) { struct ConfItem *aconf; if(!find_shared_conf(source_p->username, source_p->host, source_p->servptr->name, SHARED_UNKLINE)) return; aconf = find_exact_conf_by_address(host, CONF_KILL, user); if(aconf == NULL) { sendto_one_notice(source_p, ":No K-Line for %s@%s", user, host); return; } if(remove_temp_kline(source_p, aconf)) return; remove_permkline_match(source_p, aconf); } /* apply_kline() * * inputs - * output - NONE * side effects - kline as given, is added to the hashtable * and conf file */ static void apply_kline(struct Client *source_p, struct ConfItem *aconf, const char *reason, const char *oper_reason, const char *current_date) { add_conf_by_address(aconf->host, CONF_KILL, aconf->user, aconf); write_confitem(KLINE_TYPE, source_p, aconf->user, aconf->host, reason, oper_reason, current_date, 0); } /* apply_tkline() * * inputs - * output - NONE * side effects - tkline as given is placed */ static void apply_tkline(struct Client *source_p, struct ConfItem *aconf, const char *reason, const char *oper_reason, const char *current_date, int tkline_time) { aconf->hold = rb_current_time() + tkline_time; add_temp_kline(aconf); /* no oper reason.. */ if(EmptyString(oper_reason)) { sendto_realops_snomask(SNO_GENERAL, L_ALL, "%s added temporary %d min. K-Line for [%s@%s] [%s]", get_oper_name(source_p), tkline_time / 60, aconf->user, aconf->host, reason); ilog(L_KLINE, "K %s %d %s %s %s", get_oper_name(source_p), tkline_time / 60, aconf->user, aconf->host, reason); } else { sendto_realops_snomask(SNO_GENERAL, L_ALL, "%s added temporary %d min. K-Line for [%s@%s] [%s|%s]", get_oper_name(source_p), tkline_time / 60, aconf->user, aconf->host, reason, oper_reason); ilog(L_KLINE, "K %s %d %s %s %s|%s", get_oper_name(source_p), tkline_time / 60, aconf->user, aconf->host, reason, oper_reason); } sendto_one_notice(source_p, ":Added temporary %d min. K-Line [%s@%s]", tkline_time / 60, aconf->user, aconf->host); } /* find_user_host() * * inputs - client placing kline, user@host, user buffer, host buffer * output - 0 if not ok to kline, 1 to kline i.e. if valid user host * side effects - */ static int find_user_host(struct Client *source_p, const char *userhost, char *luser, char *lhost) { char *hostp; hostp = strchr(userhost, '@'); if(hostp != NULL) /* I'm a little user@host */ { *(hostp++) = '\0'; /* short and squat */ if(*userhost) strlcpy(luser, userhost, USERLEN + 1); /* here is my user */ else strcpy(luser, "*"); if(*hostp) strlcpy(lhost, hostp, HOSTLEN + 1); /* here is my host */ else strcpy(lhost, "*"); } else { /* no '@', no '.', so its not a user@host or host, therefore * its a nick, which support was removed for. */ if(strchr(userhost, '.') == NULL && strchr(userhost, ':') == NULL) return 0; luser[0] = '*'; /* no @ found, assume its *@somehost */ luser[1] = '\0'; strlcpy(lhost, userhost, HOSTLEN + 1); } return 1; } /* valid_user_host() * * inputs - user buffer, host buffer * output - 0 if invalid, 1 if valid * side effects - */ static int valid_user_host(struct Client *source_p, const char *luser, const char *lhost) { /* # is invalid, as is '!' (n!u@h kline) */ if(strchr(lhost, '#') || strchr(luser, '#') || strchr(luser, '!')) { sendto_one_notice(source_p, ":Invalid K-Line"); return 0; } return 1; } /* valid_wild_card() * * input - user buffer, host buffer * output - 0 if invalid, 1 if valid * side effects - */ static int valid_wild_card(struct Client *source_p, const char *luser, const char *lhost) { const char *p; char tmpch; int nonwild = 0; int bitlen; /* user has no wildcards, always accept -- jilles */ if (!strchr(luser, '?') && !strchr(luser, '*')) return 1; /* check there are enough non wildcard chars */ p = luser; while ((tmpch = *p++)) { if(!IsKWildChar(tmpch)) { /* found enough chars, return */ if(++nonwild >= ConfigFileEntry.min_nonwildcard) return 1; } } /* try host, as user didnt contain enough */ /* special case for cidr masks -- jilles */ if ((p = strrchr(lhost, '/')) != NULL && IsDigit(p[1])) { bitlen = atoi(p + 1); /* much like non-cidr for ipv6, rather arbitrary for ipv4 */ if (bitlen > 0 && bitlen >= (strchr(lhost, ':') ? 4 * (ConfigFileEntry.min_nonwildcard - nonwild) : 6 - 2 * nonwild)) return 1; } else { p = lhost; while ((tmpch = *p++)) { if(!IsKWildChar(tmpch)) if(++nonwild >= ConfigFileEntry.min_nonwildcard) return 1; } } sendto_one_notice(source_p, ":Please include at least %d non-wildcard " "characters with the user@host", ConfigFileEntry.min_nonwildcard); return 0; } /* * valid_comment * inputs - pointer to client * - pointer to comment * output - 0 if no valid comment, 1 if valid * side effects - NONE */ static int valid_comment(struct Client *source_p, char *comment) { if(strchr(comment, '"')) { sendto_one_notice(source_p, ":Invalid character '\"' in comment"); return 0; } if(strlen(comment) > BANREASONLEN) comment[BANREASONLEN] = '\0'; return 1; } /* already_placed_kline() * * inputs - source to notify, user@host to check, tkline time * outputs - 1 if a perm kline or a tkline when a tkline is being * set exists, else 0 * side effects - notifies source_p kline exists */ /* Note: This currently works if the new K-line is a special case of an * existing K-line, but not the other way round. To do that we would * have to walk the hash and check every existing K-line. -A1kmm. */ static int already_placed_kline(struct Client *source_p, const char *luser, const char *lhost, int tkline) { const char *reason, *p; struct rb_sockaddr_storage iphost, *piphost; struct ConfItem *aconf; int t, bits; aconf = find_exact_conf_by_address(lhost, CONF_KILL, luser); if (aconf == NULL && ConfigFileEntry.non_redundant_klines) { bits = 0; if((t = parse_netmask(lhost, (struct sockaddr *)&iphost, &bits)) != HM_HOST) { #ifdef IPV6 if(t == HM_IPV6) t = AF_INET6; else #endif t = AF_INET; piphost = &iphost; } else piphost = NULL; aconf = find_conf_by_address(lhost, NULL, NULL, (struct sockaddr *)piphost, CONF_KILL, t, luser); if (aconf != NULL) { /* The above was really a lookup of a single IP, * so check if the new kline is wider than the * existing one. * -- jilles */ p = strchr(aconf->host, '/'); if (bits > 0 && (p == NULL || bits < atoi(p + 1))) aconf = NULL; } } if (aconf != NULL) { /* setting a tkline, or existing one is perm */ if(tkline || ((aconf->flags & CONF_FLAGS_TEMPORARY) == 0)) { reason = aconf->passwd ? aconf->passwd : ""; sendto_one_notice(source_p, ":[%s@%s] already K-Lined by [%s@%s] - %s", luser, lhost, aconf->user, aconf->host, reason); return 1; } } return 0; } /* remove_permkline_match() * * hunts for a permanent kline, and removes it. */ static void remove_permkline_match(struct Client *source_p, struct ConfItem *aconf) { FILE *in, *out; int pairme = 0; int error_on_write = NO; char buf[BUFSIZE]; char matchbuf[BUFSIZE]; char temppath[BUFSIZE]; const char *filename; const char *host, *user; mode_t oldumask; int matchlen; host = aconf->host; user = aconf->user; rb_snprintf(temppath, sizeof(temppath), "%s.tmp", ConfigFileEntry.klinefile); filename = get_conf_name(KLINE_TYPE); if((in = fopen(filename, "r")) == 0) { sendto_one_notice(source_p, ":Cannot open %s", filename); return; } oldumask = umask(0); if((out = fopen(temppath, "w")) == 0) { sendto_one_notice(source_p, ":Cannot open %s", temppath); fclose(in); umask(oldumask); return; } umask(oldumask); snprintf(matchbuf, sizeof(matchbuf), "\"%s\",\"%s\"", user, host); matchlen = strlen(matchbuf); while (fgets(buf, sizeof(buf), in)) { if(error_on_write) break; if(!strncasecmp(buf, matchbuf, matchlen)) { pairme++; break; } else error_on_write = flush_write(source_p, out, buf, temppath); } /* we dropped out of the loop early because we found a match, * to drop into this somewhat faster loop as we presume we'll never * have two matching klines --anfl */ if(pairme && !error_on_write) { while(fgets(buf, sizeof(buf), in)) { if(error_on_write) break; error_on_write = flush_write(source_p, out, buf, temppath); } } fclose(in); if (fclose(out)) error_on_write = YES; /* The result of the rename should be checked too... oh well */ /* If there was an error on a write above, then its been reported * and I am not going to trash the original kline /conf file */ if(error_on_write) { sendto_one_notice(source_p, ":Couldn't write temp kline file, aborted"); return; } else if(!pairme) { sendto_one_notice(source_p, ":Cannot find K-Line for %s@%s in file", user, host); if(temppath != NULL) (void) unlink(temppath); return; } if (rename(temppath, filename)) { sendto_one_notice(source_p, ":Couldn't rename temp file, aborted"); return; } sendto_one_notice(source_p, ":K-Line for [%s@%s] is removed", user, host); sendto_realops_snomask(SNO_GENERAL, L_ALL, "%s has removed the K-Line for: [%s@%s]", get_oper_name(source_p), user, host); ilog(L_KLINE, "UK %s %s %s", get_oper_name(source_p), user, host); remove_reject_mask(aconf->user, aconf->host); delete_one_address_conf(aconf->host, aconf); return; } /* * flush_write() * * inputs - pointer to client structure of oper requesting unkline * - out is the file descriptor * - buf is the buffer to write * - ntowrite is the expected number of character to be written * - temppath is the temporary file name to be written * output - YES for error on write * - NO for success * side effects - if successful, the buf is written to output file * if a write failure happesn, and the file pointed to * by temppath, if its non NULL, is removed. * * The idea here is, to be as robust as possible when writing to the * kline file. * * -Dianora */ static int flush_write(struct Client *source_p, FILE * out, const char *buf, const char *temppath) { int error_on_write = (fputs(buf, out) < 0) ? YES : NO; if(error_on_write) { sendto_one_notice(source_p, ":Unable to write to %s", temppath); if(temppath != NULL) (void) unlink(temppath); } return (error_on_write); } /* remove_temp_kline() * * inputs - username, hostname to unkline * outputs - * side effects - tries to unkline anything that matches */ static int remove_temp_kline(struct Client *source_p, struct ConfItem *aconf) { rb_dlink_node *ptr; int i; for (i = 0; i < LAST_TEMP_TYPE; i++) { RB_DLINK_FOREACH(ptr, temp_klines[i].head) { if (aconf == ptr->data) { sendto_one_notice(source_p, ":Un-klined [%s@%s] from temporary k-lines", aconf->user, aconf->host); sendto_realops_snomask(SNO_GENERAL, L_ALL, "%s has removed the temporary K-Line for: [%s@%s]", get_oper_name(source_p), aconf->user, aconf->host); ilog(L_KLINE, "UK %s %s %s", get_oper_name(source_p), aconf->user, aconf->host); rb_dlinkDestroy(ptr, &temp_klines[i]); remove_reject_mask(aconf->user, aconf->host); delete_one_address_conf(aconf->host, aconf); return YES; } } } return NO; }