static int do_local_user(struct Client *client_p, struct Client *source_p, const char *username, const char *realname) { s_assert(NULL != source_p); s_assert(source_p->username != username); make_user(source_p); lookup_blacklists(source_p); source_p->flags |= FLAGS_SENTUSER; rb_strlcpy(source_p->info, realname, sizeof(source_p->info)); if(!IsGotId(source_p)) rb_strlcpy(source_p->username, username, sizeof(source_p->username)); if(source_p->name[0]) { /* NICK already received, now I have USER... */ return register_local_user(client_p, source_p); } return 0; }
/* do_local_user() * * inputs - * output - NONE * side effects - */ static void do_local_user(struct Client *source_p, const char *username, const char *host, const char *server, const char *realname) { assert(source_p != NULL); assert(source_p->username != username); assert(IsUnknown(source_p)); source_p->localClient->registration &= ~REG_NEED_USER; /* * don't take the clients word for it, ever */ source_p->servptr = &me; strlcpy(source_p->info, realname, sizeof(source_p->info)); /* stash for later */ strlcpy(source_p->localClient->client_host, host, sizeof(source_p->localClient->client_host)); strlcpy(source_p->localClient->client_server, server, sizeof(source_p->localClient->client_server)); if (!IsGotId(source_p)) strlcpy(source_p->username, username, sizeof(source_p->username)); if (!source_p->localClient->registration) register_local_user(source_p); }
static int do_local_user(struct Client *client_p, struct Client *source_p, const char *username, const char *realname) { s_assert(NULL != source_p); s_assert(source_p->username != username); make_user(source_p); if (!(source_p->flags & FLAGS_SENTUSER)) { lookup_blacklists(source_p); source_p->flags |= FLAGS_SENTUSER; } rb_strlcpy(source_p->info, realname, sizeof(source_p->info)); if(!IsGotId(source_p)) { /* This is in this location for a reason..If there is no identd * and ping cookies are enabled..we need to have a copy of this */ rb_strlcpy(source_p->username, username, sizeof(source_p->username)); } if(source_p->name[0]) { /* NICK already received, now I have USER... */ return register_local_user(client_p, source_p, username); } return 0; }
/*! \brief WEBIRC command handler * * \param source_p Pointer to allocated Client struct from which the message * originally comes from. This can be a local or remote client. * \param parc Integer holding the number of supplied arguments. * \param parv Argument vector where parv[0] .. parv[parc-1] are non-NULL * pointers. * \note Valid arguments for this command are: * - parv[0] = command * - parv[1] = password * - parv[2] = fake username (we ignore this) * - parv[3] = fake hostname * - parv[4] = fake ip */ static int mr_webirc(struct Client *source_p, int parc, char *parv[]) { struct MaskItem *conf = NULL; struct addrinfo hints, *res; assert(MyConnect(source_p)); if (!valid_hostname(parv[3])) { sendto_one_notice(source_p, &me, ":WEBIRC: Invalid hostname"); return 0; } conf = find_address_conf(source_p->host, IsGotId(source_p) ? source_p->username : "******", &source_p->connection->ip, source_p->connection->aftype, parv[1]); if (conf == NULL || !IsConfClient(conf)) return 0; if (!IsConfWebIRC(conf)) { sendto_one_notice(source_p, &me, ":Not a WEBIRC auth {} block"); return 0; } if (EmptyString(conf->passwd)) { sendto_one_notice(source_p, &me, ":WEBIRC auth {} blocks must have a password"); return 0; } if (!match_conf_password(parv[1], conf)) { sendto_one_notice(source_p, &me, ":WEBIRC password incorrect"); return 0; } memset(&hints, 0, sizeof(hints)); hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_STREAM; hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST; if (getaddrinfo(parv[4], NULL, &hints, &res)) { sendto_one_notice(source_p, &me, ":Invalid WEBIRC IP %s", parv[4]); return 0; } assert(res); memcpy(&source_p->connection->ip, res->ai_addr, res->ai_addrlen); source_p->connection->ip.ss_len = res->ai_addrlen; source_p->connection->ip.ss.ss_family = res->ai_family; source_p->connection->aftype = res->ai_family; freeaddrinfo(res); strlcpy(source_p->sockhost, parv[4], sizeof(source_p->sockhost)); strlcpy(source_p->host, parv[3], sizeof(source_p->host)); /* Check dlines now, k-lines will be checked on registration */ if ((conf = find_dline_conf(&source_p->connection->ip, source_p->connection->aftype))) { if (!(conf->type == CONF_EXEMPT)) { exit_client(source_p, "D-lined"); return 0; } } AddUMode(source_p, UMODE_WEBIRC); sendto_one_notice(source_p, &me, ":WEBIRC host/IP set to %s %s", parv[3], parv[4]); return 0; }
/* * mr_webirc - webirc message handler * parv[1] = password * parv[2] = fake username (we ignore this) * parv[3] = fake hostname * parv[4] = fake ip */ static int mr_webirc(struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) { struct ConfItem *aconf; const char *encr; if (!strchr(parv[4], '.') && !strchr(parv[4], ':')) { sendto_one(source_p, "NOTICE * :Invalid IP"); return 0; } aconf = find_address_conf(client_p->host, client_p->sockhost, IsGotId(client_p) ? client_p->username : "******", IsGotId(client_p) ? client_p->username : "******", (struct sockaddr *) &client_p->localClient->ip, client_p->localClient->ip.ss_family, NULL); if (aconf == NULL || !(aconf->status & CONF_CLIENT)) return 0; if (!IsConfDoSpoofIp(aconf) || irccmp(aconf->info.name, "webirc.")) { /* XXX */ sendto_one(source_p, "NOTICE * :Not a CGI:IRC auth block"); return 0; } if (EmptyString(aconf->passwd)) { sendto_one(source_p, "NOTICE * :CGI:IRC auth blocks must have a password"); return 0; } if (EmptyString(parv[1])) encr = ""; else if (IsConfEncrypted(aconf)) encr = rb_crypt(parv[1], aconf->passwd); else encr = parv[1]; if (strcmp(encr, aconf->passwd)) { sendto_one(source_p, "NOTICE * :CGI:IRC password incorrect"); return 0; } rb_strlcpy(source_p->sockhost, parv[4], sizeof(source_p->sockhost)); if(strlen(parv[3]) <= HOSTLEN) rb_strlcpy(source_p->host, parv[3], sizeof(source_p->host)); else rb_strlcpy(source_p->host, source_p->sockhost, sizeof(source_p->host)); rb_inet_pton_sock(parv[4], (struct sockaddr *)&source_p->localClient->ip); /* Check dlines now, klines will be checked on registration */ if((aconf = find_dline((struct sockaddr *)&source_p->localClient->ip, source_p->localClient->ip.ss_family))) { if(!(aconf->status & CONF_EXEMPTDLINE)) { exit_client(client_p, source_p, &me, "D-lined"); return 0; } } sendto_one(source_p, "NOTICE * :Congratulations, your host is reset via I:line: %s %s", parv[3], parv[4]); return 0; }
/* * mr_webirc * parv[0] = sender prefix * parv[1] = password * parv[2] = fake username (we ignore this) * parv[3] = fake hostname * parv[4] = fake ip */ static void mr_webirc(struct Client *client_p, struct Client *source_p, int parc, char *parv[]) { struct AccessItem *aconf = NULL; struct ConfItem *conf = NULL; char original_sockhost[HOSTIPLEN + 1]; assert(source_p == client_p); if (invalid_hostname(parv[4])) return; aconf = find_address_conf(source_p->host, IsGotId(source_p) ? source_p->username : "******", &source_p->ip, source_p->ip.ss_family, parv[1], source_p->certfp); if (aconf == NULL || !IsConfClient(aconf)) return; conf = unmap_conf_item(aconf); if (!IsConfDoSpoofIp(aconf) || irccmp(conf->name, "webirc.")) { sendto_realops_flags(UMODE_UNAUTH, L_ALL, "Not a CGI:IRC auth block: %s", source_p->sockhost); return; } if (EmptyString(aconf->passwd)) { sendto_realops_flags(UMODE_UNAUTH, L_ALL, "CGI:IRC auth blocks must have a password"); return; } if (!match_conf_password(parv[1], NULL, aconf)) { sendto_realops_flags(UMODE_UNAUTH, L_ALL, "CGI:IRC password incorrect"); return; } string_to_ip(parv[4], 0, &source_p->ip); strlcpy(original_sockhost, source_p->sockhost, sizeof(original_sockhost)); strlcpy(source_p->sockhost, parv[4], sizeof(source_p->sockhost)); if (strlen(parv[3]) <= HOSTLEN) strlcpy(source_p->host, parv[3], sizeof(source_p->host)); else strlcpy(source_p->host, source_p->sockhost, sizeof(source_p->host)); /* Check dlines now, klines will be checked on registration */ if ((aconf = find_dline_conf(&client_p->ip, client_p->ip.ss_family))) { if (!(aconf->status & CONF_EXEMPTDLINE)) { exit_client(client_p, &me, "D-lined"); return; } } sendto_realops_flags(UMODE_CCONN, L_ALL, "CGI:IRC host/IP set %s to %s (%s)", original_sockhost, parv[3], parv[4]); }
/* * mr_webirc - webirc message handler * parv[1] = password * parv[2] = fake username (we ignore this) * parv[3] = fake hostname * parv[4] = fake ip */ static void mr_webirc(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) { struct ConfItem *aconf; const char *encr; struct rb_sockaddr_storage addr; aconf = find_address_conf(client_p->host, client_p->sockhost, IsGotId(client_p) ? client_p->username : "******", IsGotId(client_p) ? client_p->username : "******", (struct sockaddr *) &client_p->localClient->ip, GET_SS_FAMILY(&client_p->localClient->ip), NULL); if (aconf == NULL || !(aconf->status & CONF_CLIENT)) return; if (!IsConfDoSpoofIp(aconf) || irccmp(aconf->info.name, "webirc.")) { /* XXX */ sendto_one(source_p, "NOTICE * :Not a CGI:IRC auth block"); return; } if (EmptyString(aconf->passwd)) { sendto_one(source_p, "NOTICE * :CGI:IRC auth blocks must have a password"); return; } if (EmptyString(parv[1])) encr = ""; else if (IsConfEncrypted(aconf)) encr = rb_crypt(parv[1], aconf->passwd); else encr = parv[1]; if (encr == NULL || strcmp(encr, aconf->passwd)) { sendto_one(source_p, "NOTICE * :CGI:IRC password incorrect"); return; } if (rb_inet_pton_sock(parv[4], (struct sockaddr *)&addr) <= 0) { sendto_one(source_p, "NOTICE * :Invalid IP"); return; } source_p->localClient->ip = addr; rb_inet_ntop_sock((struct sockaddr *)&source_p->localClient->ip, source_p->sockhost, sizeof(source_p->sockhost)); if(strlen(parv[3]) <= HOSTLEN) rb_strlcpy(source_p->host, parv[3], sizeof(source_p->host)); else rb_strlcpy(source_p->host, source_p->sockhost, sizeof(source_p->host)); /* Check dlines now, klines will be checked on registration */ if((aconf = find_dline((struct sockaddr *)&source_p->localClient->ip, GET_SS_FAMILY(&source_p->localClient->ip)))) { if(!(aconf->status & CONF_EXEMPTDLINE)) { exit_client(client_p, source_p, &me, "D-lined"); return; } } sendto_one(source_p, "NOTICE * :CGI:IRC host/IP set to %s %s", parv[3], parv[4]); }
/* * mr_webirc * parv[0] = sender prefix * parv[1] = password * parv[2] = fake username (we ignore this) * parv[3] = fake hostname * parv[4] = fake ip */ static void mr_webirc(struct Client *client_p, struct Client *source_p, int parc, char *parv[]) { struct AccessItem *aconf = NULL; struct ConfItem *conf = NULL; struct addrinfo hints, *res; char original_sockhost[HOSTIPLEN + 1]; assert(source_p == client_p); if (invalid_hostname(parv[4])) return; aconf = find_address_conf(source_p->host, IsGotId(source_p) ? source_p->username : "******", &source_p->ip, source_p->aftype, parv[1], source_p->certfp); if (aconf == NULL || !IsConfClient(aconf)) return; conf = unmap_conf_item(aconf); if (!IsConfDoSpoofIp(aconf) || irccmp(conf->name, "webirc.")) { sendto_gnotice_flags(UMODE_UNAUTH, L_ALL, me.name, &me, NULL, "Not a CGI:IRC auth block: %s", source_p->sockhost); return; } if (EmptyString(aconf->passwd)) { sendto_gnotice_flags(UMODE_UNAUTH, L_ALL, me.name, &me, NULL, "CGI:IRC auth blocks must have a password"); return; } if (!match_conf_password(parv[1], aconf)) { sendto_gnotice_flags(UMODE_UNAUTH, L_ALL, me.name, &me, NULL, "CGI:IRC password incorrect"); return; } memset(&hints, 0, sizeof(hints)); hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_STREAM; hints.ai_flags = AI_PASSIVE | AI_NUMERICHOST; if (getaddrinfo(parv[4], NULL, &hints, &res)) { sendto_gnotice_flags(UMODE_UNAUTH, L_ALL, me.name, &me, NULL, "Inavlid CGI:IRC IP %s", parv[4]); return; } assert(res != NULL); memcpy(&source_p->ip, res->ai_addr, res->ai_addrlen); source_p->ip.ss_len = res->ai_addrlen; source_p->ip.ss.ss_family = res->ai_family; source_p->aftype = res->ai_family; freeaddrinfo(res); strlcpy(original_sockhost, source_p->sockhost, sizeof(original_sockhost)); strlcpy(source_p->sockhost, parv[4], sizeof(source_p->sockhost)); if (strlen(parv[3]) <= HOSTLEN) strlcpy(source_p->host, parv[3], sizeof(source_p->host)); else strlcpy(source_p->host, source_p->sockhost, sizeof(source_p->host)); /* Check dlines now, k/glines will be checked on registration */ if ((aconf = find_dline_conf(&client_p->ip, client_p->aftype))) { if (!(aconf->status & CONF_EXEMPTDLINE)) { exit_client(client_p, &me, "D-lined"); return; } } sendto_gnotice_flags(UMODE_CCONN, L_ALL, me.name, &me, NULL, "CGI:IRC host/IP set %s to %s (%s)", original_sockhost, parv[3], parv[4]); }