Add filter.c
This commit is contained in:
parent
1905ab5f7d
commit
a2d9c49410
2 changed files with 371 additions and 0 deletions
|
@ -29,6 +29,7 @@ auto_load_mod_LTLIBRARIES = \
|
|||
m_dline.la \
|
||||
m_encap.la \
|
||||
m_etrace.la \
|
||||
filter.la \
|
||||
m_grant.la \
|
||||
m_help.la \
|
||||
m_info.la \
|
||||
|
|
370
modules/filter.c
Normal file
370
modules/filter.c
Normal file
|
@ -0,0 +1,370 @@
|
|||
/*
|
||||
* ircd-ratbox: A slightly useful ircd.
|
||||
* filter.c: Drop messages we don't like
|
||||
*
|
||||
* Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
|
||||
* Copyright (C) 1996-2002 Hybrid Development Team
|
||||
* Copyright (C) 2002-2005 ircd-ratbox development team
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
|
||||
* USA
|
||||
*
|
||||
* $Id$
|
||||
*/
|
||||
|
||||
#include "stdinc.h"
|
||||
#include "channel.h"
|
||||
#include "client.h"
|
||||
#include "match.h"
|
||||
#include "ircd.h"
|
||||
#include "numeric.h"
|
||||
#include "send.h"
|
||||
#include "s_serv.h"
|
||||
#include "s_newconf.h"
|
||||
#include "msg.h"
|
||||
#include "parse.h"
|
||||
#include "modules.h"
|
||||
#include "operhash.h"
|
||||
#include "inline/stringops.h"
|
||||
#include "msgbuf.h"
|
||||
|
||||
#include <hs_common.h>
|
||||
#include <hs_runtime.h>
|
||||
|
||||
static void filter_msg_user(void *data);
|
||||
static void filter_msg_channel(void *data);
|
||||
static void on_client_exit(void *data);
|
||||
|
||||
static void mo_setfilter(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
|
||||
static void me_setfilter(struct MsgBuf *, struct Client *, struct Client *, int, const char **);
|
||||
|
||||
static char *filter_data = NULL;
|
||||
static size_t filter_data_len = 0;
|
||||
static hs_database_t *filter_db;
|
||||
static hs_scratch_t *filter_scratch;
|
||||
|
||||
static int filter_enable = 1;
|
||||
|
||||
static const char *cmdname[MESSAGE_TYPE_COUNT] = {
|
||||
[MESSAGE_TYPE_PRIVMSG] = "PRIVMSG",
|
||||
[MESSAGE_TYPE_NOTICE] = "NOTICE",
|
||||
};
|
||||
|
||||
enum filter_state {
|
||||
FILTER_EMPTY,
|
||||
FILTER_FILLING,
|
||||
FILTER_LOADED
|
||||
};
|
||||
|
||||
#define ACT_DROP (1 << 0)
|
||||
#define ACT_KILL (1 << 1)
|
||||
#define ACT_ALARM (1 << 2)
|
||||
|
||||
static enum filter_state state = FILTER_EMPTY;
|
||||
static char check_str[21] = "";
|
||||
|
||||
mapi_hfn_list_av1 filter_hfnlist[] = {
|
||||
{ "privmsg_user", (hookfn) filter_msg_user },
|
||||
{ "privmsg_channel", (hookfn) filter_msg_channel },
|
||||
{ "client_exit", (hookfn) on_client_exit },
|
||||
{ NULL, NULL }
|
||||
};
|
||||
|
||||
|
||||
struct Message setfilter_msgtab = {
|
||||
"SETFILTER", 0, 0, 0, 0,
|
||||
{mg_unreg, mg_not_oper, mg_ignore, mg_ignore, {me_setfilter, 2}, {mo_setfilter, 2}}
|
||||
};
|
||||
|
||||
static void
|
||||
moddeinit(void)
|
||||
{
|
||||
if (filter_scratch)
|
||||
hs_free_scratch(filter_scratch);
|
||||
if (filter_db)
|
||||
hs_free_database(filter_db);
|
||||
if (filter_data)
|
||||
rb_free(filter_data);
|
||||
}
|
||||
|
||||
|
||||
mapi_clist_av1 filter_clist[] = { &setfilter_msgtab, NULL };
|
||||
|
||||
DECLARE_MODULE_AV1(filter, NULL, moddeinit, filter_clist, NULL, filter_hfnlist, "$Revision$");
|
||||
|
||||
static int
|
||||
setfilter(const char *check, const char *data, const char **error)
|
||||
{
|
||||
if (error) *error = "unknown";
|
||||
|
||||
if (!strcasecmp(data, "disable")) {
|
||||
filter_enable = 0;
|
||||
sendto_realops_snomask(SNO_GENERAL, L_ALL | L_NETWIDE,
|
||||
"Filtering disabled.");
|
||||
return 0;
|
||||
}
|
||||
if (!strcasecmp(data, "enable")) {
|
||||
filter_enable = 1;
|
||||
sendto_realops_snomask(SNO_GENERAL, L_ALL | L_NETWIDE,
|
||||
"Filtering enabled.");
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (strlen(check) > sizeof check_str - 1) {
|
||||
if (error) *error = "check string too long";
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (!strcasecmp(data, "new")) {
|
||||
if (state == FILTER_FILLING) {
|
||||
rb_free(filter_data);
|
||||
filter_data = 0;
|
||||
filter_data_len = 0;
|
||||
}
|
||||
state = FILTER_FILLING;
|
||||
strcpy(check_str, check);
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (strcmp(check, check_str) != 0) {
|
||||
if (error) *error = "check strings don't match";
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (!strcasecmp(data, "apply")) {
|
||||
if (state != FILTER_FILLING) {
|
||||
if (error) *error = "not loading anything";
|
||||
return -1;
|
||||
}
|
||||
hs_database_t *db;
|
||||
hs_error_t r = hs_deserialize_database(filter_data, filter_data_len, &db);
|
||||
if (r != HS_SUCCESS) {
|
||||
if (error) *error = "couldn't deserialize db";
|
||||
return -1;
|
||||
}
|
||||
r = hs_alloc_scratch(db, &filter_scratch);
|
||||
if (r != HS_SUCCESS) {
|
||||
if (error) *error = "couldn't allocate scratch";
|
||||
return -1;
|
||||
}
|
||||
if (filter_db) {
|
||||
hs_free_database(filter_db);
|
||||
}
|
||||
state = FILTER_LOADED;
|
||||
filter_db = db;
|
||||
sendto_realops_snomask(SNO_GENERAL, L_ALL | L_NETWIDE,
|
||||
"New filters loaded.");
|
||||
rb_free(filter_data);
|
||||
filter_data = 0;
|
||||
filter_data_len = 0;
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (state == FILTER_FILLING) {
|
||||
int dl;
|
||||
unsigned char *d = rb_base64_decode(data, strlen(data), &dl);
|
||||
if (!d) {
|
||||
if (error) *error = "invalid data";
|
||||
return -1;
|
||||
}
|
||||
if (filter_data_len + dl > 10000000ul) {
|
||||
if (error) *error = "data over size limit";
|
||||
rb_free(d);
|
||||
return -1;
|
||||
}
|
||||
filter_data = rb_realloc(filter_data, filter_data_len + dl);
|
||||
memcpy(filter_data + filter_data_len, d, dl);
|
||||
rb_free(d);
|
||||
filter_data_len += dl;
|
||||
} else {
|
||||
if (error) *error = "send \"new\" first";
|
||||
return -1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* /SETFILTER [server-mask] <check> { NEW | APPLY | <data> }
|
||||
* <check> must be the same for the entirety of a new...data...apply run,
|
||||
* and exists just to ensure runs don't mix
|
||||
* NEW prepares a buffer to receive a hyperscan database
|
||||
* <data> is base64 encoded chunks of hyperscan database, which are decoded
|
||||
* and appended to the buffer
|
||||
* APPLY deserialises the buffer and sets the resulting hyperscan database
|
||||
* as the one to use for filtering */
|
||||
static void
|
||||
mo_setfilter(struct MsgBuf *msgbuf, struct Client *client_p, struct Client *source_p, int parc, const char **parv)
|
||||
{
|
||||
int for_me = 0;
|
||||
const char *check;
|
||||
const char *data;
|
||||
if (!IsOperAdmin(source_p)) {
|
||||
sendto_one(source_p, form_str(ERR_NOPRIVS), me.name, source_p->name, "admin");
|
||||
return;
|
||||
}
|
||||
if (parc == 4) {
|
||||
check = parv[2];
|
||||
data = parv[3];
|
||||
if(match(parv[1], me.name)) {
|
||||
for_me = 1;
|
||||
}
|
||||
sendto_match_servs(source_p, parv[1],
|
||||
CAP_ENCAP, NOCAPS,
|
||||
"ENCAP %s SETFILTER %s :%s", parv[1], check, data);
|
||||
} else if (parc == 3) {
|
||||
check = parv[1];
|
||||
data = parv[2];
|
||||
for_me = 1;
|
||||
} else {
|
||||
sendto_one_notice(source_p, ":SETFILTER needs 2 or 3 params, have %d", parc - 1);
|
||||
return;
|
||||
}
|
||||
if (for_me) {
|
||||
const char *error;
|
||||
int r = setfilter(check, data, &error);
|
||||
if (r) {
|
||||
sendto_one_notice(source_p, ":SETFILTER failed: %s", error);
|
||||
} else {
|
||||
sendto_one_notice(source_p, ":SETFILTER ok");
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
static void
|
||||
me_setfilter(struct MsgBuf *msgbuf, struct Client *client_p, struct Client *source_p, int parc, const char **parv)
|
||||
{
|
||||
if(!IsPerson(source_p))
|
||||
return;
|
||||
|
||||
const char *error;
|
||||
int r = setfilter(parv[1], parv[2], &error);
|
||||
if (r) {
|
||||
sendto_one_notice(source_p, ":SETFILTER failed: %s", error);
|
||||
}
|
||||
|
||||
return;
|
||||
}
|
||||
|
||||
/* will be called for every match
|
||||
* hyperscan provides us one piece of information about the expression
|
||||
* matched, an integer ID. we're co-opting the lowest 3 bits of this
|
||||
* as a flag set. conveniently, this means all we really need to do
|
||||
* here is or the IDs together. */
|
||||
int match_callback(unsigned id,
|
||||
unsigned long long from,
|
||||
unsigned long long to,
|
||||
unsigned flags,
|
||||
void *context_)
|
||||
{
|
||||
unsigned *context = context_;
|
||||
*context |= id;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
unsigned match_message(const char *msg)
|
||||
{
|
||||
unsigned state = 0;
|
||||
if (!filter_enable)
|
||||
return 0;
|
||||
if (!filter_db)
|
||||
return 0;
|
||||
hs_error_t r = hs_scan(filter_db, msg, strlen(msg), 0, filter_scratch, match_callback, &state);
|
||||
if (r != HS_SUCCESS && r != HS_SCAN_TERMINATED)
|
||||
return 0;
|
||||
return state;
|
||||
}
|
||||
|
||||
static char check_buffer[2000];
|
||||
|
||||
void
|
||||
filter_msg_user(void *data_)
|
||||
{
|
||||
hook_data_privmsg_user *data = data_;
|
||||
struct Client *s = data->source_p;
|
||||
/* opers are immune to checking, for obvious reasons
|
||||
* anything sent to an oper is also immune, because that should make it
|
||||
* less impossible to deal with reports. */
|
||||
if (IsOper(s) || IsOper(data->target_p)) {
|
||||
return;
|
||||
}
|
||||
char *text = rb_strdup(data->text);
|
||||
strip_colour(text);
|
||||
strip_unprintable(text);
|
||||
snprintf(check_buffer, sizeof check_buffer, ":%s!%s@%s %s %s :%s",
|
||||
s->name, s->username, s->host,
|
||||
cmdname[data->msgtype],
|
||||
data->target_p->name,
|
||||
text);
|
||||
unsigned r = match_message(check_buffer);
|
||||
rb_free(text);
|
||||
if (r & ACT_DROP) {
|
||||
data->approved = 1;
|
||||
}
|
||||
if (r & ACT_KILL) {
|
||||
exit_client(NULL, s, s, "Excess flood");
|
||||
}
|
||||
if (MyClient(s) && r & ACT_ALARM) {
|
||||
sendto_realops_snomask_from(SNO_GENERAL, L_ALL | L_NETWIDE, s->servptr,
|
||||
"FILTER: %s!%s@%s [%s]",
|
||||
s->name, s->username, s->host, s->sockhost);
|
||||
}
|
||||
}
|
||||
|
||||
void
|
||||
filter_msg_channel(void *data_)
|
||||
{
|
||||
hook_data_privmsg_channel *data = data_;
|
||||
struct Client *s = data->source_p;
|
||||
/* just normal oper immunity for channels. i'd like to have a mode that
|
||||
* disables the filter per-channel, but that's for the future */
|
||||
if (IsOper(s)) {
|
||||
return;
|
||||
}
|
||||
char *text = rb_strdup(data->text);
|
||||
strip_colour(text);
|
||||
strip_unprintable(text);
|
||||
snprintf(check_buffer, sizeof check_buffer, ":%s!%s@%s %s %s :%s",
|
||||
s->name, s->username, s->host,
|
||||
cmdname[data->msgtype],
|
||||
data->chptr->chname,
|
||||
text);
|
||||
unsigned r = match_message(check_buffer);
|
||||
rb_free(text);
|
||||
if (r & ACT_DROP) {
|
||||
data->approved = 1;
|
||||
}
|
||||
if (r & ACT_KILL) {
|
||||
exit_client(NULL, s, s, "Excess flood");
|
||||
}
|
||||
if (MyClient(s) && r & ACT_ALARM) {
|
||||
sendto_realops_snomask_from(SNO_GENERAL, L_ALL | L_NETWIDE, s->servptr,
|
||||
"FILTER: %s!%s@%s [%s]",
|
||||
s->name, s->username, s->host, s->sockhost);
|
||||
}
|
||||
}
|
||||
|
||||
void
|
||||
on_client_exit(void *data_)
|
||||
{
|
||||
/* If we see a netsplit, abort the current FILTER_FILLING attempt */
|
||||
hook_data_client_exit *data = data_;
|
||||
|
||||
if (!IsServer(data->target)) return;
|
||||
|
||||
if (state == FILTER_FILLING) {
|
||||
state = filter_db ? FILTER_LOADED : FILTER_EMPTY;
|
||||
}
|
||||
}
|
||||
|
Loading…
Reference in a new issue