solanum-vs-hackint-and-char.../modules/m_etrace.c
nenolod 212380e3f4 [svn] - the new plan:
+ branches/release-2.1 -> 2.2 base
  + 3.0 -> branches/cxxconversion
  + backport some immediate 3.0 functionality for 2.2
  + other stuff
2007-01-24 22:40:21 -08:00

433 lines
12 KiB
C

/*
* ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
* m_etrace.c: Gives local opers a trace output with added info.
*
* Copyright (C) 2002-2003 Lee Hardy <lee@leeh.co.uk>
* Copyright (C) 2002-2005 ircd-ratbox development team
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are
* met:
*
* 1.Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
* 2.Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3.The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
* IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*
* $Id: m_etrace.c 2775 2006-11-27 11:45:31Z jilles $
*/
#include "stdinc.h"
#include "class.h"
#include "hook.h"
#include "client.h"
#include "hash.h"
#include "common.h"
#include "hash.h"
#include "irc_string.h"
#include "ircd.h"
#include "numeric.h"
#include "commio.h"
#include "s_serv.h"
#include "s_conf.h"
#include "s_newconf.h"
#include "send.h"
#include "msg.h"
#include "parse.h"
#include "modules.h"
static int mo_etrace(struct Client *, struct Client *, int, const char **);
static int me_etrace(struct Client *, struct Client *, int, const char **);
static int mo_chantrace(struct Client *, struct Client *, int, const char **);
static int mo_masktrace(struct Client *, struct Client *, int, const char **);
struct Message etrace_msgtab = {
"ETRACE", 0, 0, 0, MFLG_SLOW,
{mg_ignore, mg_not_oper, mg_ignore, mg_ignore, {me_etrace, 0}, {mo_etrace, 0}}
};
struct Message chantrace_msgtab = {
"CHANTRACE", 0, 0, 0, MFLG_SLOW,
{mg_ignore, mg_not_oper, mg_ignore, mg_ignore, mg_ignore, {mo_chantrace, 2}}
};
struct Message masktrace_msgtab = {
"MASKTRACE", 0, 0, 0, MFLG_SLOW,
{mg_ignore, mg_not_oper, mg_ignore, mg_ignore, mg_ignore, {mo_masktrace, 2}}
};
mapi_clist_av1 etrace_clist[] = { &etrace_msgtab, &chantrace_msgtab, &masktrace_msgtab, NULL };
DECLARE_MODULE_AV1(etrace, NULL, NULL, etrace_clist, NULL, NULL, "$Revision: 2775 $");
static void do_etrace(struct Client *source_p, int ipv4, int ipv6);
static void do_etrace_full(struct Client *source_p);
static void do_single_etrace(struct Client *source_p, struct Client *target_p);
static const char *empty_sockhost = "255.255.255.255";
static const char *spoofed_sockhost = "0";
/*
* m_etrace
* parv[0] = sender prefix
* parv[1] = options [or target]
* parv[2] = [target]
*/
static int
mo_etrace(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
{
if(parc > 1 && !EmptyString(parv[1]))
{
if(!irccmp(parv[1], "-full"))
do_etrace_full(source_p);
#ifdef IPV6
else if(!irccmp(parv[1], "-v6"))
do_etrace(source_p, 0, 1);
else if(!irccmp(parv[1], "-v4"))
do_etrace(source_p, 1, 0);
#endif
else
{
struct Client *target_p = find_named_person(parv[1]);
if(target_p)
{
if(!MyClient(target_p))
sendto_one(target_p, ":%s ENCAP %s ETRACE %s",
get_id(source_p, target_p),
target_p->user->server,
get_id(target_p, target_p));
else
do_single_etrace(source_p, target_p);
}
else
sendto_one_numeric(source_p, ERR_NOSUCHNICK,
form_str(ERR_NOSUCHNICK), parv[1]);
}
}
else
do_etrace(source_p, 1, 1);
return 0;
}
static int
me_etrace(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
{
struct Client *target_p;
if(!IsOper(source_p) || parc < 2 || EmptyString(parv[1]))
return 0;
/* we cant etrace remote clients.. we shouldnt even get sent them */
if((target_p = find_person(parv[1])) && MyClient(target_p))
do_single_etrace(source_p, target_p);
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE),
target_p ? target_p->name : parv[1]);
return 0;
}
static void
do_etrace(struct Client *source_p, int ipv4, int ipv6)
{
struct Client *target_p;
dlink_node *ptr;
/* report all direct connections */
DLINK_FOREACH(ptr, lclient_list.head)
{
target_p = ptr->data;
#ifdef IPV6
if((!ipv4 && target_p->localClient->ip.ss_family == AF_INET) ||
(!ipv6 && target_p->localClient->ip.ss_family == AF_INET6))
continue;
#endif
sendto_one(source_p, form_str(RPL_ETRACE),
me.name, source_p->name,
IsOper(target_p) ? "Oper" : "User",
get_client_class(target_p),
target_p->name, target_p->username, target_p->host,
show_ip(source_p, target_p) ? target_p->sockhost : "255.255.255.255",
target_p->info);
}
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), me.name);
}
static void
do_etrace_full(struct Client *source_p)
{
dlink_node *ptr;
DLINK_FOREACH(ptr, lclient_list.head)
{
do_single_etrace(source_p, ptr->data);
}
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), me.name);
}
/*
* do_single_etrace - searches local clients and displays those matching
* a pattern
* input - source client, target client
* output - etrace results
* side effects - etrace results are displayed
*/
static void
do_single_etrace(struct Client *source_p, struct Client *target_p)
{
/* note, we hide fullcaps for spoofed users, as mirc can often
* advertise its internal ip address in the field --fl
*/
if(!show_ip(source_p, target_p))
sendto_one(source_p, form_str(RPL_ETRACEFULL),
me.name, source_p->name,
IsOper(target_p) ? "Oper" : "User",
get_client_class(target_p),
target_p->name, target_p->username, target_p->host,
"255.255.255.255", "<hidden> <hidden>", target_p->info);
else
sendto_one(source_p, form_str(RPL_ETRACEFULL),
me.name, source_p->name,
IsOper(target_p) ? "Oper" : "User",
get_client_class(target_p),
target_p->name, target_p->username,
target_p->host, target_p->sockhost,
target_p->localClient->fullcaps, target_p->info);
}
static int
mo_chantrace(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
{
struct Client *target_p;
struct Channel *chptr;
struct membership *msptr;
const char *sockhost;
const char *name;
dlink_node *ptr;
int operspy = 0;
name = parv[1];
if(IsOperSpy(source_p) && parv[1][0] == '!')
{
name++;
operspy = 1;
if(EmptyString(name))
{
sendto_one(source_p, form_str(ERR_NEEDMOREPARAMS),
me.name, source_p->name, "CHANTRACE");
return 0;
}
}
if((chptr = find_channel(name)) == NULL)
{
sendto_one_numeric(source_p, ERR_NOSUCHCHANNEL, form_str(ERR_NOSUCHCHANNEL),
name);
return 0;
}
/* dont report operspys for nonexistant channels. */
if(operspy)
report_operspy(source_p, "CHANTRACE", chptr->chname);
if(!operspy && !IsMember(client_p, chptr))
{
sendto_one_numeric(source_p, ERR_NOTONCHANNEL, form_str(ERR_NOTONCHANNEL),
chptr->chname);
return 0;
}
DLINK_FOREACH(ptr, chptr->members.head)
{
msptr = ptr->data;
target_p = msptr->client_p;
if(EmptyString(target_p->sockhost))
sockhost = empty_sockhost;
else if(!show_ip(source_p, target_p))
sockhost = spoofed_sockhost;
else
sockhost = target_p->sockhost;
sendto_one(source_p, form_str(RPL_ETRACE),
me.name, source_p->name,
IsOper(target_p) ? "Oper" : "User",
/* class field -- pretend its server.. */
target_p->servptr->name,
target_p->name, target_p->username, target_p->host,
sockhost, target_p->info);
}
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), me.name);
return 0;
}
static void
match_masktrace(struct Client *source_p, dlink_list *list,
const char *username, const char *hostname, const char *name,
const char *gecos)
{
struct Client *target_p;
dlink_node *ptr;
const char *sockhost;
char *mangle_gecos = NULL;
if(gecos != NULL)
{
if(strstr(gecos, "\\s"))
{
char *tmp = LOCAL_COPY(gecos);
char *orig = tmp;
char *new = tmp;
while(*orig)
{
if(*orig == '\\' && *(orig + 1) != '\0')
{
if(*(orig + 1) == 's')
{
*new++ = ' ';
orig += 2;
}
/* otherwise skip that and the escaped
* character after it, so we dont mistake
* \\s as \s --fl
*/
else
{
*new++ = *orig++;
*new++ = *orig++;
}
}
else
*new++ = *orig++;
}
*new = '\0';
mangle_gecos = LOCAL_COPY(tmp);
}
else
mangle_gecos = LOCAL_COPY(gecos);
}
DLINK_FOREACH(ptr, list->head)
{
target_p = ptr->data;
if(!IsPerson(target_p))
continue;
if(EmptyString(target_p->sockhost))
sockhost = empty_sockhost;
else if(!show_ip(source_p, target_p))
sockhost = spoofed_sockhost;
else
sockhost = target_p->sockhost;
if(match(username, target_p->username) &&
(match(hostname, target_p->host) ||
match(hostname, target_p->orighost) ||
match(hostname, sockhost) || match_ips(hostname, sockhost)))
{
if(name != NULL && !match(name, target_p->name))
continue;
if(mangle_gecos != NULL && !match_esc(mangle_gecos, target_p->info))
continue;
sendto_one(source_p, form_str(RPL_ETRACE),
me.name, source_p->name,
IsOper(target_p) ? "Oper" : "User",
/* class field -- pretend its server.. */
target_p->servptr->name,
target_p->name, target_p->username, target_p->host,
sockhost, target_p->info);
}
}
}
static int
mo_masktrace(struct Client *client_p, struct Client *source_p, int parc,
const char *parv[])
{
char *name, *username, *hostname, *gecos;
const char *mask;
int operspy = 0;
mask = parv[1];
name = LOCAL_COPY(parv[1]);
collapse(name);
if(IsOperSpy(source_p) && parv[1][0] == '!')
{
name++;
mask++;
operspy = 1;
}
if(parc > 2 && !EmptyString(parv[2]))
{
gecos = LOCAL_COPY(parv[2]);
collapse_esc(gecos);
} else
gecos = NULL;
if((hostname = strchr(name, '@')) == NULL)
{
sendto_one(source_p, ":%s NOTICE %s :Invalid parameters", me.name, source_p->name);
return 0;
}
*hostname++ = '\0';
if((username = strchr(name, '!')) == NULL)
{
username = name;
name = NULL;
} else
*username++ = '\0';
if(EmptyString(username) || EmptyString(hostname))
{
sendto_one(source_p, ":%s NOTICE %s :Invalid parameters", me.name, source_p->name);
return 0;
}
if(operspy) {
if (!ConfigFileEntry.operspy_dont_care_user_info)
{
char buf[512];
strlcpy(buf, mask, sizeof(buf));
if(!EmptyString(gecos)) {
strlcat(buf, " ", sizeof(buf));
strlcat(buf, gecos, sizeof(buf));
}
report_operspy(source_p, "MASKTRACE", buf);
}
match_masktrace(source_p, &global_client_list, username, hostname, name, gecos);
} else
match_masktrace(source_p, &lclient_list, username, hostname, name, gecos);
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), me.name);
return 0;
}