/*
* IRC - Internet Relay Chat, ircd/m_account.c
* Copyright (C) 2002 Kevin L. Mitchell <klmitch@mit.edu>
*
* See file AUTHORS in IRC package for additional names of
* the programmers.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 1, or (at your option)
* any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*
* $Id: m_account.c 1633 2006-07-03 17:40:22Z rubin $
*/
/*
* m_functions execute protocol messages on this server:
*
* cptr is always NON-NULL, pointing to a *LOCAL* client
* structure (with an open socket connected!). This
* identifies the physical socket where the message
* originated (or which caused the m_function to be
* executed--some m_functions may call others...).
*
* sptr is the source of the message, defined by the
* prefix part of the message if present. If not
* or prefix not found, then sptr==cptr.
*
* (!IsServer(cptr)) => (cptr == sptr), because
* prefixes are taken *only* from servers...
*
* (IsServer(cptr))
* (sptr == cptr) => the message didn't
* have the prefix.
*
* (sptr != cptr && IsServer(sptr) means
* the prefix specified servername. (?)
*
* (sptr != cptr && !IsServer(sptr) means
* that message originated from a remote
* user (not local).
*
* combining
*
* (!IsServer(sptr)) means that, sptr can safely
* taken as defining the target structure of the
* message in this server.
*
* *Always* true (if 'parse' and others are working correct):
*
* 1) sptr->from == cptr (note: cptr->from == cptr)
*
* 2) MyConnect(sptr) <=> sptr == cptr (e.g. sptr
* *cannot* be a local connection, unless it's
* actually cptr!). [MyConnect(x) should probably
* be defined as (x == x->from) --msa ]
*
* parc number of variable parameter strings (if zero,
* parv is allowed to be NULL)
*
* parv a NULL terminated list of parameter pointers,
*
* parv[0], sender (prefix string), if not present
* this points to an empty string.
* parv[1]...parv[parc-1]
* pointers to additional parameters
* parv[parc] == NULL, *always*
*
* note: it is guaranteed that parv[0]..parv[parc-1] are all
* non-NULL pointers.
*/
#include "config.h"
#include "client.h"
#include "ircd.h"
#include "ircd_alloc.h"
#include "ircd_features.h"
#include "ircd_reply.h"
#include "ircd_string.h"
#include "msg.h"
#include "numnicks.h"
#include "querycmds.h"
#include "s_debug.h"
#include "s_bsd.h"
#include "s_user.h"
#include "send.h"
#include "support.h"
#include <assert.h>
#include <stdlib.h>
#include <string.h>
/*
* decode the request id, as encoded in s_user.c (register_user):
* request-id ::= <period> <fd> <period> <cookie>
*/
static struct Client *decode_auth_id(const char *id)
{
const char *cookiestr;
unsigned int fd, cookie;
struct Client *cptr;
if (!id)
return NULL;
if (id[0] != '.')
return NULL;
if (!(cookiestr = strchr(id + 1, '.')))
return NULL;
fd = atoi(id + 1);
cookie = atoi(cookiestr + 1);
Debug((DEBUG_DEBUG, "ACCOUNT auth id fd=%u cookie=%u", fd, cookie));
#if 1
if (!(cptr = LocalClientArray[fd]))
return NULL;
Debug((DEBUG_DEBUG, "ACCOUNT auth client %s", cli_name(cptr)));
if (!cli_loc(cptr))
return NULL;
Debug((DEBUG_DEBUG, "ACCOUNT auth client %s: cookie %u", cli_name(cptr), cli_loc(cptr)->cookie));
#endif
if (!(cptr = LocalClientArray[fd]) || !cli_loc(cptr) || cli_loc(cptr)->cookie != cookie)
return NULL;
return cptr;
}
/*
* ms_account - server message handler
*
* This func is complex because it has many ways its called:
*
* 0 1 2 3 4
* ----------------------------------------------------
* FEAT_EXTENDED_ACCOUNTS == TRUE :
1* Az AC ABAAC R Rubin 1037526164 -- New (standard)
2* Az AC ABAAC R Rubin -- New but No timestamp
3* Az AC AB A .15.1835576208 1037526164 -- LOC authorised
4* Az AC AB D .15.1835576208 1037526164 -- LOC denied
5* Az AC ABAAC U -- Unregister
6* Az AC ABAAC M Rewbin -- Rename
* FEAT_EXTENDED_ACCOUNTS == FALSE :
7* AK AC AoAAI Rubin 1037526164 -- Old w/ timestamp
8* AK AC AoAAI Rubin -- Original
*
* also, sent FROM ircd to service:
* AB AC AzAAC C .15.1835576208 rubin :password -- LOC Approval
*
* for parv[3] == 'U' (unregister)
* no extra parms
*
* for parv[3] == 'M' (account renaming)
* parv[3] = new account name
*
*/
int ms_account(struct Client* cptr, struct Client* sptr, int parc,
char* parv[])
{
struct Client *acptr;
int hidden;
char type;
if (parc < 3)
return need_more_params(sptr, "ACCOUNT");
if (!IsServer(sptr))
return protocol_violation(cptr, "ACCOUNT from non-server %s",
cli_name(sptr));
if (feature_bool(FEAT_EXTENDED_ACCOUNTS))
{
if (strlen(parv[2]) != 1)
return protocol_violation(cptr, "ACCOUNT detected invalid subcommand token '%s'. Old syntax maybe? See EXTENDED_ACCOUNTS F:line", parv[2]);
type = parv[2][0];
switch(type)
{
case 'U': /* account removal */
if (!(acptr = findNUser(parv[1])))
return 0; /* Ignore ACCOUNT for a user that QUIT; probably crossed */
if (!IsAccount(acptr))
return protocol_violation(cptr, "User %s does not have an account set (ACCOUNT Removal)", cli_name(acptr));
assert(0 != cli_user(acptr)->account[0]);
hidden = HasHiddenHost(acptr);
ClearAccount(acptr);
ircd_strncpy(cli_user(acptr)->account, "", ACCOUNTLEN);
--UserStats.authed;
if (hidden && (feature_int(FEAT_HOST_HIDING_STYLE) == 1))
unhide_hostmask(acptr);
sendcmdto_serv_butone(sptr, CMD_ACCOUNT, cptr, "%C U", acptr);
break;
case 'M': /* account renaming */
if (parc < 4)
return protocol_violation(cptr, "ACCOUNT M (rename) missing new account name param. Is the EXTENDED_ACCOUNTS F:line set right?");
if (!(acptr = findNUser(parv[1])))
return 0; /* Ignore ACCOUNT for a user that QUIT; probably crossed */
if (strlen(parv[3]) > ACCOUNTLEN)
return protocol_violation(cptr, "Received account (%s) longer than %d for %s; ignoring. (rename)",
parv[3], ACCOUNTLEN, cli_name(acptr));
ircd_strncpy(cli_user(acptr)->account, parv[3], ACCOUNTLEN);
hidden = HasHiddenHost(acptr);
if (hidden && (feature_int(FEAT_HOST_HIDING_STYLE) == 1))
hide_hostmask(acptr);
sendcmdto_serv_butone(sptr, CMD_ACCOUNT, cptr, "%C M %s",
acptr, parv[3]);
break;
case 'R': /* account login */
if (parc < 4)
return protocol_violation(cptr, "ACCOUNT called without account name.. Is the EXTENDED_ACCOUNTS F:line set right?");
if (!(acptr = findNUser(parv[1])))
return 0; /* Ignore ACCOUNT for a user that QUIT; probably crossed */
if (IsAccount(acptr))
return protocol_violation(cptr, "ACCOUNT for already registered user %s "
"(%s -> %s)", cli_name(acptr), cli_user(acptr)->account, parv[3]);
assert(0 == cli_user(acptr)->account[0]);
if (strlen(parv[3]) > ACCOUNTLEN)
return protocol_violation(cptr, "Received account (%s) longer than %d for %s; ignoring.",
parv[3], ACCOUNTLEN, cli_name(acptr));
if (parc > 4) {
cli_user(acptr)->acc_create = atoi(parv[4]);
Debug((DEBUG_DEBUG, "Received timestamped account: account \"%s\", "
"timestamp %Tu", parv[3], cli_user(acptr)->acc_create));
}
Debug((DEBUG_DEBUG, "ACC TEST: hf: %s fh %s dh %s id %s dmf %s", HasFakeHost(acptr) ? "1" : "0",
cli_user(acptr)->fakehost, cli_user(acptr)->dnsblhost, IsDNSBLMarked(acptr) ? "1" : "0",
feature_bool(FEAT_DNSBL_MARK_FAKEHOST) ? "1" : "0"));
if (HasFakeHost(acptr) && !ircd_strcmp(cli_user(acptr)->fakehost, cli_user(acptr)->dnsblhost) &&
IsDNSBLMarked(acptr) && feature_bool(FEAT_DNSBL_MARK_FAKEHOST))
ClearFakeHost(acptr);
hidden = HasHiddenHost(acptr);
SetAccount(acptr);
ircd_strncpy(cli_user(acptr)->account, parv[3], ACCOUNTLEN);
++UserStats.authed;
/* Fake hosts have precedence over account-based hidden hosts,
so, if the user was already hidden, don't do it again */
if (!hidden && (feature_int(FEAT_HOST_HIDING_STYLE) == 1))
hide_hostmask(acptr);
sendcmdto_serv_butone(sptr, CMD_ACCOUNT, cptr,
cli_user(acptr)->acc_create ?
"%C R %s %Tu" : "%C R %s",
acptr, cli_user(acptr)->account,
cli_user(acptr)->acc_create);
break;
case 'C': /* LOC request */
if (parc < 6)
return need_more_params(sptr, "ACCOUNT");
/* findNUser("AB") seems to return Sirvulcan, whois numnick is ABAAB..
* This is a bug with findNUser no?
* so you cant do this, because acptr is the user not the server.
* Hopefully reversing them will be ok.
* if (!(acptr = findNUser(parv[1])) && !(acptr = FindNServer(parv[1])))
*/
if (!(acptr = FindNServer(parv[1])) && !(acptr = findNUser(parv[1])))
return 0; /* target not online, ignore */
if (!IsMe(acptr)) {
/* in-transit message, forward it */
sendcmdto_one(sptr, CMD_ACCOUNT, acptr,
type == 'C' ? "%s %s %s %s :%s" : "%s %s %s",
parv[1], parv[2], parv[3], parv[4], parv[parc-1]);
return 0;
} else /* auth checks are for services, not servers */
return protocol_violation(cptr, "ACCOUNT check (%s %s %s)",
parv[3], parv[4], parv[5]);
break;
case 'A':
case 'D':
if (parc < 4)
return need_more_params(sptr, "ACCOUNT");
if (!(acptr = FindNServer(parv[1])))
return 0; /* target not online, ignore */
if (!IsMe(acptr)) {
/* in-transit message, forward it */
sendcmdto_one(sptr, CMD_ACCOUNT, acptr, "%s %s %s",
parv[1], parv[2], parv[3]);
return 0;
}
if (!(acptr = decode_auth_id(parv[3])))
return 0; /* most probably, user disconnected */
/* If we get here its a local user */
if (type == 'A') {
SetAccount(acptr);
ircd_strncpy(cli_user(acptr)->account, cli_loc(acptr)->account, ACCOUNTLEN);
if (feature_int(FEAT_HOST_HIDING_STYLE) == 1) {
SetHiddenHost(acptr);
hide_hostmask(acptr);
}
}
sendcmdto_one(&me, CMD_NOTICE, acptr, "%C :AUTHENTICATION %s as %s", acptr,
type == 'A' ? "SUCCESSFUL" : "FAILED",
cli_loc(acptr)->account);
MyFree(cli_loc(acptr));
if (type == 'D') {
sendcmdto_one(&me, CMD_NOTICE, acptr,
"%C :Type \002/QUOTE PASS\002 to connect anyway",
acptr);
return 0;
}
return register_user(acptr, acptr, cli_name(acptr),
cli_user(acptr)->username);
break;
default:
return protocol_violation(cptr, "ACCOUNT sub-type '%s' not implemented", parv[2]);
break;
}
return 0;
}
else { /* OLD style FEAT_EXTENDED_ACCOUNTS==FALSE accounts */
if (parc > 4)
return protocol_violation(cptr, "ACCOUNT received too many arguments. Is the EXTENDED_ACCOUNTS feature set correctly?");
if (!(acptr = findNUser(parv[1])))
return 0; /* Ignore ACCOUNT for a user that QUIT; probably crossed */
if (IsAccount(acptr))
return protocol_violation(cptr, "ACCOUNT for already registered user %s "
"(%s -> %s)", cli_name(acptr), cli_user(acptr)->account, parv[3]);
assert(0 == cli_user(acptr)->account[0]);
if (strlen(parv[2]) > ACCOUNTLEN)
return protocol_violation(cptr, "Received account (%s) longer than %d for %s; ignoring.",
parv[2], ACCOUNTLEN, cli_name(acptr));
if (parc > 3) {
cli_user(acptr)->acc_create = atoi(parv[3]);
Debug((DEBUG_DEBUG, "Received timestamped account: account \"%s\", "
"timestamp %Tu", parv[2], cli_user(acptr)->acc_create));
}
Debug((DEBUG_DEBUG, "ACC TEST: hf: %s fh %s dh %s id %s dmf %s", HasFakeHost(acptr) ? "1" : "0",
cli_user(acptr)->fakehost, cli_user(acptr)->dnsblhost, IsDNSBLMarked(acptr) ? "1" : "0",
feature_bool(FEAT_DNSBL_MARK_FAKEHOST) ? "1" : "0"));
if (HasFakeHost(acptr) && !ircd_strcmp(cli_user(acptr)->fakehost, cli_user(acptr)->dnsblhost) &&
IsDNSBLMarked(acptr) && feature_bool(FEAT_DNSBL_MARK_FAKEHOST))
ClearFakeHost(acptr);
hidden = HasHiddenHost(acptr);
SetAccount(acptr);
ircd_strncpy(cli_user(acptr)->account, parv[2], ACCOUNTLEN);
++UserStats.authed;
/* Fake hosts have precedence over account-based hidden hosts,
so, if the user was already hidden, don't do it again */
if (!hidden && (feature_int(FEAT_HOST_HIDING_STYLE) == 1))
hide_hostmask(acptr);
sendcmdto_serv_butone(sptr, CMD_ACCOUNT, cptr,
cli_user(acptr)->acc_create ?
"%C %s %Tu" : "%C %s",
acptr, cli_user(acptr)->account,
cli_user(acptr)->acc_create);
return 0;
}
return 0;
}
syntax highlighted by Code2HTML, v. 0.9.1