init
This commit is contained in:
267
ircd/s_auth.c
Normal file
267
ircd/s_auth.c
Normal file
@@ -0,0 +1,267 @@
|
||||
/************************************************************************
|
||||
* IRC - Internet Relay Chat, ircd/s_auth.c
|
||||
* Copyright (C) 1992 Darren Reed
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 1, or (at your option)
|
||||
* any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
*/
|
||||
|
||||
#ifndef lint
|
||||
static char sccsid[] = "@(#)s_auth.c 1.18 4/18/94 (C) 1992 Darren Reed";
|
||||
#endif
|
||||
|
||||
#include "struct.h"
|
||||
#include "common.h"
|
||||
#include "sys.h"
|
||||
#include "res.h"
|
||||
#include "numeric.h"
|
||||
#include "patchlevel.h"
|
||||
#include <sys/socket.h>
|
||||
#include <sys/file.h>
|
||||
#include <sys/ioctl.h>
|
||||
#ifdef UNIXPORT
|
||||
# include <sys/un.h>
|
||||
#endif
|
||||
#if defined(__hpux)
|
||||
# include "inet.h"
|
||||
#endif
|
||||
#include <fcntl.h>
|
||||
#include "sock.h" /* If FD_ZERO isn't define up to this point, */
|
||||
/* define it (BSD4.2 needs this) */
|
||||
#include "h.h"
|
||||
|
||||
/*
|
||||
* start_auth
|
||||
*
|
||||
* Flag the client to show that an attempt to contact the ident server on
|
||||
* the client's host. The connect and subsequently the socket are all put
|
||||
* into 'non-blocking' mode. Should the connect or any later phase of the
|
||||
* identifing process fail, it is aborted and the user is given a username
|
||||
* of "unknown".
|
||||
*/
|
||||
void start_auth(cptr)
|
||||
Reg1 aClient *cptr;
|
||||
{
|
||||
struct sockaddr_in sock;
|
||||
int err;
|
||||
#ifdef VIRTUAL_HOST
|
||||
extern struct sockaddr_in vserv;
|
||||
#endif
|
||||
|
||||
Debug((DEBUG_NOTICE,"start_auth(%x) fd %d status %d",
|
||||
cptr, cptr->fd, cptr->status));
|
||||
|
||||
(void)alarm(2);
|
||||
cptr->authfd = socket(AF_INET, SOCK_STREAM, 0);
|
||||
err = errno;
|
||||
(void)alarm(0);
|
||||
if (cptr->authfd < 0 && err == EAGAIN)
|
||||
sendto_ops(
|
||||
"Can't allocate fd for auth on %s : socket: No more sockets",
|
||||
get_client_name(cptr, TRUE));
|
||||
|
||||
if (cptr->authfd < 0)
|
||||
{
|
||||
#ifdef USE_SYSLOG
|
||||
syslog(LOG_ERR, "Unable to create auth socket for %s:%m",
|
||||
get_client_name(cptr, TRUE));
|
||||
#endif
|
||||
Debug((DEBUG_ERROR, "Unable to create auth socket for %s:%s",
|
||||
get_client_name(cptr, TRUE),
|
||||
strerror(get_sockerr(cptr))));
|
||||
if (!DoingDNS(cptr))
|
||||
SetAccess(cptr);
|
||||
ircstp->is_abad++;
|
||||
return;
|
||||
}
|
||||
if (cptr->authfd >= (MAXCONNECTIONS - 2))
|
||||
{
|
||||
sendto_ops("Can't allocate fd for auth on %s",
|
||||
get_client_name(cptr, TRUE));
|
||||
(void)close(cptr->authfd);
|
||||
return;
|
||||
}
|
||||
|
||||
set_non_blocking(cptr->authfd, cptr);
|
||||
|
||||
#ifdef VIRTUAL_HOST
|
||||
if (bind(cptr->authfd, (struct sockaddr *)&vserv,
|
||||
sizeof(vserv)) == -1)
|
||||
{
|
||||
report_error("binding auth stream socket %s:%s", cptr);
|
||||
(void)close(cptr->fd);
|
||||
return;
|
||||
}
|
||||
#endif
|
||||
bcopy((char *)&cptr->ip, (char *)&sock.sin_addr,
|
||||
sizeof(struct in_addr));
|
||||
|
||||
sock.sin_port = htons(113);
|
||||
sock.sin_family = AF_INET;
|
||||
|
||||
(void)alarm((unsigned)4);
|
||||
if (connect(cptr->authfd, (struct sockaddr *)&sock,
|
||||
sizeof(sock)) == -1 && errno != EINPROGRESS)
|
||||
{
|
||||
ircstp->is_abad++;
|
||||
/*
|
||||
* No error report from this...
|
||||
*/
|
||||
(void)alarm((unsigned)0);
|
||||
(void)close(cptr->authfd);
|
||||
cptr->authfd = -1;
|
||||
if (!DoingDNS(cptr))
|
||||
SetAccess(cptr);
|
||||
return;
|
||||
}
|
||||
(void)alarm((unsigned)0);
|
||||
cptr->flags |= (FLAGS_WRAUTH|FLAGS_AUTH);
|
||||
if (cptr->authfd > highest_fd)
|
||||
highest_fd = cptr->authfd;
|
||||
return;
|
||||
}
|
||||
|
||||
/*
|
||||
* send_authports
|
||||
*
|
||||
* Send the ident server a query giving "theirport , ourport".
|
||||
* The write is only attempted *once* so it is deemed to be a fail if the
|
||||
* entire write doesn't write all the data given. This shouldnt be a
|
||||
* problem since the socket should have a write buffer far greater than
|
||||
* this message to store it in should problems arise. -avalon
|
||||
*/
|
||||
void send_authports(cptr)
|
||||
aClient *cptr;
|
||||
{
|
||||
struct sockaddr_in us, them;
|
||||
char authbuf[32];
|
||||
int ulen, tlen;
|
||||
|
||||
Debug((DEBUG_NOTICE,"write_authports(%x) fd %d authfd %d stat %d",
|
||||
cptr, cptr->fd, cptr->authfd, cptr->status));
|
||||
tlen = ulen = sizeof(us);
|
||||
if (getsockname(cptr->fd, (struct sockaddr *)&us, &ulen) ||
|
||||
getpeername(cptr->fd, (struct sockaddr *)&them, &tlen))
|
||||
{
|
||||
#ifdef USE_SYSLOG
|
||||
syslog(LOG_ERR, "auth get{sock,peer}name error for %s:%m",
|
||||
get_client_name(cptr, TRUE));
|
||||
#endif
|
||||
goto authsenderr;
|
||||
}
|
||||
|
||||
(void)sprintf(authbuf, "%u , %u\r\n",
|
||||
(unsigned int)ntohs(them.sin_port),
|
||||
(unsigned int)ntohs(us.sin_port));
|
||||
|
||||
Debug((DEBUG_SEND, "sending [%s] to auth port %s.113",
|
||||
authbuf, inetntoa((char *)&them.sin_addr)));
|
||||
if (write(cptr->authfd, authbuf, strlen(authbuf)) != strlen(authbuf))
|
||||
{
|
||||
authsenderr:
|
||||
ircstp->is_abad++;
|
||||
(void)close(cptr->authfd);
|
||||
if (cptr->authfd == highest_fd)
|
||||
while (!local[highest_fd])
|
||||
highest_fd--;
|
||||
cptr->authfd = -1;
|
||||
cptr->flags &= ~FLAGS_AUTH;
|
||||
if (!DoingDNS(cptr))
|
||||
SetAccess(cptr);
|
||||
}
|
||||
cptr->flags &= ~FLAGS_WRAUTH;
|
||||
return;
|
||||
}
|
||||
|
||||
/*
|
||||
* read_authports
|
||||
*
|
||||
* read the reply (if any) from the ident server we connected to.
|
||||
* The actual read processijng here is pretty weak - no handling of the reply
|
||||
* if it is fragmented by IP.
|
||||
*/
|
||||
void read_authports(cptr)
|
||||
Reg1 aClient *cptr;
|
||||
{
|
||||
Reg1 char *s, *t;
|
||||
Reg2 int len;
|
||||
char ruser[USERLEN+1], system[8];
|
||||
u_short remp = 0, locp = 0;
|
||||
|
||||
*system = *ruser = '\0';
|
||||
Debug((DEBUG_NOTICE,"read_authports(%x) fd %d authfd %d stat %d",
|
||||
cptr, cptr->fd, cptr->authfd, cptr->status));
|
||||
/*
|
||||
* Nasty. Cant allow any other reads from client fd while we're
|
||||
* waiting on the authfd to return a full valid string. Use the
|
||||
* client's input buffer to buffer the authd reply.
|
||||
* Oh. this is needed because an authd reply may come back in more
|
||||
* than 1 read! -avalon
|
||||
*/
|
||||
if ((len = read(cptr->authfd, cptr->buffer + cptr->count,
|
||||
sizeof(cptr->buffer) - 1 - cptr->count)) >= 0)
|
||||
{
|
||||
cptr->count += len;
|
||||
cptr->buffer[cptr->count] = '\0';
|
||||
}
|
||||
|
||||
cptr->lasttime = now;
|
||||
if ((len > 0) && (cptr->count != (sizeof(cptr->buffer) - 1)) &&
|
||||
(sscanf(cptr->buffer, "%hd , %hd : USERID : %*[^:]: %10s",
|
||||
&remp, &locp, ruser) == 3))
|
||||
{
|
||||
s = rindex(cptr->buffer, ':');
|
||||
*s++ = '\0';
|
||||
for (t = (rindex(cptr->buffer, ':') + 1); *t; t++)
|
||||
if (!isspace(*t))
|
||||
break;
|
||||
strncpyzt(system, t, sizeof(system));
|
||||
for (t = ruser; *s && (t < ruser + sizeof(ruser)); s++)
|
||||
if (!isspace(*s) && *s != ':' && *s != '@')
|
||||
*t++ = *s;
|
||||
*t = '\0';
|
||||
Debug((DEBUG_INFO,"auth reply ok [%s] [%s]", system, ruser));
|
||||
}
|
||||
else if (len != 0)
|
||||
{
|
||||
if (!index(cptr->buffer, '\n') && !index(cptr->buffer, '\r'))
|
||||
return;
|
||||
Debug((DEBUG_ERROR,"local %d remote %d", locp, remp));
|
||||
Debug((DEBUG_ERROR,"bad auth reply in [%s]", cptr->buffer));
|
||||
*ruser = '\0';
|
||||
}
|
||||
(void)close(cptr->authfd);
|
||||
if (cptr->authfd == highest_fd)
|
||||
while (!local[highest_fd])
|
||||
highest_fd--;
|
||||
cptr->count = 0;
|
||||
cptr->authfd = -1;
|
||||
ClearAuth(cptr);
|
||||
if (!DoingDNS(cptr))
|
||||
SetAccess(cptr);
|
||||
if (len > 0)
|
||||
Debug((DEBUG_INFO,"ident reply: [%s]", cptr->buffer));
|
||||
|
||||
if (!locp || !remp || !*ruser)
|
||||
{
|
||||
ircstp->is_abad++;
|
||||
return;
|
||||
}
|
||||
ircstp->is_asuc++;
|
||||
strncpyzt(cptr->username, ruser, USERLEN+1);
|
||||
if (strncmp(system, "OTHER", 5))
|
||||
cptr->flags |= FLAGS_GOTID;
|
||||
Debug((DEBUG_INFO, "got username [%s]", ruser));
|
||||
return;
|
||||
}
|
||||
Reference in New Issue
Block a user