diff options
author | brain <brain@e03df62e-2008-0410-955e-edbf42e46eb7> | 2003-02-02 18:59:51 +0000 |
---|---|---|
committer | brain <brain@e03df62e-2008-0410-955e-edbf42e46eb7> | 2003-02-02 18:59:51 +0000 |
commit | a83b933a88f2dd117d21c721490f32eb7da8cded (patch) | |
tree | 4ae62c1f1295c935727223624ada2d04e674057c /src/connection.cpp | |
parent | 5f17c472f7c3c424c3c9fc24db35a6241c938fa6 (diff) |
Forgot this..
git-svn-id: http://svn.inspircd.org/repository/trunk/inspircd@162 e03df62e-2008-0410-955e-edbf42e46eb7
Diffstat (limited to 'src/connection.cpp')
-rw-r--r-- | src/connection.cpp | 243 |
1 files changed, 243 insertions, 0 deletions
diff --git a/src/connection.cpp b/src/connection.cpp new file mode 100644 index 000000000..1d79a00a1 --- /dev/null +++ b/src/connection.cpp @@ -0,0 +1,243 @@ +#include <connection.h> +#include <unistd.h> +#include <fcntl.h> +#include <sys/errno.h> +#include <sys/ioctl.h> +#include <sys/utsname.h> +#include "inspircd.h" + +packet::packet() +{ + srand(time(NULL)); + id = random(); +} + +packet::~packet() +{ +} + +connection::connection() +{ + key = GenKey(); + fd = 0; +} + + +bool connection::CreateListener(char* host, int port) +{ + sockaddr_in host_address; + int flags; + in_addr addy; + + fd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP); + if (fd <= 0) + { + return false; + } + + memset((void*)&host_address, 0, sizeof(host_address)); + + host_address.sin_family = AF_INET; + + if (!strcmp(host,"")) + { + host_address.sin_addr.s_addr = htonl(INADDR_ANY); + } + else + { + inet_aton(host,&addy); + host_address.sin_addr = addy; + } + + host_address.sin_port = htons(port); + + if (bind(fd, (sockaddr*)&host_address, sizeof(host_address))<0) + { + return false; + } + + // make the socket non-blocking + flags = fcntl(fd, F_GETFL, 0); + fcntl(fd, F_SETFL, flags | O_NONBLOCK); + + return true; +} + +bool connection::BeginLink(char* targethost, int port, char* password) +{ + char connect[MAXBUF]; + + if (this->fd) + { + sprintf(connect,"S %s %s :%s",getservername().c_str(),password,getserverdesc().c_str()); + this->haspassed = false; + this->SendPacket(connect, targethost, port); + return true; + } + return false; +} + +// targethost: in dot notation a.b.c.d +void connection::TerminateLink(char* targethost) +{ +} + +// host: in dot notation a.b.c.d +// port: host byte order +bool connection::SendPacket(char *message, char* host, int port) +{ + sockaddr_in host_address; + in_addr addy; + packet p; + + memset((void*)&host_address, 0, sizeof(host_address)); + + host_address.sin_family = AF_INET; + inet_aton(host,&addy); + host_address.sin_addr = addy; + + host_address.sin_port = htons(port); + + strcpy(p.data,message); + p.type = PT_SYN_WITH_DATA; + p.key = key; + + // returns false if the packet could not be sent (e.g. target host down) + if (sendto(fd,&p,sizeof(p),0,(sockaddr*)&host_address,sizeof(host_address))<0) + { + return false; + } + return true; + +} + +bool connection::SendSYN(char* host, int port) +{ + sockaddr_in host_address; + in_addr addy; + packet p; + + memset((void*)&host_address, 0, sizeof(host_address)); + + host_address.sin_family = AF_INET; + inet_aton(host,&addy); + host_address.sin_addr = addy; + + host_address.sin_port = htons(port); + + p.type = PT_SYN_ONLY; + p.key = key; + strcpy(p.data,""); + + if (sendto(fd,&p,sizeof(p),0,(sockaddr*)&host_address,sizeof(host_address))<0) + { + return false; + } + return true; + +} + +bool connection::SendACK(char* host, int port, int reply_id) +{ + sockaddr_in host_address; + in_addr addy; + packet p; + + memset((void*)&host_address, 0, sizeof(host_address)); + + host_address.sin_family = AF_INET; + inet_aton(host,&addy); + host_address.sin_addr = addy; + + host_address.sin_port = htons(port); + + p.type = PT_ACK_ONLY; + p.key = key; + p.id = reply_id; + strcpy(p.data,""); + + if (sendto(fd,&p,sizeof(p),0,(sockaddr*)&host_address,sizeof(host_address))<0) + { + return false; + } + return true; + +} + + +// Generates a server key. This is pseudo-random. +// the server always uses the same server-key in all communications +// across the network. All other servers must remember the server key +// of servers in the network, e.g.: +// +// ServerA: key=5555555555 +// ServerB: key=6666666666 +// I am ServerC: key=77777777777 +// +// If ServerC sees a packet from ServerA, and the key stored for ServerA +// is 0, then cache the key as the servers key. +// after this point, any packet from ServerA which does not contain its key, +// 555555555, will be silently dropped. +// This should prevent blind spoofing, as to fake a server you must know its +// assigned key, and to do that you must receive messages that are origintated +// from it or hack the running executable. +// +// During the AUTH phase (when server passwords are checked, the key in any +// packet MUST be 0). Only the initial SERVER/PASS packets may have a key +// of 0 (and any ACK responses to them). +// + +long connection::GenKey() +{ + srand(time(NULL)); + return (random()*time(NULL)); +} + +// host: in dot notation a.b.c.d +// port: host byte order +bool connection::RecvPacket(char *message, char* host, int &port) +{ + // returns false if no packet waiting for receive, e.g. EAGAIN or ECONNRESET + sockaddr_in host_address; + socklen_t host_address_size; + packet p; + + memset((void*)&host_address, 0, sizeof(host_address)); + + host_address.sin_family=AF_INET; + host_address_size=sizeof(host_address); + + if (recvfrom(fd,&p,sizeof(p),0,(sockaddr*)&host_address,&host_address_size)<0) + { + return false; + } + + if (p.type == PT_SYN_ONLY) + { + strcpy(message,p.data); + strcpy(host,inet_ntoa(host_address.sin_addr)); + port = ntohs(host_address.sin_port); + SendACK(host,port,p.id); + return false; + } + + if (p.type == PT_ACK_ONLY) + { + strcpy(message,p.data); + strcpy(host,inet_ntoa(host_address.sin_addr)); + port = ntohs(host_address.sin_port); + SendACK(host,port,p.id); + return false; + } + + if (p.type == PT_SYN_WITH_DATA) + { + strcpy(message,p.data); + strcpy(host,inet_ntoa(host_address.sin_addr)); + port = ntohs(host_address.sin_port); + SendACK(host,port,p.id); + } + + return true; +} + |