/* +------------------------------------+ * | Inspire Internet Relay Chat Daemon | * +------------------------------------+ * * InspIRCd is copyright (C) 2002-2006 ChatSpike-Dev. * E-mail: * * * * Written by Craig Edwards, Craig McLure, and others. * This program is free but copyrighted software; see * the file COPYING for details. * * --------------------------------------------------- */ /* Now with added unF! ;) */ using namespace std; #include "inspircd_config.h" #include "inspircd.h" #include "configreader.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #ifdef THREADED_DNS #include #endif #include "users.h" #include "ctables.h" #include "globals.h" #include "modules.h" #include "dynamic.h" #include "wildcard.h" #include "message.h" #include "mode.h" #include "commands.h" #include "xline.h" #include "inspstring.h" #include "dnsqueue.h" #include "helperfuncs.h" #include "hashcomp.h" #include "socketengine.h" #include "userprocess.h" #include "typedefs.h" #include "command_parse.h" #include "cull_list.h" extern struct sockaddr_in client,server; extern socklen_t length; extern std::vector modules; extern std::vector factory; extern std::vector module_sockets; extern time_t TIME; extern time_t OLDTIME; extern std::vector local_users; extern InspSocket* socket_ref[MAX_DESCRIPTORS]; extern InspIRCd* ServerInstance; extern ServerConfig *Config; extern userrec* fd_ref_table[MAX_DESCRIPTORS]; char data[65536]; extern user_hash clientlist; extern chan_hash chanlist; void ProcessUser(userrec* cu) { int result = EAGAIN; if (cu->fd == FD_MAGIC_NUMBER) return; log(DEBUG,"Processing user with fd %d",cu->fd); if (Config->GetIOHook(cu->port)) { int result2 = 0; int MOD_RESULT = 0; try { MOD_RESULT = Config->GetIOHook(cu->port)->OnRawSocketRead(cu->fd,data,65535,result2); log(DEBUG,"Data result returned by module: %d",MOD_RESULT); } catch (ModuleException& modexcept) { log(DEBUG,"Module exception caught: %s",modexcept.GetReason()); } if (MOD_RESULT < 0) { result = -EAGAIN; } else { result = result2; } } else { result = cu->ReadData(data, 65535); } log(DEBUG,"Read result: %d",result); if ((result) && (result != -EAGAIN)) { userrec *current; int currfd; int floodlines; ServerInstance->stats->statsRecv += result; /* * perform a check on the raw buffer as an array (not a string!) to remove * characters 0 and 7 which are illegal in the RFC - replace them with spaces. * hopefully this should stop even more people whining about "Unknown command: *" */ /* * XXX - potential replacement for the below using my beloved pointers. --w00t * XXX - no garauntee there's not \0's in the middle of the data, * and no reason for it to be terminated either. -- Om * * for (char *c = data; data && *data; data++) * { * if (*data == 0 || *data == 7) * data = ' '; * } */ for (int checker = 0; checker < result; checker++) { if ((data[checker] == 0) || (data[checker] == 7)) data[checker] = ' '; } if (result > 0) data[result] = '\0'; current = cu; currfd = current->fd; floodlines = 0; // add the data to the users buffer if (result > 0) { if (!current->AddBuffer(data)) { // AddBuffer returned false, theres too much data in the user's buffer and theyre up to no good. if (current->registered == 7) { // Make sure they arn't flooding long lines. if (TIME > current->reset_due) { current->reset_due = TIME + current->threshold; current->lines_in = 0; } current->lines_in++; if (current->lines_in > current->flood) { log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); kill_link(current,"Excess flood"); return; } else { WriteServ(currfd, "NOTICE %s :Your previous line was too long and was not delivered (Over 512chars) Please shorten it.", current->nick); current->recvq = ""; } } else { WriteOpers("*** Excess flood from %s",(char*)inet_ntoa(current->ip4)); log(DEFAULT,"Excess flood from: %s",(char*)inet_ntoa(current->ip4)); add_zline(120,Config->ServerName,"Flood from unregistered connection",(char*)inet_ntoa(current->ip4)); apply_lines(APPLY_ZLINES); } return; } if (current->recvq.length() > (unsigned)Config->NetBufferSize) { if (current->registered == 7) { kill_link(current,"RecvQ exceeded"); } else { WriteOpers("*** Excess flood from %s",(char*)inet_ntoa(current->ip4)); log(DEFAULT,"Excess flood from: %s",(char*)inet_ntoa(current->ip4)); add_zline(120,Config->ServerName,"Flood from unregistered connection",(char*)inet_ntoa(current->ip4)); apply_lines(APPLY_ZLINES); } return; } // while there are complete lines to process... while (current->BufferIsReady()) { char sanitized[MAXBUF]; floodlines++; if (TIME > current->reset_due) { current->reset_due = TIME + current->threshold; current->lines_in = 0; } current->lines_in++; if (current->lines_in > current->flood) { log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); kill_link(current,"Excess flood"); return; } if ((floodlines > current->flood) && (current->flood != 0)) { if (current->registered == 7) { log(DEFAULT,"Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); WriteOpers("*** Excess flood from: %s!%s@%s",current->nick,current->ident,current->host); kill_link(current,"Excess flood"); } else { add_zline(120,Config->ServerName,"Flood from unregistered connection",(char*)inet_ntoa(current->ip4)); apply_lines(APPLY_ZLINES); } return; } // use GetBuffer to copy single lines into the sanitized string std::string single_line = current->GetBuffer(); current->bytes_in += single_line.length(); current->cmds_in++; strlcpy(sanitized,single_line.c_str(),511); if (*sanitized) { userrec* old_comp = fd_ref_table[currfd]; ServerInstance->Parser->ProcessBuffer(sanitized,current); /* * look for the user's record in case it's changed... if theyve quit, * we cant do anything more with their buffer, so bail. * there used to be an ugly, slow loop here. Now we have a reference * table, life is much easier (and FASTER) */ userrec* new_comp = fd_ref_table[currfd]; if ((currfd < 0) || (!fd_ref_table[currfd]) || (old_comp != new_comp)) { return; } else { /* The user is still here, flush their buffer */ current->FlushWriteBuf(); } } } return; } if ((result == -1) && (errno != EAGAIN) && (errno != EINTR)) { log(DEBUG,"killing: %s",cu->nick); kill_link(cu,strerror(errno)); return; } } // result EAGAIN means nothing read else if ((result == EAGAIN) || (result == -EAGAIN)) { /* do nothing */ } else if (result == 0) { log(DEBUG,"InspIRCd: Exited: %s",cu->nick); kill_link(cu,"Client exited"); log(DEBUG,"Bailing from client exit"); return; } } void DoSocketTimeouts(time_t TIME) { unsigned int numsockets = module_sockets.size(); SocketEngine* SE = ServerInstance->SE; for (std::vector::iterator a = module_sockets.begin(); a < module_sockets.end(); a++) { InspSocket* s = (InspSocket*)*a; if ((s) && (s->GetFd() >= 0) && (s->GetFd() < MAX_DESCRIPTORS) && (socket_ref[s->GetFd()] != NULL) && (s->Timeout(TIME))) { log(DEBUG,"userprocess.cpp: Socket poll returned false, close and bail"); socket_ref[s->GetFd()] = NULL; SE->DelFd(s->GetFd()); module_sockets.erase(a); s->Close(); DELETE(s); break; } if (module_sockets.size() != numsockets) break; } } /** * This function is called once a second from the mainloop. * It is intended to do background checking on all the user structs, e.g. * stuff like ping checks, registration timeouts, etc. This function is * also responsible for checking if InspSocket derived classes are timed out. */ void DoBackgroundUserStuff(time_t TIME) { CullList GlobalGoners; for (std::vector::iterator count2 = local_users.begin(); count2 != local_users.end(); count2++) { /* Sanity checks for corrupted iterators (yes, really) */ userrec* curr = NULL; if (*count2) curr = (userrec*)(*count2); if ((long)curr == -1) return; if (curr) { /* * registration timeout -- didnt send USER/NICK/HOST * in the time specified in their connection class. */ if (((unsigned)TIME > (unsigned)curr->timeout) && (curr->registered != 7)) { log(DEBUG,"InspIRCd: registration timeout: %s",curr->nick); GlobalGoners.AddItem(curr,"Registration timeout"); continue; } /* * user has signed on with USER/NICK/PASS, and dns has completed, all the modules * say this user is ok to proceed, fully connect them. */ if ((TIME > curr->signon) && (curr->registered == 3) && (AllModulesReportReady(curr))) { curr->dns_done = true; ServerInstance->stats->statsDnsBad++; FullConnectUser(curr,&GlobalGoners); continue; } if ((curr->dns_done) && (curr->registered == 3) && (AllModulesReportReady(curr))) { log(DEBUG,"dns done, registered=3, and modules ready, OK"); FullConnectUser(curr,&GlobalGoners); continue; } // It's time to PING this user. Send them a ping. if ((TIME > curr->nping) && (curr->registered == 7)) { // This user didn't answer the last ping, remove them if (!curr->lastping) { GlobalGoners.AddItem(curr,"Ping timeout"); continue; } Write(curr->fd,"PING :%s",Config->ServerName); curr->lastping = 0; curr->nping = TIME+curr->pingmax; } /* * We can flush the write buffer as the last thing we do, because if they * match any of the above conditions its no use flushing their buffer anyway. */ curr->FlushWriteBuf(); if (*curr->GetWriteError()) { GlobalGoners.AddItem(curr,curr->GetWriteError()); continue; } } } /* Remove all the queued users who are due to be quit, free memory used. */ GlobalGoners.Apply(); }