1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
|
/* +------------------------------------+
* | Inspire Internet Relay Chat Daemon |
* +------------------------------------+
*
* InspIRCd: (C) 2002-2009 InspIRCd Development Team
* See: http://wiki.inspircd.org/Credits
*
* This program is free but copyrighted software; see
* the file COPYING for details.
*
* ---------------------------------------------------
*/
#include "inspircd.h"
#include "transport.h"
/* $ModDesc: Provides SSL metadata and /WHOIS information */
class ModuleSSLData : public Module
{
public:
ModuleSSLData(InspIRCd* Me) : Module(Me)
{
Implementation eventlist[] = { I_OnSyncUserMetaData, I_OnDecodeMetaData, I_OnWhois };
ServerInstance->Modules->Attach(eventlist, this, 3);
}
virtual Version GetVersion()
{
return Version("$Id$", VF_VENDOR|VF_COMMON, API_VERSION);
}
// :kenny.chatspike.net 320 Om Epy|AFK :is a Secure Connection
virtual void OnWhois(User* source, User* dest)
{
if(dest->GetExt("ssl"))
{
ServerInstance->SendWhoisLine(source, dest, 320, "%s %s :is using a secure connection", source->nick.c_str(), dest->nick.c_str());
}
}
virtual void OnSyncUserMetaData(User* user, Module* proto, void* opaque, const std::string &extname, bool displayable)
{
// check if the linking module wants to know about OUR metadata
if (extname == "ssl")
{
// check if this user has an ssl field to send
if (!user->GetExt(extname))
return;
// call this function in the linking module, let it format the data how it
// sees fit, and send it on its way. We dont need or want to know how.
proto->ProtoSendMetaData(opaque, TYPE_USER, user, extname, displayable ? "Enabled" : "ON");
}
else if (extname == "ssl_cert")
{
ssl_cert* cert;
if (!user->GetExt("ssl_cert", cert))
return;
std::stringstream value;
bool hasError = cert->GetError().length();
value << (cert->IsInvalid() ? "v" : "V") << (cert->IsTrusted() ? "T" : "t") << (cert->IsRevoked() ? "R" : "r")
<< (cert->IsUnknownSigner() ? "s" : "S") << (hasError ? "E" : "e") << " ";
if (hasError)
value << cert->GetError();
else
value << cert->GetFingerprint() << " " << cert->GetDN() << " " << cert->GetIssuer();
proto->ProtoSendMetaData(opaque, TYPE_USER, user, extname, value.str().c_str());
}
}
virtual void OnDecodeMetaData(int target_type, void* target, const std::string &extname, const std::string &extdata)
{
// check if its our metadata key, and its associated with a user
if ((target_type == TYPE_USER) && (extname == "ssl"))
{
User* dest = static_cast<User*>(target);
// if they dont already have an ssl flag, accept the remote server's
if (!dest->GetExt(extname))
{
dest->Extend(extname);
}
}
else if ((target_type == TYPE_USER) && (extname == "ssl_cert"))
{
User* dest = static_cast<User*>(target);
if (dest->GetExt(extname))
return;
ssl_cert* cert = new ssl_cert;
dest->Extend(extname, cert);
std::stringstream s(extdata);
std::string v;
getline(s,v,' ');
cert->data.insert(std::make_pair("invalid", ConvToStr(v.find('v') != std::string::npos)));
cert->data.insert(std::make_pair("trusted", ConvToStr(v.find('T') != std::string::npos)));
cert->data.insert(std::make_pair("revoked", ConvToStr(v.find('R') != std::string::npos)));
cert->data.insert(std::make_pair("unknownsigner", ConvToStr(v.find('s') != std::string::npos)));
if (v.find('E') != std::string::npos)
{
getline(s,v,'\n');
cert->data.insert(std::make_pair("error", v));
}
else
{
getline(s,v,' ');
cert->data.insert(std::make_pair("fingerprint", v));
getline(s,v,' ');
cert->data.insert(std::make_pair("dn", v));
getline(s,v,'\n');
cert->data.insert(std::make_pair("issuer", v));
}
}
}
};
MODULE_INIT(ModuleSSLData)
|