776 lines
19 KiB
C
776 lines
19 KiB
C
/*
|
|
* ircd-ratbox: A slightly useful ircd.
|
|
* m_trace.c: Traces a path to a client/server.
|
|
*
|
|
* Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
|
|
* Copyright (C) 1996-2002 Hybrid Development Team
|
|
* Copyright (C) 2002-2012 ircd-ratbox development team
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
|
|
* USA
|
|
*
|
|
* $Id: m_trace.c 27371 2012-03-16 05:33:15Z dubkat $
|
|
*/
|
|
|
|
#include "stdinc.h"
|
|
#include "struct.h"
|
|
#include "class.h"
|
|
#include "client.h"
|
|
#include "hash.h"
|
|
#include "match.h"
|
|
#include "ircd.h"
|
|
#include "numeric.h"
|
|
#include "s_serv.h"
|
|
#include "s_conf.h"
|
|
#include "hook.h"
|
|
#include "send.h"
|
|
#include "parse.h"
|
|
#include "modules.h"
|
|
#include "channel.h"
|
|
#include "s_newconf.h"
|
|
#include "s_log.h"
|
|
|
|
static int m_trace(struct Client *, struct Client *, int, const char **);
|
|
static int mo_etrace(struct Client *, struct Client *, int, const char **);
|
|
static int me_etrace(struct Client *, struct Client *, int, const char **);
|
|
static int mo_chantrace(struct Client *, struct Client *, int, const char **);
|
|
static int mo_masktrace(struct Client *, struct Client *, int, const char **);
|
|
|
|
static void trace_spy(struct Client *, struct Client *);
|
|
|
|
|
|
struct Message chantrace_msgtab = {
|
|
"CHANTRACE", 0, 0, 0, MFLG_SLOW,
|
|
{mg_ignore, mg_not_oper, mg_ignore, mg_ignore, mg_ignore, {mo_chantrace, 2}}
|
|
};
|
|
|
|
struct Message masktrace_msgtab = {
|
|
"MASKTRACE", 0, 0, 0, MFLG_SLOW,
|
|
{mg_ignore, mg_not_oper, mg_ignore, mg_ignore, mg_ignore, {mo_masktrace, 2}}
|
|
};
|
|
|
|
struct Message etrace_msgtab = {
|
|
"ETRACE", 0, 0, 0, MFLG_SLOW,
|
|
{mg_ignore, mg_not_oper, mg_ignore, mg_ignore, {me_etrace, 0}, {mo_etrace, 0}}
|
|
};
|
|
|
|
struct Message trace_msgtab = {
|
|
"TRACE", 0, 0, 0, MFLG_SLOW,
|
|
{mg_unreg, {m_trace, 0}, {m_trace, 0}, mg_ignore, mg_ignore, {m_trace, 0}}
|
|
};
|
|
|
|
static void do_etrace(struct Client *source_p, int ipv4, int ipv6);
|
|
static void do_etrace_full(struct Client *source_p);
|
|
static void do_single_etrace(struct Client *source_p, struct Client *target_p);
|
|
static void count_downlinks(struct Client *server_p, int *pservcount, int *pusercount);
|
|
static int report_this_status(struct Client *source_p, struct Client *target_p);
|
|
|
|
static const char *empty_sockhost = "255.255.255.255";
|
|
static const char *spoofed_sockhost = "0";
|
|
|
|
int doing_trace_hook;
|
|
|
|
mapi_clist_av1 trace_clist[] =
|
|
{ &trace_msgtab, &etrace_msgtab, &chantrace_msgtab, &masktrace_msgtab, NULL };
|
|
mapi_hlist_av1 trace_hlist[] = {
|
|
{"doing_trace", &doing_trace_hook},
|
|
{NULL, NULL}
|
|
};
|
|
|
|
DECLARE_MODULE_AV1(trace, NULL, NULL, trace_clist, trace_hlist, NULL, "$Revision: 27371 $");
|
|
|
|
|
|
/*
|
|
* m_trace
|
|
* parv[0] = sender prefix
|
|
* parv[1] = servername
|
|
*/
|
|
static int
|
|
m_trace(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
|
|
{
|
|
struct Client *target_p = NULL;
|
|
struct Class *cltmp;
|
|
const char *tname;
|
|
int doall = 0;
|
|
int cnt = 0, wilds, dow;
|
|
rb_dlink_node *ptr;
|
|
|
|
if(parc > 1)
|
|
{
|
|
tname = parv[1];
|
|
|
|
if(parc > 2)
|
|
{
|
|
if(hunt_server(client_p, source_p, ":%s TRACE %s :%s", 2, parc, parv) !=
|
|
HUNTED_ISME)
|
|
return 0;
|
|
}
|
|
}
|
|
else
|
|
tname = me.name;
|
|
|
|
/* if we have 3 parameters, then the command is directed at us. So
|
|
* we shouldnt be forwarding it anywhere. --anfl
|
|
*/
|
|
if(parc < 3)
|
|
{
|
|
switch (hunt_server(client_p, source_p, ":%s TRACE :%s", 1, parc, parv))
|
|
{
|
|
case HUNTED_PASS: /* note: gets here only if parv[1] exists */
|
|
{
|
|
struct Client *ac2ptr;
|
|
|
|
if(MyClient(source_p))
|
|
ac2ptr = find_named_client(tname);
|
|
else
|
|
ac2ptr = find_client(tname);
|
|
|
|
if(ac2ptr == NULL)
|
|
{
|
|
RB_DLINK_FOREACH(ptr, global_client_list.head)
|
|
{
|
|
ac2ptr = ptr->data;
|
|
|
|
if(match(tname, ac2ptr->name)
|
|
|| match(ac2ptr->name, tname))
|
|
break;
|
|
else
|
|
ac2ptr = NULL;
|
|
}
|
|
}
|
|
|
|
/* giving this out with flattened links defeats the
|
|
* object --fl
|
|
*/
|
|
if(IsOper(source_p) || IsExemptShide(source_p) ||
|
|
!ConfigServerHide.flatten_links)
|
|
sendto_one_numeric(source_p, RPL_TRACELINK,
|
|
form_str(RPL_TRACELINK),
|
|
ircd_version,
|
|
ac2ptr ? ac2ptr->name : tname,
|
|
ac2ptr ? ac2ptr->from->name : "EEK!");
|
|
|
|
return 0;
|
|
}
|
|
|
|
case HUNTED_ISME:
|
|
break;
|
|
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
if(match(tname, me.name))
|
|
{
|
|
doall = 1;
|
|
}
|
|
/* if theyre tracing our SID, we need to move tname to our name so
|
|
* we dont give the sid in ENDOFTRACE
|
|
*/
|
|
else if(!MyClient(source_p) && !strcmp(tname, me.id))
|
|
{
|
|
doall = 1;
|
|
tname = me.name;
|
|
}
|
|
|
|
wilds = (strpbrk(tname, "*?") != NULL);
|
|
dow = wilds || doall;
|
|
|
|
/* specific trace */
|
|
if(dow == 0)
|
|
{
|
|
if(MyClient(source_p) || parc > 2)
|
|
target_p = find_named_person(tname);
|
|
else
|
|
target_p = find_person(tname);
|
|
|
|
/* tname could be pointing to an ID at this point, so reset
|
|
* it to target_p->name if we have a target --fl
|
|
*/
|
|
if(target_p != NULL)
|
|
{
|
|
report_this_status(source_p, target_p);
|
|
tname = target_p->name;
|
|
}
|
|
|
|
trace_spy(source_p, target_p);
|
|
|
|
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), tname);
|
|
return 0;
|
|
}
|
|
|
|
trace_spy(source_p, NULL);
|
|
|
|
/* give non-opers a limited trace output of themselves (if local),
|
|
* opers and servers (if no shide) --fl
|
|
*/
|
|
if(!IsOper(source_p))
|
|
{
|
|
SetCork(source_p);
|
|
if(MyClient(source_p))
|
|
{
|
|
if(doall || (wilds && match(tname, source_p->name)))
|
|
report_this_status(source_p, source_p);
|
|
}
|
|
|
|
RB_DLINK_FOREACH(ptr, oper_list.head)
|
|
{
|
|
target_p = ptr->data;
|
|
|
|
if(!doall && wilds && (match(tname, target_p->name) == 0))
|
|
continue;
|
|
|
|
report_this_status(source_p, target_p);
|
|
}
|
|
|
|
RB_DLINK_FOREACH(ptr, serv_list.head)
|
|
{
|
|
target_p = ptr->data;
|
|
|
|
if(!doall && wilds && !match(tname, target_p->name))
|
|
continue;
|
|
|
|
report_this_status(source_p, target_p);
|
|
}
|
|
ClearCork(source_p);
|
|
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), tname);
|
|
return 0;
|
|
}
|
|
|
|
/* source_p is opered */
|
|
SetCork(source_p);
|
|
/* report all direct connections */
|
|
RB_DLINK_FOREACH(ptr, lclient_list.head)
|
|
{
|
|
target_p = ptr->data;
|
|
|
|
/* dont show invisible users to remote opers */
|
|
if(IsInvisible(target_p) && dow && !MyConnect(source_p) && !IsOper(target_p))
|
|
continue;
|
|
|
|
if(!doall && wilds && !match(tname, target_p->name))
|
|
continue;
|
|
|
|
cnt = report_this_status(source_p, target_p);
|
|
}
|
|
|
|
RB_DLINK_FOREACH(ptr, serv_list.head)
|
|
{
|
|
target_p = ptr->data;
|
|
|
|
if(!doall && wilds && !match(tname, target_p->name))
|
|
continue;
|
|
|
|
cnt = report_this_status(source_p, target_p);
|
|
}
|
|
|
|
if(MyConnect(source_p))
|
|
{
|
|
RB_DLINK_FOREACH(ptr, unknown_list.head)
|
|
{
|
|
target_p = ptr->data;
|
|
|
|
if(!doall && wilds && !match(tname, target_p->name))
|
|
continue;
|
|
|
|
cnt = report_this_status(source_p, target_p);
|
|
}
|
|
}
|
|
ClearCork(source_p);
|
|
/*
|
|
* Add these lines to summarize the above which can get rather long
|
|
* and messy when done remotely - Avalon
|
|
*/
|
|
if(!cnt)
|
|
{
|
|
sendto_one_numeric(source_p, ERR_NOSUCHSERVER, form_str(ERR_NOSUCHSERVER), tname);
|
|
|
|
/* let the user have some idea that its at the end of the
|
|
* trace
|
|
*/
|
|
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), tname);
|
|
return 0;
|
|
}
|
|
|
|
if(doall)
|
|
{
|
|
SetCork(source_p);
|
|
RB_DLINK_FOREACH(ptr, class_list.head)
|
|
{
|
|
cltmp = ptr->data;
|
|
|
|
if(CurrUsers(cltmp) > 0)
|
|
sendto_one_numeric(source_p, RPL_TRACECLASS,
|
|
form_str(RPL_TRACECLASS),
|
|
ClassName(cltmp), CurrUsers(cltmp));
|
|
}
|
|
ClearCork(source_p);
|
|
}
|
|
|
|
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), tname);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* count_downlinks
|
|
*
|
|
* inputs - pointer to server to count
|
|
* - pointers to server and user count
|
|
* output - NONE
|
|
* side effects - server and user counts are added to given values
|
|
*/
|
|
static void
|
|
count_downlinks(struct Client *server_p, int *pservcount, int *pusercount)
|
|
{
|
|
rb_dlink_node *ptr;
|
|
|
|
(*pservcount)++;
|
|
*pusercount += rb_dlink_list_length(&server_p->serv->users);
|
|
RB_DLINK_FOREACH(ptr, server_p->serv->servers.head)
|
|
{
|
|
count_downlinks(ptr->data, pservcount, pusercount);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* report_this_status
|
|
*
|
|
* inputs - pointer to client to report to
|
|
* - pointer to client to report about
|
|
* output - counter of number of hits
|
|
* side effects - NONE
|
|
*/
|
|
static int
|
|
report_this_status(struct Client *source_p, struct Client *target_p)
|
|
{
|
|
const char *name;
|
|
const char *class_name;
|
|
char ip[HOSTIPLEN];
|
|
int cnt = 0;
|
|
|
|
/* sanity check - should never happen */
|
|
if(!MyConnect(target_p))
|
|
return 0;
|
|
|
|
rb_inet_ntop_sock((struct sockaddr *)&target_p->localClient->ip, ip, sizeof(ip));
|
|
class_name = get_client_class(target_p);
|
|
|
|
if(IsAnyServer(target_p))
|
|
name = target_p->name;
|
|
else
|
|
name = get_client_name(target_p, HIDE_IP);
|
|
|
|
switch (target_p->status)
|
|
{
|
|
case STAT_CONNECTING:
|
|
sendto_one_numeric(source_p, RPL_TRACECONNECTING,
|
|
form_str(RPL_TRACECONNECTING), class_name, name);
|
|
cnt++;
|
|
break;
|
|
|
|
case STAT_HANDSHAKE:
|
|
sendto_one_numeric(source_p, RPL_TRACEHANDSHAKE,
|
|
form_str(RPL_TRACEHANDSHAKE), class_name, name);
|
|
cnt++;
|
|
break;
|
|
|
|
case STAT_ME:
|
|
break;
|
|
|
|
case STAT_UNKNOWN:
|
|
/* added time -Taner */
|
|
sendto_one_numeric(source_p, RPL_TRACEUNKNOWN,
|
|
form_str(RPL_TRACEUNKNOWN),
|
|
class_name, name, ip,
|
|
rb_current_time() - target_p->localClient->firsttime);
|
|
cnt++;
|
|
break;
|
|
|
|
case STAT_CLIENT:
|
|
{
|
|
int tnumeric = RPL_TRACEUSER;
|
|
if(IsOper(target_p))
|
|
tnumeric = RPL_TRACEOPERATOR;
|
|
|
|
sendto_one_numeric(source_p, tnumeric, form_str(tnumeric),
|
|
class_name, name,
|
|
show_ip(source_p, target_p) ? ip : empty_sockhost,
|
|
rb_current_time() - target_p->localClient->lasttime,
|
|
rb_current_time() - target_p->localClient->last);
|
|
cnt++;
|
|
}
|
|
break;
|
|
|
|
|
|
case STAT_SERVER:
|
|
{
|
|
int usercount = 0;
|
|
int servcount = 0;
|
|
|
|
count_downlinks(target_p, &servcount, &usercount);
|
|
|
|
sendto_one_numeric(source_p, RPL_TRACESERVER, form_str(RPL_TRACESERVER),
|
|
class_name, servcount, usercount, name,
|
|
*(target_p->serv->by) ? target_p->serv->by : "*", "*",
|
|
me.name,
|
|
rb_current_time() - target_p->localClient->lasttime);
|
|
cnt++;
|
|
|
|
}
|
|
break;
|
|
|
|
default: /* ...we actually shouldn't come here... --msa */
|
|
sendto_one_numeric(source_p, RPL_TRACENEWTYPE,
|
|
form_str(RPL_TRACENEWTYPE), me.name, source_p->name, name);
|
|
cnt++;
|
|
break;
|
|
}
|
|
|
|
return (cnt);
|
|
}
|
|
|
|
/* trace_spy()
|
|
*
|
|
* input - pointer to client
|
|
* output - none
|
|
* side effects - hook event doing_trace is called
|
|
*/
|
|
static void
|
|
trace_spy(struct Client *source_p, struct Client *target_p)
|
|
{
|
|
hook_data_client hdata;
|
|
|
|
hdata.client = source_p;
|
|
hdata.target = target_p;
|
|
|
|
call_hook(doing_trace_hook, &hdata);
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
* m_etrace
|
|
* parv[0] = sender prefix
|
|
* parv[1] = options [or target]
|
|
* parv[2] = [target]
|
|
*/
|
|
static int
|
|
mo_etrace(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
|
|
{
|
|
if(parc > 1 && !EmptyString(parv[1]))
|
|
{
|
|
if(!irccmp(parv[1], "-full"))
|
|
do_etrace_full(source_p);
|
|
#ifdef RB_IPV6
|
|
else if(!irccmp(parv[1], "-v6"))
|
|
do_etrace(source_p, 0, 1);
|
|
else if(!irccmp(parv[1], "-v4"))
|
|
do_etrace(source_p, 1, 0);
|
|
#endif
|
|
else
|
|
{
|
|
struct Client *target_p = find_named_person(parv[1]);
|
|
|
|
if(target_p)
|
|
{
|
|
if(!MyClient(target_p))
|
|
sendto_one(target_p, ":%s ENCAP %s ETRACE %s",
|
|
get_id(source_p, target_p),
|
|
target_p->servptr->name,
|
|
get_id(target_p, target_p));
|
|
else
|
|
do_single_etrace(source_p, target_p);
|
|
}
|
|
else
|
|
sendto_one_numeric(source_p, ERR_NOSUCHNICK,
|
|
form_str(ERR_NOSUCHNICK), parv[1]);
|
|
}
|
|
}
|
|
else
|
|
do_etrace(source_p, 1, 1);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
me_etrace(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
|
|
{
|
|
struct Client *target_p;
|
|
|
|
if(!IsOper(source_p) || parc < 2 || EmptyString(parv[1]))
|
|
return 0;
|
|
|
|
/* we cant etrace remote clients.. we shouldnt even get sent them */
|
|
if((target_p = find_person(parv[1])) && MyClient(target_p))
|
|
do_single_etrace(source_p, target_p);
|
|
|
|
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE),
|
|
target_p ? target_p->name : parv[1]);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
do_etrace(struct Client *source_p, int ipv4, int ipv6)
|
|
{
|
|
struct Client *target_p;
|
|
rb_dlink_node *ptr;
|
|
|
|
SetCork(source_p);
|
|
/* report all direct connections */
|
|
RB_DLINK_FOREACH(ptr, lclient_list.head)
|
|
{
|
|
target_p = ptr->data;
|
|
|
|
#ifdef RB_IPV6
|
|
if((!ipv4 && GET_SS_FAMILY(&target_p->localClient->ip) == AF_INET) ||
|
|
(!ipv6 && GET_SS_FAMILY(&target_p->localClient->ip) == AF_INET6))
|
|
continue;
|
|
#endif
|
|
|
|
sendto_one(source_p, form_str(RPL_ETRACE),
|
|
me.name, source_p->name,
|
|
IsOper(target_p) ? "Oper" : "User",
|
|
get_client_class(target_p),
|
|
target_p->name, target_p->username, target_p->host,
|
|
show_ip(source_p, target_p) ? target_p->sockhost : empty_sockhost,
|
|
target_p->info);
|
|
}
|
|
ClearCork(source_p);
|
|
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), me.name);
|
|
}
|
|
|
|
static void
|
|
do_etrace_full(struct Client *source_p)
|
|
{
|
|
rb_dlink_node *ptr;
|
|
SetCork(source_p);
|
|
RB_DLINK_FOREACH(ptr, lclient_list.head)
|
|
{
|
|
do_single_etrace(source_p, ptr->data);
|
|
}
|
|
ClearCork(source_p);
|
|
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), me.name);
|
|
}
|
|
|
|
/*
|
|
* do_single_etrace - searches local clients and displays those matching
|
|
* a pattern
|
|
* input - source client, target client
|
|
* output - etrace results
|
|
* side effects - etrace results are displayed
|
|
*/
|
|
static void
|
|
do_single_etrace(struct Client *source_p, struct Client *target_p)
|
|
{
|
|
/* note, we hide fullcaps for spoofed users, as mirc can often
|
|
* advertise its internal ip address in the field --fl
|
|
*/
|
|
if(!show_ip(source_p, target_p))
|
|
sendto_one(source_p, form_str(RPL_ETRACEFULL),
|
|
me.name, source_p->name,
|
|
IsOper(target_p) ? "Oper" : "User",
|
|
get_client_class(target_p),
|
|
target_p->name, target_p->username, target_p->host,
|
|
empty_sockhost, "<hidden> <hidden>", target_p->info);
|
|
else
|
|
sendto_one(source_p, form_str(RPL_ETRACEFULL),
|
|
me.name, source_p->name,
|
|
IsOper(target_p) ? "Oper" : "User",
|
|
get_client_class(target_p),
|
|
target_p->name, target_p->username,
|
|
target_p->host, target_p->sockhost,
|
|
target_p->localClient->fullcaps, target_p->info);
|
|
}
|
|
|
|
static int
|
|
mo_chantrace(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
|
|
{
|
|
struct Client *target_p;
|
|
struct Channel *chptr;
|
|
struct membership *msptr;
|
|
const char *sockhost;
|
|
const char *name;
|
|
rb_dlink_node *ptr;
|
|
int operspy = 0;
|
|
|
|
name = parv[1];
|
|
|
|
if(IsOperSpy(source_p) && parv[1][0] == '!')
|
|
{
|
|
name++;
|
|
operspy = 1;
|
|
if(EmptyString(name))
|
|
{
|
|
sendto_one_numeric(source_p, ERR_NEEDMOREPARAMS,
|
|
form_str(ERR_NEEDMOREPARAMS), me.name, source_p->name,
|
|
"CHANTRACE");
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
if((chptr = find_channel(name)) == NULL)
|
|
{
|
|
sendto_one_numeric(source_p, ERR_NOSUCHCHANNEL, form_str(ERR_NOSUCHCHANNEL), name);
|
|
return 0;
|
|
}
|
|
|
|
/* dont report operspys for nonexistant channels. */
|
|
if(operspy)
|
|
report_operspy(source_p, "CHANTRACE", chptr->chname);
|
|
|
|
if(!operspy && !IsMember(client_p, chptr))
|
|
{
|
|
sendto_one_numeric(source_p, ERR_NOTONCHANNEL, form_str(ERR_NOTONCHANNEL),
|
|
chptr->chname);
|
|
return 0;
|
|
}
|
|
SetCork(source_p);
|
|
RB_DLINK_FOREACH(ptr, chptr->members.head)
|
|
{
|
|
msptr = ptr->data;
|
|
target_p = msptr->client_p;
|
|
|
|
if(EmptyString(target_p->sockhost))
|
|
sockhost = empty_sockhost;
|
|
else if(!show_ip(source_p, target_p))
|
|
sockhost = spoofed_sockhost;
|
|
else
|
|
sockhost = target_p->sockhost;
|
|
|
|
sendto_one(source_p, form_str(RPL_ETRACE),
|
|
me.name, source_p->name, IsOper(target_p) ? "Oper" : "User",
|
|
/* class field -- pretend its server.. */
|
|
target_p->servptr->name,
|
|
target_p->name, target_p->username, target_p->host,
|
|
sockhost, target_p->info);
|
|
}
|
|
ClearCork(source_p);
|
|
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), me.name);
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
match_masktrace(struct Client *source_p, rb_dlink_list *list, const char *username,
|
|
const char *hostname, const char *name, const char *gecos)
|
|
{
|
|
struct Client *target_p;
|
|
rb_dlink_node *ptr;
|
|
const char *sockhost;
|
|
RB_DLINK_FOREACH(ptr, list->head)
|
|
{
|
|
target_p = ptr->data;
|
|
if(!IsClient(target_p))
|
|
continue;
|
|
|
|
if(EmptyString(target_p->sockhost))
|
|
sockhost = empty_sockhost;
|
|
else if(!show_ip(source_p, target_p))
|
|
sockhost = spoofed_sockhost;
|
|
else
|
|
sockhost = target_p->sockhost;
|
|
|
|
if(match(username, target_p->username) && (match(hostname, target_p->host) ||
|
|
match(hostname, sockhost)
|
|
|| match_ips(hostname, sockhost)))
|
|
{
|
|
if(name != NULL && !match(name, target_p->name))
|
|
continue;
|
|
|
|
if(gecos != NULL && !match_esc(gecos, target_p->info))
|
|
continue;
|
|
|
|
sendto_one(source_p, form_str(RPL_ETRACE),
|
|
me.name, source_p->name, IsOper(target_p) ? "Oper" : "User",
|
|
/* class field -- pretend its server.. */
|
|
target_p->servptr->name,
|
|
target_p->name, target_p->username, target_p->host,
|
|
sockhost, target_p->info);
|
|
}
|
|
}
|
|
}
|
|
|
|
static int
|
|
mo_masktrace(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
|
|
{
|
|
char *name, *username, *hostname, *gecos;
|
|
const char *mask;
|
|
int operspy = 0;
|
|
|
|
mask = parv[1];
|
|
name = LOCAL_COPY(parv[1]);
|
|
collapse(name);
|
|
|
|
|
|
if(IsOperSpy(source_p) && parv[1][0] == '!')
|
|
{
|
|
name++;
|
|
mask++;
|
|
operspy = 1;
|
|
}
|
|
|
|
if(parc > 2 && !EmptyString(parv[2]))
|
|
{
|
|
gecos = LOCAL_COPY(parv[2]);
|
|
collapse_esc(gecos);
|
|
}
|
|
else
|
|
gecos = NULL;
|
|
|
|
|
|
if((hostname = strchr(name, '@')) == NULL)
|
|
{
|
|
sendto_one_notice(source_p, ":Invalid parameters");
|
|
return 0;
|
|
}
|
|
|
|
*hostname++ = '\0';
|
|
|
|
if((username = strchr(name, '!')) == NULL)
|
|
{
|
|
username = name;
|
|
name = NULL;
|
|
}
|
|
else
|
|
*username++ = '\0';
|
|
|
|
if(EmptyString(username) || EmptyString(hostname))
|
|
{
|
|
sendto_one_notice(source_p, ":Invalid parameters");
|
|
return 0;
|
|
}
|
|
SetCork(source_p);
|
|
if(operspy)
|
|
{
|
|
char buf[512];
|
|
rb_strlcpy(buf, mask, sizeof(buf));
|
|
if(!EmptyString(gecos))
|
|
{
|
|
rb_strlcat(buf, " ", sizeof(buf));
|
|
rb_strlcat(buf, gecos, sizeof(buf));
|
|
}
|
|
|
|
report_operspy(source_p, "MASKTRACE", buf);
|
|
match_masktrace(source_p, &global_client_list, username, hostname, name, gecos);
|
|
}
|
|
else
|
|
match_masktrace(source_p, &lclient_list, username, hostname, name, gecos);
|
|
ClearCork(source_p);
|
|
sendto_one_numeric(source_p, RPL_ENDOFTRACE, form_str(RPL_ENDOFTRACE), me.name);
|
|
return 0;
|
|
}
|