2 * IRC - Internet Relay Chat, ircd/m_oper.c
3 * Copyright (C) 1990 Jarkko Oikarinen and
4 * University of Oulu, Computing Center
6 * See file AUTHORS in IRC package for additional names of
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 1, or (at your option)
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
27 * m_functions execute protocol messages on this server:
29 * cptr is always NON-NULL, pointing to a *LOCAL* client
30 * structure (with an open socket connected!). This
31 * identifies the physical socket where the message
32 * originated (or which caused the m_function to be
33 * executed--some m_functions may call others...).
35 * sptr is the source of the message, defined by the
36 * prefix part of the message if present. If not
37 * or prefix not found, then sptr==cptr.
39 * (!IsServer(cptr)) => (cptr == sptr), because
40 * prefixes are taken *only* from servers...
43 * (sptr == cptr) => the message didn't
46 * (sptr != cptr && IsServer(sptr) means
47 * the prefix specified servername. (?)
49 * (sptr != cptr && !IsServer(sptr) means
50 * that message originated from a remote
55 * (!IsServer(sptr)) means that, sptr can safely
56 * taken as defining the target structure of the
57 * message in this server.
59 * *Always* true (if 'parse' and others are working correct):
61 * 1) sptr->from == cptr (note: cptr->from == cptr)
63 * 2) MyConnect(sptr) <=> sptr == cptr (e.g. sptr
64 * *cannot* be a local connection, unless it's
65 * actually cptr!). [MyConnect(x) should probably
66 * be defined as (x == x->from) --msa ]
68 * parc number of variable parameter strings (if zero,
69 * parv is allowed to be NULL)
71 * parv a NULL terminated list of parameter pointers,
73 * parv[0], sender (prefix string), if not present
74 * this points to an empty string.
75 * parv[1]...parv[parc-1]
76 * pointers to additional parameters
77 * parv[parc] == NULL, *always*
79 * note: it is guaranteed that parv[0]..parv[parc-1] are all
84 * No need to include handlers.h here the signatures must match
85 * and we don't need to force a rebuild of all the handlers everytime
86 * we add a new one to the list. --Bleep
94 #include "ircd_reply.h"
95 #include "ircd_string.h"
96 #include "ircd_xopen.h"
100 #include "querycmds.h"
112 #ifdef CRYPT_OPER_PASSWORD
113 int oper_password_match(const char* to_match, const char* passwd)
116 * use first two chars of the password they send in as salt
118 * passwd may be NULL. Head it off at the pass...
120 if (to_match && passwd) {
121 const char *encr = ircd_crypt(to_match, passwd);
122 return (0 == strcmp(encr, passwd));
127 int oper_password_match(const char* to_match, const char* passwd)
129 return (to_match && passwd) ? (0 == strcmp(to_match, passwd)) : 0;
134 * m_oper - generic message handler
136 int m_oper(struct Client* cptr, struct Client* sptr, int parc, char* parv[])
138 struct ConfItem* aconf;
143 assert(cptr == sptr);
145 name = parc > 1 ? parv[1] : 0;
146 password = parc > 2 ? parv[2] : 0;
148 if (EmptyString(name) || EmptyString(password))
149 return need_more_params(sptr, "OPER");
151 aconf = find_conf_exact(name, cli_username(sptr), cli_sockhost(sptr), CONF_OPS);
153 aconf = find_conf_exact(name, cli_username(sptr),
154 ircd_ntoa((const char*) &(cli_ip(cptr))), CONF_OPS);
156 if (!aconf || IsIllegal(aconf)) {
157 send_reply(sptr, ERR_NOOPERHOST);
158 sendto_opmask_butone(0, SNO_OLDREALOP, "Failed OPER attempt by %s (%s@%s)",
159 parv[0], cli_user(sptr)->username, cli_sockhost(sptr));
162 assert(0 != (aconf->status & CONF_OPS));
164 if (oper_password_match(password, aconf->passwd)) {
165 unsigned int old_mode = (cli_flags(sptr) & ALL_UMODES);
167 if (ACR_OK != attach_conf(sptr, aconf)) {
168 send_reply(sptr, ERR_NOOPERHOST);
169 sendto_opmask_butone(0, SNO_OLDREALOP, "Failed OPER attempt by %s "
170 "(%s@%s)", parv[0], cli_user(sptr)->username,
174 if (CONF_LOCOP == aconf->status) {
180 * prevent someone from being both oper and local oper
186 cli_handler(cptr) = OPER_HANDLER;
189 cli_flags(sptr) |= (FLAGS_WALLOP | FLAGS_SERVNOTICE | FLAGS_DEBUG);
191 set_snomask(sptr, SNO_OPERDEFAULT, SNO_ADD);
192 client_set_privs(sptr);
193 send_umode_out(cptr, sptr, old_mode);
194 send_reply(sptr, RPL_YOUREOPER);
196 sendto_opmask_butone(0, SNO_OLDSNO, "%s (%s@%s) is now operator (%c)",
197 parv[0], cli_user(sptr)->username, cli_sockhost(sptr),
198 IsOper(sptr) ? 'O' : 'o');
200 log_write(LS_OPER, L_INFO, 0, "OPER (%s) by (%#C)", name, sptr);
203 send_reply(sptr, ERR_PASSWDMISMATCH);
204 sendto_opmask_butone(0, SNO_OLDREALOP, "Failed OPER attempt by %s (%s@%s)",
205 parv[0], cli_user(sptr)->username, cli_sockhost(sptr));
211 * ms_oper - server message handler
213 int ms_oper(struct Client* cptr, struct Client* sptr, int parc, char* parv[])
216 assert(IsServer(cptr));
218 * if message arrived from server, trust it, and set to oper
220 if (!IsServer(sptr) && !IsOper(sptr)) {
222 cli_flags(sptr) |= FLAGS_OPER;
223 sendcmdto_serv_butone(sptr, CMD_MODE, cptr, "%s :+o", parv[0]);
229 * mo_oper - oper message handler
231 int mo_oper(struct Client* cptr, struct Client* sptr, int parc, char* parv[])
234 assert(cptr == sptr);
235 send_reply(sptr, RPL_YOUREOPER);
242 * parv[0] = sender prefix
243 * parv[1] = oper name
244 * parv[2] = oper password
246 int m_oper(struct Client *cptr, struct Client *sptr, int parc, char *parv[])
248 struct ConfItem* aconf;
252 #ifdef CRYPT_OPER_PASSWORD
254 #endif /* CRYPT_OPER_PASSWORD */
256 name = parc > 1 ? parv[1] : 0;
257 password = parc > 2 ? parv[2] : 0;
259 if (!IsServer(cptr) && (EmptyString(name) || EmptyString(password)))
260 return need_more_params(sptr, "OPER");
262 /* if message arrived from server, trust it, and set to oper */
264 if (IsServer(cptr) && !IsOper(sptr)) {
266 sptr->flags |= FLAGS_OPER;
267 sendto_serv_butone(cptr, "%s%s " TOK_MODE " %s :+o", NumNick(sptr), parv[0]); /* XXX DEAD */
270 else if (IsAnOper(sptr)) {
272 sendto_one(sptr, rpl_str(RPL_YOUREOPER), me.name, parv[0]); /* XXX DEAD */
275 assert(cptr == sptr);
276 aconf = find_conf_exact(name, sptr->username, sptr->sockhost, CONF_OPS);
278 aconf = find_conf_exact(name, sptr->username,
279 ircd_ntoa((const char*) &cptr->ip), CONF_OPS);
281 if (!aconf || IsIllegal(aconf)) {
282 sendto_one(sptr, err_str(ERR_NOOPERHOST), me.name, parv[0]); /* XXX DEAD */
283 sendto_realops("Failed OPER attempt by %s (%s@%s)", /* XXX DEAD */
284 parv[0], sptr->user->username, sptr->sockhost);
287 assert(0 != (aconf->status & CONF_OPS));
289 #ifdef CRYPT_OPER_PASSWORD
290 /* use first two chars of the password they send in as salt */
292 /* passwd may be NULL. Head it off at the pass... */
294 if (password && aconf->passwd)
296 salt[0] = aconf->passwd[0];
297 salt[1] = aconf->passwd[1];
299 encr = ircd_crypt(password, salt);
305 #endif /* CRYPT_OPER_PASSWORD */
307 if (0 == strcmp(encr, aconf->passwd)) {
308 int old = (sptr->flags & ALL_UMODES);
310 if (ACR_OK != attach_conf(sptr, aconf)) {
311 sendto_one(sptr, err_str(ERR_NOOPERHOST), me.name, parv[0]); /* XXX DEAD */
312 sendto_realops("Failed OPER attempt by %s (%s@%s)", /* XXX DEAD */
313 parv[0], sptr->user->username, sptr->sockhost);
317 if (aconf->status == CONF_LOCOP) {
319 if (!IsLocal(sptr)) || aconf->status == CONF_LOCOP) {
325 /* prevent someone from being both oper and local oper */
330 cptr->handler = OPER_HANDLER;
331 sendto_ops("%s (%s@%s) is now operator (%c)", parv[0], /* XXX DEAD */
332 sptr->user->username, sptr->sockhost, IsOper(sptr) ? 'O' : 'o');
334 sptr->flags |= (FLAGS_WALLOP | FLAGS_SERVNOTICE | FLAGS_DEBUG);
335 set_snomask(sptr, SNO_OPERDEFAULT, SNO_ADD);
336 send_umode_out(cptr, sptr, old);
337 sendto_one(sptr, rpl_str(RPL_YOUREOPER), me.name, parv[0]); /* XXX DEAD */
339 ircd_log(L_INFO, "OPER (%s) by (%s!%s@%s)", /* XXX DEAD */
340 name, parv[0], sptr->user->username, sptr->sockhost);
343 write_log(FNAME_OPERLOG, /* XXX DEAD */
344 "%s OPER (%s) by (%s!%s@%s)\n", myctime(CurrentTime),
345 name, parv[0], sptr->user->username, sptr->sockhost);
349 sendto_one(sptr, err_str(ERR_PASSWDMISMATCH), me.name, parv[0]); /* XXX DEAD */
350 sendto_realops("Failed OPER attempt by %s (%s@%s)", /* XXX DEAD */
351 parv[0], sptr->user->username, sptr->sockhost);