You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

dline.go 13KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509
  1. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  2. // released under the MIT license
  3. package irc
  4. import (
  5. "errors"
  6. "fmt"
  7. "net"
  8. "sort"
  9. "sync"
  10. "time"
  11. "strings"
  12. "encoding/json"
  13. "github.com/goshuirc/irc-go/ircfmt"
  14. "github.com/goshuirc/irc-go/ircmsg"
  15. "github.com/oragono/oragono/irc/custime"
  16. "github.com/oragono/oragono/irc/sno"
  17. "github.com/tidwall/buntdb"
  18. )
  19. const (
  20. keyDlineEntry = "bans.dline %s"
  21. )
  22. var (
  23. errNoExistingBan = errors.New("Ban does not exist")
  24. )
  25. // IPRestrictTime contains the expiration info about the given IP.
  26. type IPRestrictTime struct {
  27. // Duration is how long this block lasts for.
  28. Duration time.Duration `json:"duration"`
  29. // Expires is when this block expires.
  30. Expires time.Time `json:"expires"`
  31. }
  32. // IsExpired returns true if the time has expired.
  33. func (iptime *IPRestrictTime) IsExpired() bool {
  34. return iptime.Expires.Before(time.Now())
  35. }
  36. // IPBanInfo holds info about an IP/net ban.
  37. type IPBanInfo struct {
  38. // Reason is the ban reason.
  39. Reason string `json:"reason"`
  40. // OperReason is an oper ban reason.
  41. OperReason string `json:"oper_reason"`
  42. // Time holds details about the duration, if it exists.
  43. Time *IPRestrictTime `json:"time"`
  44. }
  45. // BanMessage returns the ban message.
  46. func (info IPBanInfo) BanMessage(message string) string {
  47. message = fmt.Sprintf(message, info.Reason)
  48. if info.Time != nil {
  49. message += fmt.Sprintf(" [%s]", info.Time.Duration.String())
  50. }
  51. return message
  52. }
  53. // dLineAddr contains the address itself and expiration time for a given network.
  54. type dLineAddr struct {
  55. // Address is the address that is blocked.
  56. Address net.IP
  57. // Info contains information on the ban.
  58. Info IPBanInfo
  59. }
  60. // dLineNet contains the net itself and expiration time for a given network.
  61. type dLineNet struct {
  62. // Network is the network that is blocked.
  63. Network net.IPNet
  64. // Info contains information on the ban.
  65. Info IPBanInfo
  66. }
  67. // DLineManager manages and dlines.
  68. type DLineManager struct {
  69. sync.RWMutex
  70. // addresses that are dlined
  71. addresses map[string]*dLineAddr
  72. // networks that are dlined
  73. networks map[string]*dLineNet
  74. }
  75. // NewDLineManager returns a new DLineManager.
  76. func NewDLineManager() *DLineManager {
  77. var dm DLineManager
  78. dm.addresses = make(map[string]*dLineAddr)
  79. dm.networks = make(map[string]*dLineNet)
  80. return &dm
  81. }
  82. // AllBans returns all bans (for use with APIs, etc).
  83. func (dm *DLineManager) AllBans() map[string]IPBanInfo {
  84. allb := make(map[string]IPBanInfo)
  85. dm.RLock()
  86. defer dm.RUnlock()
  87. for name, info := range dm.addresses {
  88. allb[name] = info.Info
  89. }
  90. for name, info := range dm.networks {
  91. allb[name] = info.Info
  92. }
  93. return allb
  94. }
  95. // AddNetwork adds a network to the blocked list.
  96. func (dm *DLineManager) AddNetwork(network net.IPNet, length *IPRestrictTime, reason string, operReason string) {
  97. netString := network.String()
  98. dln := dLineNet{
  99. Network: network,
  100. Info: IPBanInfo{
  101. Time: length,
  102. Reason: reason,
  103. OperReason: operReason,
  104. },
  105. }
  106. dm.Lock()
  107. dm.networks[netString] = &dln
  108. dm.Unlock()
  109. }
  110. // RemoveNetwork removes a network from the blocked list.
  111. func (dm *DLineManager) RemoveNetwork(network net.IPNet) {
  112. netString := network.String()
  113. dm.Lock()
  114. delete(dm.networks, netString)
  115. dm.Unlock()
  116. }
  117. // AddIP adds an IP address to the blocked list.
  118. func (dm *DLineManager) AddIP(addr net.IP, length *IPRestrictTime, reason string, operReason string) {
  119. addrString := addr.String()
  120. dla := dLineAddr{
  121. Address: addr,
  122. Info: IPBanInfo{
  123. Time: length,
  124. Reason: reason,
  125. OperReason: operReason,
  126. },
  127. }
  128. dm.Lock()
  129. dm.addresses[addrString] = &dla
  130. dm.Unlock()
  131. }
  132. // RemoveIP removes an IP from the blocked list.
  133. func (dm *DLineManager) RemoveIP(addr net.IP) {
  134. addrString := addr.String()
  135. dm.Lock()
  136. delete(dm.addresses, addrString)
  137. dm.Unlock()
  138. }
  139. // CheckIP returns whether or not an IP address was banned, and how long it is banned for.
  140. func (dm *DLineManager) CheckIP(addr net.IP) (isBanned bool, info *IPBanInfo) {
  141. // check IP addr
  142. addrString := addr.String()
  143. dm.RLock()
  144. addrInfo := dm.addresses[addrString]
  145. dm.RUnlock()
  146. if addrInfo != nil {
  147. if addrInfo.Info.Time != nil {
  148. if addrInfo.Info.Time.IsExpired() {
  149. // ban on IP has expired, remove it from our blocked list
  150. dm.RemoveIP(addr)
  151. } else {
  152. return true, &addrInfo.Info
  153. }
  154. } else {
  155. return true, &addrInfo.Info
  156. }
  157. }
  158. // check networks
  159. doCleanup := false
  160. defer func() {
  161. if doCleanup {
  162. go func() {
  163. dm.Lock()
  164. defer dm.Unlock()
  165. for key, netInfo := range dm.networks {
  166. if netInfo.Info.Time.IsExpired() {
  167. delete(dm.networks, key)
  168. }
  169. }
  170. }()
  171. }
  172. }()
  173. dm.RLock()
  174. defer dm.RUnlock()
  175. for _, netInfo := range dm.networks {
  176. if netInfo.Info.Time != nil && netInfo.Info.Time.IsExpired() {
  177. // expired ban, ignore and clean up later
  178. doCleanup = true
  179. } else if netInfo.Network.Contains(addr) {
  180. return true, &netInfo.Info
  181. }
  182. }
  183. // no matches!
  184. return false, nil
  185. }
  186. // DLINE [ANDKILL] [MYSELF] [duration] <ip>/<net> [ON <server>] [reason [| oper reason]]
  187. // DLINE LIST
  188. func dlineHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  189. // check oper permissions
  190. if !client.class.Capabilities["oper:local_ban"] {
  191. client.Send(nil, server.name, ERR_NOPRIVS, client.nick, msg.Command, "Insufficient oper privs")
  192. return false
  193. }
  194. currentArg := 0
  195. // if they say LIST, we just list the current dlines
  196. if len(msg.Params) == currentArg+1 && strings.ToLower(msg.Params[currentArg]) == "list" {
  197. bans := server.dlines.AllBans()
  198. if len(bans) == 0 {
  199. client.Notice("No DLINEs have been set!")
  200. }
  201. for key, info := range bans {
  202. client.Notice(fmt.Sprintf("Ban - %s - %s", key, info.BanMessage("%s")))
  203. }
  204. return false
  205. }
  206. // when setting a ban, if they say "ANDKILL" we should also kill all users who match it
  207. var andKill bool
  208. if len(msg.Params) > currentArg+1 && strings.ToLower(msg.Params[currentArg]) == "andkill" {
  209. andKill = true
  210. currentArg++
  211. }
  212. // when setting a ban that covers the oper's current connection, we require them to say
  213. // "DLINE MYSELF" so that we're sure they really mean it.
  214. var dlineMyself bool
  215. if len(msg.Params) > currentArg+1 && strings.ToLower(msg.Params[currentArg]) == "myself" {
  216. dlineMyself = true
  217. currentArg++
  218. }
  219. // duration
  220. duration, err := custime.ParseDuration(msg.Params[currentArg])
  221. durationIsUsed := err == nil
  222. if durationIsUsed {
  223. currentArg++
  224. }
  225. // get host
  226. if len(msg.Params) < currentArg+1 {
  227. client.Send(nil, server.name, ERR_NEEDMOREPARAMS, client.nick, msg.Command, "Not enough parameters")
  228. return false
  229. }
  230. hostString := msg.Params[currentArg]
  231. currentArg++
  232. // check host
  233. var hostAddr net.IP
  234. var hostNet *net.IPNet
  235. _, hostNet, err = net.ParseCIDR(hostString)
  236. if err != nil {
  237. hostAddr = net.ParseIP(hostString)
  238. }
  239. if hostAddr == nil && hostNet == nil {
  240. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, "Could not parse IP address or CIDR network")
  241. return false
  242. }
  243. if hostNet == nil {
  244. hostString = hostAddr.String()
  245. if !dlineMyself && hostAddr.Equal(client.IP()) {
  246. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, "This ban matches you. To DLINE yourself, you must use the command: /DLINE MYSELF <arguments>")
  247. return false
  248. }
  249. } else {
  250. hostString = hostNet.String()
  251. if !dlineMyself && hostNet.Contains(client.IP()) {
  252. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, "This ban matches you. To DLINE yourself, you must use the command: /DLINE MYSELF <arguments>")
  253. return false
  254. }
  255. }
  256. // check remote
  257. if len(msg.Params) > currentArg && msg.Params[currentArg] == "ON" {
  258. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, "Remote servers not yet supported")
  259. return false
  260. }
  261. // get comment(s)
  262. reason := "No reason given"
  263. operReason := "No reason given"
  264. if len(msg.Params) > currentArg {
  265. tempReason := strings.TrimSpace(msg.Params[currentArg])
  266. if len(tempReason) > 0 && tempReason != "|" {
  267. tempReasons := strings.SplitN(tempReason, "|", 2)
  268. if tempReasons[0] != "" {
  269. reason = tempReasons[0]
  270. }
  271. if len(tempReasons) > 1 && tempReasons[1] != "" {
  272. operReason = tempReasons[1]
  273. } else {
  274. operReason = reason
  275. }
  276. }
  277. }
  278. // assemble ban info
  279. var banTime *IPRestrictTime
  280. if durationIsUsed {
  281. banTime = &IPRestrictTime{
  282. Duration: duration,
  283. Expires: time.Now().Add(duration),
  284. }
  285. }
  286. info := IPBanInfo{
  287. Reason: reason,
  288. OperReason: operReason,
  289. Time: banTime,
  290. }
  291. // save in datastore
  292. err = server.store.Update(func(tx *buntdb.Tx) error {
  293. dlineKey := fmt.Sprintf(keyDlineEntry, hostString)
  294. // assemble json from ban info
  295. b, err := json.Marshal(info)
  296. if err != nil {
  297. return err
  298. }
  299. tx.Set(dlineKey, string(b), nil)
  300. return nil
  301. })
  302. if err != nil {
  303. client.Notice(fmt.Sprintf("Could not successfully save new D-LINE: %s", err.Error()))
  304. return false
  305. }
  306. if hostNet == nil {
  307. server.dlines.AddIP(hostAddr, banTime, reason, operReason)
  308. } else {
  309. server.dlines.AddNetwork(*hostNet, banTime, reason, operReason)
  310. }
  311. var snoDescription string
  312. if durationIsUsed {
  313. client.Notice(fmt.Sprintf("Added temporary (%s) D-Line for %s", duration.String(), hostString))
  314. snoDescription = fmt.Sprintf(ircfmt.Unescape("%s$r added temporary (%s) D-Line for %s"), client.nick, duration.String(), hostString)
  315. } else {
  316. client.Notice(fmt.Sprintf("Added D-Line for %s", hostString))
  317. snoDescription = fmt.Sprintf(ircfmt.Unescape("%s$r added D-Line for %s"), client.nick, hostString)
  318. }
  319. server.snomasks.Send(sno.LocalXline, snoDescription)
  320. var killClient bool
  321. if andKill {
  322. var clientsToKill []*Client
  323. var killedClientNicks []string
  324. var toKill bool
  325. server.clients.ByNickMutex.RLock()
  326. for _, mcl := range server.clients.ByNick {
  327. if hostNet == nil {
  328. toKill = hostAddr.Equal(mcl.IP())
  329. } else {
  330. toKill = hostNet.Contains(mcl.IP())
  331. }
  332. if toKill {
  333. clientsToKill = append(clientsToKill, mcl)
  334. killedClientNicks = append(killedClientNicks, mcl.nick)
  335. }
  336. }
  337. server.clients.ByNickMutex.RUnlock()
  338. for _, mcl := range clientsToKill {
  339. mcl.exitedSnomaskSent = true
  340. mcl.Quit(fmt.Sprintf("You have been banned from this server (%s)", reason))
  341. if mcl == client {
  342. killClient = true
  343. } else {
  344. // if mcl == client, we kill them below
  345. mcl.destroy()
  346. }
  347. }
  348. // send snomask
  349. sort.Strings(killedClientNicks)
  350. server.snomasks.Send(sno.LocalKills, fmt.Sprintf(ircfmt.Unescape("%s killed %d clients with a DLINE $c[grey][$r%s$c[grey]]"), client.nick, len(killedClientNicks), strings.Join(killedClientNicks, ", ")))
  351. }
  352. return killClient
  353. }
  354. func unDLineHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  355. // check oper permissions
  356. if !client.class.Capabilities["oper:local_unban"] {
  357. client.Send(nil, server.name, ERR_NOPRIVS, client.nick, msg.Command, "Insufficient oper privs")
  358. return false
  359. }
  360. // get host
  361. hostString := msg.Params[0]
  362. // check host
  363. var hostAddr net.IP
  364. var hostNet *net.IPNet
  365. _, hostNet, err := net.ParseCIDR(hostString)
  366. if err != nil {
  367. hostAddr = net.ParseIP(hostString)
  368. }
  369. if hostAddr == nil && hostNet == nil {
  370. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, "Could not parse IP address or CIDR network")
  371. return false
  372. }
  373. if hostNet == nil {
  374. hostString = hostAddr.String()
  375. } else {
  376. hostString = hostNet.String()
  377. }
  378. // save in datastore
  379. err = server.store.Update(func(tx *buntdb.Tx) error {
  380. dlineKey := fmt.Sprintf(keyDlineEntry, hostString)
  381. // check if it exists or not
  382. val, err := tx.Get(dlineKey)
  383. if val == "" {
  384. return errNoExistingBan
  385. } else if err != nil {
  386. return err
  387. }
  388. tx.Delete(dlineKey)
  389. return nil
  390. })
  391. if err != nil {
  392. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, fmt.Sprintf("Could not remove ban [%s]", err.Error()))
  393. return false
  394. }
  395. if hostNet == nil {
  396. server.dlines.RemoveIP(hostAddr)
  397. } else {
  398. server.dlines.RemoveNetwork(*hostNet)
  399. }
  400. client.Notice(fmt.Sprintf("Removed D-Line for %s", hostString))
  401. server.snomasks.Send(sno.LocalXline, fmt.Sprintf(ircfmt.Unescape("%s$r removed D-Line for %s"), client.nick, hostString))
  402. return false
  403. }
  404. func (s *Server) loadDLines() {
  405. s.dlines = NewDLineManager()
  406. // load from datastore
  407. s.store.View(func(tx *buntdb.Tx) error {
  408. //TODO(dan): We could make this safer
  409. tx.AscendKeys("bans.dline *", func(key, value string) bool {
  410. // get address name
  411. key = key[len("bans.dline "):]
  412. // load addr/net
  413. var hostAddr net.IP
  414. var hostNet *net.IPNet
  415. _, hostNet, err := net.ParseCIDR(key)
  416. if err != nil {
  417. hostAddr = net.ParseIP(key)
  418. }
  419. // load ban info
  420. var info IPBanInfo
  421. json.Unmarshal([]byte(value), &info)
  422. // add to the server
  423. if hostNet == nil {
  424. s.dlines.AddIP(hostAddr, info.Time, info.Reason, info.OperReason)
  425. } else {
  426. s.dlines.AddNetwork(*hostNet, info.Time, info.Reason, info.OperReason)
  427. }
  428. return true // true to continue I guess?
  429. })
  430. return nil
  431. })
  432. }