Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521
  1. // Copyright (c) 2016-2017 Daniel Oaks <daniel@danieloaks.net>
  2. // released under the MIT license
  3. package irc
  4. import (
  5. "errors"
  6. "fmt"
  7. "net"
  8. "sort"
  9. "sync"
  10. "time"
  11. "strings"
  12. "encoding/json"
  13. "github.com/goshuirc/irc-go/ircfmt"
  14. "github.com/goshuirc/irc-go/ircmsg"
  15. "github.com/oragono/oragono/irc/custime"
  16. "github.com/oragono/oragono/irc/sno"
  17. "github.com/tidwall/buntdb"
  18. )
  19. const (
  20. keyDlineEntry = "bans.dline %s"
  21. )
  22. var (
  23. errNoExistingBan = errors.New("Ban does not exist")
  24. )
  25. // IPRestrictTime contains the expiration info about the given IP.
  26. type IPRestrictTime struct {
  27. // Duration is how long this block lasts for.
  28. Duration time.Duration `json:"duration"`
  29. // Expires is when this block expires.
  30. Expires time.Time `json:"expires"`
  31. }
  32. // IsExpired returns true if the time has expired.
  33. func (iptime *IPRestrictTime) IsExpired() bool {
  34. return iptime.Expires.Before(time.Now())
  35. }
  36. // IPBanInfo holds info about an IP/net ban.
  37. type IPBanInfo struct {
  38. // Reason is the ban reason.
  39. Reason string `json:"reason"`
  40. // OperReason is an oper ban reason.
  41. OperReason string `json:"oper_reason"`
  42. // OperName is the oper who set the ban.
  43. OperName string `json:"oper_name"`
  44. // Time holds details about the duration, if it exists.
  45. Time *IPRestrictTime `json:"time"`
  46. }
  47. // BanMessage returns the ban message.
  48. func (info IPBanInfo) BanMessage(message string) string {
  49. message = fmt.Sprintf(message, info.Reason)
  50. if info.Time != nil {
  51. message += fmt.Sprintf(" [%s]", info.Time.Duration.String())
  52. }
  53. return message
  54. }
  55. // dLineAddr contains the address itself and expiration time for a given network.
  56. type dLineAddr struct {
  57. // Address is the address that is blocked.
  58. Address net.IP
  59. // Info contains information on the ban.
  60. Info IPBanInfo
  61. }
  62. // dLineNet contains the net itself and expiration time for a given network.
  63. type dLineNet struct {
  64. // Network is the network that is blocked.
  65. Network net.IPNet
  66. // Info contains information on the ban.
  67. Info IPBanInfo
  68. }
  69. // DLineManager manages and dlines.
  70. type DLineManager struct {
  71. sync.RWMutex // tier 1
  72. // addresses that are dlined
  73. addresses map[string]*dLineAddr
  74. // networks that are dlined
  75. networks map[string]*dLineNet
  76. }
  77. // NewDLineManager returns a new DLineManager.
  78. func NewDLineManager() *DLineManager {
  79. var dm DLineManager
  80. dm.addresses = make(map[string]*dLineAddr)
  81. dm.networks = make(map[string]*dLineNet)
  82. return &dm
  83. }
  84. // AllBans returns all bans (for use with APIs, etc).
  85. func (dm *DLineManager) AllBans() map[string]IPBanInfo {
  86. allb := make(map[string]IPBanInfo)
  87. dm.RLock()
  88. defer dm.RUnlock()
  89. for name, info := range dm.addresses {
  90. allb[name] = info.Info
  91. }
  92. for name, info := range dm.networks {
  93. allb[name] = info.Info
  94. }
  95. return allb
  96. }
  97. // AddNetwork adds a network to the blocked list.
  98. func (dm *DLineManager) AddNetwork(network net.IPNet, length *IPRestrictTime, reason, operReason, operName string) {
  99. netString := network.String()
  100. dln := dLineNet{
  101. Network: network,
  102. Info: IPBanInfo{
  103. Time: length,
  104. Reason: reason,
  105. OperReason: operReason,
  106. OperName: operName,
  107. },
  108. }
  109. dm.Lock()
  110. dm.networks[netString] = &dln
  111. dm.Unlock()
  112. }
  113. // RemoveNetwork removes a network from the blocked list.
  114. func (dm *DLineManager) RemoveNetwork(network net.IPNet) {
  115. netString := network.String()
  116. dm.Lock()
  117. delete(dm.networks, netString)
  118. dm.Unlock()
  119. }
  120. // AddIP adds an IP address to the blocked list.
  121. func (dm *DLineManager) AddIP(addr net.IP, length *IPRestrictTime, reason, operReason, operName string) {
  122. addrString := addr.String()
  123. dla := dLineAddr{
  124. Address: addr,
  125. Info: IPBanInfo{
  126. Time: length,
  127. Reason: reason,
  128. OperReason: operReason,
  129. OperName: operName,
  130. },
  131. }
  132. dm.Lock()
  133. dm.addresses[addrString] = &dla
  134. dm.Unlock()
  135. }
  136. // RemoveIP removes an IP from the blocked list.
  137. func (dm *DLineManager) RemoveIP(addr net.IP) {
  138. addrString := addr.String()
  139. dm.Lock()
  140. delete(dm.addresses, addrString)
  141. dm.Unlock()
  142. }
  143. // CheckIP returns whether or not an IP address was banned, and how long it is banned for.
  144. func (dm *DLineManager) CheckIP(addr net.IP) (isBanned bool, info *IPBanInfo) {
  145. // check IP addr
  146. addrString := addr.String()
  147. dm.RLock()
  148. addrInfo := dm.addresses[addrString]
  149. dm.RUnlock()
  150. if addrInfo != nil {
  151. if addrInfo.Info.Time != nil {
  152. if addrInfo.Info.Time.IsExpired() {
  153. // ban on IP has expired, remove it from our blocked list
  154. dm.RemoveIP(addr)
  155. } else {
  156. return true, &addrInfo.Info
  157. }
  158. } else {
  159. return true, &addrInfo.Info
  160. }
  161. }
  162. // check networks
  163. doCleanup := false
  164. defer func() {
  165. if doCleanup {
  166. go func() {
  167. dm.Lock()
  168. defer dm.Unlock()
  169. for key, netInfo := range dm.networks {
  170. if netInfo.Info.Time.IsExpired() {
  171. delete(dm.networks, key)
  172. }
  173. }
  174. }()
  175. }
  176. }()
  177. dm.RLock()
  178. defer dm.RUnlock()
  179. for _, netInfo := range dm.networks {
  180. if netInfo.Info.Time != nil && netInfo.Info.Time.IsExpired() {
  181. // expired ban, ignore and clean up later
  182. doCleanup = true
  183. } else if netInfo.Network.Contains(addr) {
  184. return true, &netInfo.Info
  185. }
  186. }
  187. // no matches!
  188. return false, nil
  189. }
  190. // DLINE [ANDKILL] [MYSELF] [duration] <ip>/<net> [ON <server>] [reason [| oper reason]]
  191. // DLINE LIST
  192. func dlineHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  193. // check oper permissions
  194. if !client.class.Capabilities["oper:local_ban"] {
  195. client.Send(nil, server.name, ERR_NOPRIVS, client.nick, msg.Command, client.t("Insufficient oper privs"))
  196. return false
  197. }
  198. currentArg := 0
  199. // if they say LIST, we just list the current dlines
  200. if len(msg.Params) == currentArg+1 && strings.ToLower(msg.Params[currentArg]) == "list" {
  201. bans := server.dlines.AllBans()
  202. if len(bans) == 0 {
  203. client.Notice(client.t("No DLINEs have been set!"))
  204. }
  205. for key, info := range bans {
  206. client.Notice(fmt.Sprintf(client.t("Ban - %s - added by %s - %s"), key, info.OperName, info.BanMessage("%s")))
  207. }
  208. return false
  209. }
  210. // when setting a ban, if they say "ANDKILL" we should also kill all users who match it
  211. var andKill bool
  212. if len(msg.Params) > currentArg+1 && strings.ToLower(msg.Params[currentArg]) == "andkill" {
  213. andKill = true
  214. currentArg++
  215. }
  216. // when setting a ban that covers the oper's current connection, we require them to say
  217. // "DLINE MYSELF" so that we're sure they really mean it.
  218. var dlineMyself bool
  219. if len(msg.Params) > currentArg+1 && strings.ToLower(msg.Params[currentArg]) == "myself" {
  220. dlineMyself = true
  221. currentArg++
  222. }
  223. // duration
  224. duration, err := custime.ParseDuration(msg.Params[currentArg])
  225. durationIsUsed := err == nil
  226. if durationIsUsed {
  227. currentArg++
  228. }
  229. // get host
  230. if len(msg.Params) < currentArg+1 {
  231. client.Send(nil, server.name, ERR_NEEDMOREPARAMS, client.nick, msg.Command, client.t("Not enough parameters"))
  232. return false
  233. }
  234. hostString := msg.Params[currentArg]
  235. currentArg++
  236. // check host
  237. var hostAddr net.IP
  238. var hostNet *net.IPNet
  239. _, hostNet, err = net.ParseCIDR(hostString)
  240. if err != nil {
  241. hostAddr = net.ParseIP(hostString)
  242. }
  243. if hostAddr == nil && hostNet == nil {
  244. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, client.t("Could not parse IP address or CIDR network"))
  245. return false
  246. }
  247. if hostNet == nil {
  248. hostString = hostAddr.String()
  249. if !dlineMyself && hostAddr.Equal(client.IP()) {
  250. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, client.t("This ban matches you. To DLINE yourself, you must use the command: /DLINE MYSELF <arguments>"))
  251. return false
  252. }
  253. } else {
  254. hostString = hostNet.String()
  255. if !dlineMyself && hostNet.Contains(client.IP()) {
  256. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, client.t("This ban matches you. To DLINE yourself, you must use the command: /DLINE MYSELF <arguments>"))
  257. return false
  258. }
  259. }
  260. // check remote
  261. if len(msg.Params) > currentArg && msg.Params[currentArg] == "ON" {
  262. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, client.t("Remote servers not yet supported"))
  263. return false
  264. }
  265. // get comment(s)
  266. reason := "No reason given"
  267. operReason := "No reason given"
  268. if len(msg.Params) > currentArg {
  269. tempReason := strings.TrimSpace(msg.Params[currentArg])
  270. if len(tempReason) > 0 && tempReason != "|" {
  271. tempReasons := strings.SplitN(tempReason, "|", 2)
  272. if tempReasons[0] != "" {
  273. reason = tempReasons[0]
  274. }
  275. if len(tempReasons) > 1 && tempReasons[1] != "" {
  276. operReason = tempReasons[1]
  277. } else {
  278. operReason = reason
  279. }
  280. }
  281. }
  282. operName := client.operName
  283. if operName == "" {
  284. operName = server.name
  285. }
  286. // assemble ban info
  287. var banTime *IPRestrictTime
  288. if durationIsUsed {
  289. banTime = &IPRestrictTime{
  290. Duration: duration,
  291. Expires: time.Now().Add(duration),
  292. }
  293. }
  294. info := IPBanInfo{
  295. Reason: reason,
  296. OperReason: operReason,
  297. OperName: operName,
  298. Time: banTime,
  299. }
  300. // save in datastore
  301. err = server.store.Update(func(tx *buntdb.Tx) error {
  302. dlineKey := fmt.Sprintf(keyDlineEntry, hostString)
  303. // assemble json from ban info
  304. b, err := json.Marshal(info)
  305. if err != nil {
  306. return err
  307. }
  308. tx.Set(dlineKey, string(b), nil)
  309. return nil
  310. })
  311. if err != nil {
  312. client.Notice(fmt.Sprintf(client.t("Could not successfully save new D-LINE: %s"), err.Error()))
  313. return false
  314. }
  315. if hostNet == nil {
  316. server.dlines.AddIP(hostAddr, banTime, reason, operReason, operName)
  317. } else {
  318. server.dlines.AddNetwork(*hostNet, banTime, reason, operReason, operName)
  319. }
  320. var snoDescription string
  321. if durationIsUsed {
  322. client.Notice(fmt.Sprintf(client.t("Added temporary (%s) D-Line for %s"), duration.String(), hostString))
  323. snoDescription = fmt.Sprintf(ircfmt.Unescape("%s [%s]$r added temporary (%s) D-Line for %s"), client.nick, operName, duration.String(), hostString)
  324. } else {
  325. client.Notice(fmt.Sprintf(client.t("Added D-Line for %s"), hostString))
  326. snoDescription = fmt.Sprintf(ircfmt.Unescape("%s [%s]$r added D-Line for %s"), client.nick, operName, hostString)
  327. }
  328. server.snomasks.Send(sno.LocalXline, snoDescription)
  329. var killClient bool
  330. if andKill {
  331. var clientsToKill []*Client
  332. var killedClientNicks []string
  333. var toKill bool
  334. for _, mcl := range server.clients.AllClients() {
  335. if hostNet == nil {
  336. toKill = hostAddr.Equal(mcl.IP())
  337. } else {
  338. toKill = hostNet.Contains(mcl.IP())
  339. }
  340. if toKill {
  341. clientsToKill = append(clientsToKill, mcl)
  342. killedClientNicks = append(killedClientNicks, mcl.nick)
  343. }
  344. }
  345. for _, mcl := range clientsToKill {
  346. mcl.exitedSnomaskSent = true
  347. mcl.Quit(fmt.Sprintf(mcl.t("You have been banned from this server (%s)"), reason))
  348. if mcl == client {
  349. killClient = true
  350. } else {
  351. // if mcl == client, we kill them below
  352. mcl.destroy(false)
  353. }
  354. }
  355. // send snomask
  356. sort.Strings(killedClientNicks)
  357. server.snomasks.Send(sno.LocalKills, fmt.Sprintf(ircfmt.Unescape("%s [%s] killed %d clients with a DLINE $c[grey][$r%s$c[grey]]"), client.nick, operName, len(killedClientNicks), strings.Join(killedClientNicks, ", ")))
  358. }
  359. return killClient
  360. }
  361. func unDLineHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {
  362. // check oper permissions
  363. if !client.class.Capabilities["oper:local_unban"] {
  364. client.Send(nil, server.name, ERR_NOPRIVS, client.nick, msg.Command, client.t("Insufficient oper privs"))
  365. return false
  366. }
  367. // get host
  368. hostString := msg.Params[0]
  369. // check host
  370. var hostAddr net.IP
  371. var hostNet *net.IPNet
  372. _, hostNet, err := net.ParseCIDR(hostString)
  373. if err != nil {
  374. hostAddr = net.ParseIP(hostString)
  375. }
  376. if hostAddr == nil && hostNet == nil {
  377. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, client.t("Could not parse IP address or CIDR network"))
  378. return false
  379. }
  380. if hostNet == nil {
  381. hostString = hostAddr.String()
  382. } else {
  383. hostString = hostNet.String()
  384. }
  385. // save in datastore
  386. err = server.store.Update(func(tx *buntdb.Tx) error {
  387. dlineKey := fmt.Sprintf(keyDlineEntry, hostString)
  388. // check if it exists or not
  389. val, err := tx.Get(dlineKey)
  390. if val == "" {
  391. return errNoExistingBan
  392. } else if err != nil {
  393. return err
  394. }
  395. tx.Delete(dlineKey)
  396. return nil
  397. })
  398. if err != nil {
  399. client.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, msg.Command, fmt.Sprintf(client.t("Could not remove ban [%s]"), err.Error()))
  400. return false
  401. }
  402. if hostNet == nil {
  403. server.dlines.RemoveIP(hostAddr)
  404. } else {
  405. server.dlines.RemoveNetwork(*hostNet)
  406. }
  407. client.Notice(fmt.Sprintf(client.t("Removed D-Line for %s"), hostString))
  408. server.snomasks.Send(sno.LocalXline, fmt.Sprintf(ircfmt.Unescape("%s$r removed D-Line for %s"), client.nick, hostString))
  409. return false
  410. }
  411. func (s *Server) loadDLines() {
  412. s.dlines = NewDLineManager()
  413. // load from datastore
  414. s.store.View(func(tx *buntdb.Tx) error {
  415. //TODO(dan): We could make this safer
  416. tx.AscendKeys("bans.dline *", func(key, value string) bool {
  417. // get address name
  418. key = key[len("bans.dline "):]
  419. // load addr/net
  420. var hostAddr net.IP
  421. var hostNet *net.IPNet
  422. _, hostNet, err := net.ParseCIDR(key)
  423. if err != nil {
  424. hostAddr = net.ParseIP(key)
  425. }
  426. // load ban info
  427. var info IPBanInfo
  428. json.Unmarshal([]byte(value), &info)
  429. // set opername if it isn't already set
  430. if info.OperName == "" {
  431. info.OperName = s.name
  432. }
  433. // add to the server
  434. if hostNet == nil {
  435. s.dlines.AddIP(hostAddr, info.Time, info.Reason, info.OperReason, info.OperName)
  436. } else {
  437. s.dlines.AddNetwork(*hostNet, info.Time, info.Reason, info.OperReason, info.OperName)
  438. }
  439. return true // true to continue I guess?
  440. })
  441. return nil
  442. })
  443. }