diff options
Diffstat (limited to 'modules/m_challenge.c')
-rw-r--r-- | modules/m_challenge.c | 207 |
1 files changed, 207 insertions, 0 deletions
diff --git a/modules/m_challenge.c b/modules/m_challenge.c new file mode 100644 index 0000000..4c24b3a --- /dev/null +++ b/modules/m_challenge.c @@ -0,0 +1,207 @@ +/* + * ircd-hybrid: an advanced Internet Relay Chat Daemon(ircd). + * m_challenge.c: Allows an IRC Operator to securely authenticate. + * + * Copyright (C) 2002 by the past and present ircd coders, and others. + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 + * USA + * + * $Id$ + */ + +#include "stdinc.h" +#include "client.h" +#include "ircd.h" +#include "modules.h" +#include "numeric.h" +#include "send.h" +#include "conf.h" +#include "rsa.h" +#include "parse.h" +#include "irc_string.h" +#include "log.h" +#include "s_user.h" + + +#ifdef HAVE_LIBCRYPTO +/* failed_challenge_notice() + * + * inputs - pointer to client doing /oper ... + * - pointer to nick they tried to oper as + * - pointer to reason they have failed + * output - nothing + * side effects - notices all opers of the failed oper attempt if enabled + */ +static void +failed_challenge_notice(struct Client *source_p, const char *name, + const char *reason) +{ + if (ConfigFileEntry.failed_oper_notice) + sendto_realops_flags(UMODE_ALL, L_ALL, "Failed CHALLENGE attempt as %s " + "by %s (%s@%s) - %s", name, source_p->name, + source_p->username, source_p->host, reason); + + ilog(LOG_TYPE_OPER, "Failed CHALLENGE attempt as %s " + "by %s (%s@%s) - %s", name, source_p->name, + source_p->username, source_p->host, reason); +} + +/* + * m_challenge - generate RSA challenge for wouldbe oper + * parv[0] = sender prefix + * parv[1] = operator to challenge for, or +response + * + */ +static void +m_challenge(struct Client *client_p, struct Client *source_p, + int parc, char *parv[]) +{ + char *challenge = NULL; + struct ConfItem *conf = NULL; + struct AccessItem *aconf = NULL; + + if (*parv[1] == '+') + { + /* Ignore it if we aren't expecting this... -A1kmm */ + if (source_p->localClient->response == NULL) + return; + + if (irccmp(source_p->localClient->response, ++parv[1])) + { + sendto_one(source_p, form_str(ERR_PASSWDMISMATCH), me.name, + source_p->name); + failed_challenge_notice(source_p, source_p->localClient->auth_oper, + "challenge failed"); + return; + } + + conf = find_exact_name_conf(OPER_TYPE, source_p, + source_p->localClient->auth_oper, NULL, NULL); + if (conf == NULL) + { + /* XXX: logging */ + sendto_one (source_p, form_str(ERR_NOOPERHOST), me.name, source_p->name); + return; + } + + if (attach_conf(source_p, conf) != 0) + { + sendto_one(source_p,":%s NOTICE %s :Can't attach conf!", + me.name, source_p->name); + failed_challenge_notice(source_p, conf->name, "can't attach conf!"); + return; + } + + oper_up(source_p); + + ilog(LOG_TYPE_OPER, "OPER %s by %s!%s@%s", + source_p->localClient->auth_oper, source_p->name, source_p->username, + source_p->host); + + MyFree(source_p->localClient->response); + MyFree(source_p->localClient->auth_oper); + source_p->localClient->response = NULL; + source_p->localClient->auth_oper = NULL; + return; + } + + MyFree(source_p->localClient->response); + MyFree(source_p->localClient->auth_oper); + source_p->localClient->response = NULL; + source_p->localClient->auth_oper = NULL; + + if ((conf = find_conf_exact(OPER_TYPE, + parv[1], source_p->username, source_p->host + )) != NULL) + aconf = map_to_conf(conf); + else if ((conf = find_conf_exact(OPER_TYPE, + parv[1], source_p->username, + source_p->sockhost)) != NULL) + aconf = map_to_conf(conf); + + if (aconf == NULL) + { + sendto_one (source_p, form_str(ERR_NOOPERHOST), me.name, source_p->name); + conf = find_exact_name_conf(OPER_TYPE, NULL, parv[1], NULL, NULL); + failed_challenge_notice(source_p, parv[1], (conf != NULL) + ? "host mismatch" : "no oper {} block"); + return; + } + + if (aconf->rsa_public_key == NULL) + { + sendto_one (source_p, ":%s NOTICE %s :I'm sorry, PK authentication " + "is not enabled for your oper{} block.", me.name, + source_p->name); + return; + } + + if (!generate_challenge(&challenge, &(source_p->localClient->response), + aconf->rsa_public_key)) + sendto_one(source_p, form_str(RPL_RSACHALLENGE), + me.name, source_p->name, challenge); + + DupString(source_p->localClient->auth_oper, conf->name); + MyFree(challenge); +} + +static void +mo_challenge(struct Client *client_p, struct Client *source_p, + int parc, char *parv[]) +{ + sendto_one(source_p, form_str(RPL_YOUREOPER), + me.name, source_p->name); +} + +static struct Message challenge_msgtab = { + "CHALLENGE", 0, 0, 2, MAXPARA, MFLG_SLOW, 0, + { m_unregistered, m_challenge, m_ignore, m_ignore, mo_challenge, m_ignore } +}; + +static void +module_init(void) +{ + mod_add_cmd(&challenge_msgtab); +} + +static void +module_exit(void) +{ + mod_del_cmd(&challenge_msgtab); +} + +#else + +static void +module_init(void) +{ +} + +static void +module_exit(void) +{ +} +#endif + +struct module module_entry = { + .node = { NULL, NULL, NULL }, + .name = NULL, + .version = "$Revision$", + .handle = NULL, + .modinit = module_init, + .modexit = module_exit, + .flags = 0 +}; |