mirror of
https://github.com/ergochat/ergo.git
synced 2024-12-22 10:42:52 +01:00
fix #688
This commit is contained in:
parent
62473468f0
commit
3480f124cd
@ -259,11 +259,10 @@ func (server *Server) RunClient(conn clientConn, proxyLine string) {
|
|||||||
// cover up details of the tor proxying infrastructure (not a user privacy concern,
|
// cover up details of the tor proxying infrastructure (not a user privacy concern,
|
||||||
// but a hardening measure):
|
// but a hardening measure):
|
||||||
session.proxiedIP = utils.IPv4LoopbackAddress
|
session.proxiedIP = utils.IPv4LoopbackAddress
|
||||||
|
client.proxiedIP = session.proxiedIP
|
||||||
session.rawHostname = config.Server.TorListeners.Vhost
|
session.rawHostname = config.Server.TorListeners.Vhost
|
||||||
|
client.rawHostname = session.rawHostname
|
||||||
} else {
|
} else {
|
||||||
// set the hostname for this client (may be overridden later by PROXY or WEBIRC)
|
|
||||||
session.rawHostname = utils.LookupHostname(session.realIP.String())
|
|
||||||
client.cloakedHostname = config.Server.Cloaks.ComputeCloak(session.realIP)
|
|
||||||
remoteAddr := conn.Conn.RemoteAddr()
|
remoteAddr := conn.Conn.RemoteAddr()
|
||||||
if utils.AddrIsLocal(remoteAddr) {
|
if utils.AddrIsLocal(remoteAddr) {
|
||||||
// treat local connections as secure (may be overridden later by WEBIRC)
|
// treat local connections as secure (may be overridden later by WEBIRC)
|
||||||
@ -274,13 +273,71 @@ func (server *Server) RunClient(conn clientConn, proxyLine string) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
client.realIP = session.realIP
|
client.realIP = session.realIP
|
||||||
client.rawHostname = session.rawHostname
|
|
||||||
client.proxiedIP = session.proxiedIP
|
|
||||||
|
|
||||||
server.stats.Add()
|
server.stats.Add()
|
||||||
client.run(session, proxyLine)
|
client.run(session, proxyLine)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// resolve an IP to an IRC-ready hostname, using reverse DNS, forward-confirming if necessary,
|
||||||
|
// and sending appropriate notices to the client
|
||||||
|
func (client *Client) lookupHostname(session *Session, overwrite bool) {
|
||||||
|
if client.isTor {
|
||||||
|
return
|
||||||
|
} // else: even if cloaking is enabled, look up the real hostname to show to operators
|
||||||
|
|
||||||
|
config := client.server.Config()
|
||||||
|
ip := session.realIP
|
||||||
|
if session.proxiedIP != nil {
|
||||||
|
ip = session.proxiedIP
|
||||||
|
}
|
||||||
|
ipString := ip.String()
|
||||||
|
|
||||||
|
var hostname, candidate string
|
||||||
|
if config.Server.lookupHostnames {
|
||||||
|
session.Notice("*** Looking up your hostname...")
|
||||||
|
|
||||||
|
names, err := net.LookupAddr(ipString)
|
||||||
|
if err == nil && 0 < len(names) {
|
||||||
|
candidate = strings.TrimSuffix(names[0], ".")
|
||||||
|
}
|
||||||
|
if utils.IsHostname(candidate) {
|
||||||
|
if config.Server.ForwardConfirmHostnames {
|
||||||
|
addrs, err := net.LookupHost(candidate)
|
||||||
|
if err == nil {
|
||||||
|
for _, addr := range addrs {
|
||||||
|
if addr == ipString {
|
||||||
|
hostname = candidate // successful forward confirmation
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
hostname = candidate
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if hostname != "" {
|
||||||
|
session.Notice("*** Found your hostname")
|
||||||
|
} else {
|
||||||
|
if config.Server.lookupHostnames {
|
||||||
|
session.Notice("*** Couldn't look up your hostname")
|
||||||
|
}
|
||||||
|
hostname = utils.IPStringToHostname(ipString)
|
||||||
|
}
|
||||||
|
|
||||||
|
session.rawHostname = hostname
|
||||||
|
// update the hostname if this is a new connection or a resume, but not if it's a reattach
|
||||||
|
if overwrite || client.rawHostname == "" {
|
||||||
|
cloakedHostname := config.Server.Cloaks.ComputeCloak(ip)
|
||||||
|
client.stateMutex.Lock()
|
||||||
|
defer client.stateMutex.Unlock()
|
||||||
|
client.rawHostname = hostname
|
||||||
|
client.cloakedHostname = cloakedHostname
|
||||||
|
client.updateNickMaskNoMutex()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
func (client *Client) doIdentLookup(conn net.Conn) {
|
func (client *Client) doIdentLookup(conn net.Conn) {
|
||||||
_, serverPortString, err := net.SplitHostPort(conn.LocalAddr().String())
|
_, serverPortString, err := net.SplitHostPort(conn.LocalAddr().String())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -617,7 +674,7 @@ func (session *Session) playResume() {
|
|||||||
|
|
||||||
details := client.Details()
|
details := client.Details()
|
||||||
oldNickmask := details.nickMask
|
oldNickmask := details.nickMask
|
||||||
client.SetRawHostname(session.rawHostname)
|
client.lookupHostname(session, true)
|
||||||
hostname := client.Hostname() // may be a vhost
|
hostname := client.Hostname() // may be a vhost
|
||||||
timestampString := timestamp.Format(IRCv3TimestampFormat)
|
timestampString := timestamp.Format(IRCv3TimestampFormat)
|
||||||
|
|
||||||
@ -887,6 +944,10 @@ func (client *Client) updateNickMaskNoMutex() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if client.hostname == "" {
|
||||||
|
return // pre-registration, don't bother generating the hostname
|
||||||
|
}
|
||||||
|
|
||||||
cfhostname, err := Casefold(client.hostname)
|
cfhostname, err := Casefold(client.hostname)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
client.server.logger.Error("internal", "hostname couldn't be casefolded", client.hostname, err.Error())
|
client.server.logger.Error("internal", "hostname couldn't be casefolded", client.hostname, err.Error())
|
||||||
@ -1255,6 +1316,10 @@ func (client *Client) Notice(text string) {
|
|||||||
client.Send(nil, client.server.name, "NOTICE", client.Nick(), text)
|
client.Send(nil, client.server.name, "NOTICE", client.Nick(), text)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (session *Session) Notice(text string) {
|
||||||
|
session.Send(nil, session.client.server.name, "NOTICE", session.client.Nick(), text)
|
||||||
|
}
|
||||||
|
|
||||||
func (client *Client) addChannel(channel *Channel) {
|
func (client *Client) addChannel(channel *Channel) {
|
||||||
client.stateMutex.Lock()
|
client.stateMutex.Lock()
|
||||||
client.channels[channel] = true
|
client.channels[channel] = true
|
||||||
|
@ -293,19 +293,22 @@ type Config struct {
|
|||||||
Listen []string
|
Listen []string
|
||||||
TLSListeners map[string]TLSListenConfig `yaml:"tls-listeners"`
|
TLSListeners map[string]TLSListenConfig `yaml:"tls-listeners"`
|
||||||
// either way, the result is this:
|
// either way, the result is this:
|
||||||
trueListeners map[string]listenerConfig
|
trueListeners map[string]listenerConfig
|
||||||
STS STSConfig
|
STS STSConfig
|
||||||
CheckIdent bool `yaml:"check-ident"`
|
LookupHostnames *bool `yaml:"lookup-hostnames"`
|
||||||
MOTD string
|
lookupHostnames bool
|
||||||
motdLines []string
|
ForwardConfirmHostnames bool `yaml:"forward-confirm-hostnames"`
|
||||||
MOTDFormatting bool `yaml:"motd-formatting"`
|
CheckIdent bool `yaml:"check-ident"`
|
||||||
ProxyAllowedFrom []string `yaml:"proxy-allowed-from"`
|
MOTD string
|
||||||
proxyAllowedFromNets []net.IPNet
|
motdLines []string
|
||||||
WebIRC []webircConfig `yaml:"webirc"`
|
MOTDFormatting bool `yaml:"motd-formatting"`
|
||||||
MaxSendQString string `yaml:"max-sendq"`
|
ProxyAllowedFrom []string `yaml:"proxy-allowed-from"`
|
||||||
MaxSendQBytes int
|
proxyAllowedFromNets []net.IPNet
|
||||||
AllowPlaintextResume bool `yaml:"allow-plaintext-resume"`
|
WebIRC []webircConfig `yaml:"webirc"`
|
||||||
Compatibility struct {
|
MaxSendQString string `yaml:"max-sendq"`
|
||||||
|
MaxSendQBytes int
|
||||||
|
AllowPlaintextResume bool `yaml:"allow-plaintext-resume"`
|
||||||
|
Compatibility struct {
|
||||||
ForceTrailing *bool `yaml:"force-trailing"`
|
ForceTrailing *bool `yaml:"force-trailing"`
|
||||||
forceTrailing bool
|
forceTrailing bool
|
||||||
SendUnprefixedSasl bool `yaml:"send-unprefixed-sasl"`
|
SendUnprefixedSasl bool `yaml:"send-unprefixed-sasl"`
|
||||||
@ -635,6 +638,13 @@ func LoadConfig(filename string) (config *Config, err error) {
|
|||||||
// set this even if STS is disabled
|
// set this even if STS is disabled
|
||||||
config.Server.capValues[caps.STS] = config.Server.STS.Value()
|
config.Server.capValues[caps.STS] = config.Server.STS.Value()
|
||||||
|
|
||||||
|
// lookup-hostnames defaults to true if unset
|
||||||
|
if config.Server.LookupHostnames != nil {
|
||||||
|
config.Server.lookupHostnames = *config.Server.LookupHostnames
|
||||||
|
} else {
|
||||||
|
config.Server.lookupHostnames = true
|
||||||
|
}
|
||||||
|
|
||||||
// process webirc blocks
|
// process webirc blocks
|
||||||
var newWebIRC []webircConfig
|
var newWebIRC []webircConfig
|
||||||
for _, webirc := range config.Server.WebIRC {
|
for _, webirc := range config.Server.WebIRC {
|
||||||
|
@ -76,18 +76,12 @@ func (client *Client) ApplyProxiedIP(session *Session, proxiedIP string, tls boo
|
|||||||
client.server.connectionLimiter.RemoveClient(session.realIP)
|
client.server.connectionLimiter.RemoveClient(session.realIP)
|
||||||
|
|
||||||
// given IP is sane! override the client's current IP
|
// given IP is sane! override the client's current IP
|
||||||
ipstring := parsedProxiedIP.String()
|
client.server.logger.Info("localconnect-ip", "Accepted proxy IP for client", parsedProxiedIP.String())
|
||||||
client.server.logger.Info("localconnect-ip", "Accepted proxy IP for client", ipstring)
|
|
||||||
rawHostname := utils.LookupHostname(ipstring)
|
|
||||||
cloakedHostname := client.server.Config().Server.Cloaks.ComputeCloak(parsedProxiedIP)
|
|
||||||
|
|
||||||
client.stateMutex.Lock()
|
client.stateMutex.Lock()
|
||||||
defer client.stateMutex.Unlock()
|
defer client.stateMutex.Unlock()
|
||||||
client.proxiedIP = parsedProxiedIP
|
client.proxiedIP = parsedProxiedIP
|
||||||
client.rawHostname = rawHostname
|
|
||||||
session.proxiedIP = parsedProxiedIP
|
session.proxiedIP = parsedProxiedIP
|
||||||
session.rawHostname = rawHostname
|
|
||||||
client.cloakedHostname = cloakedHostname
|
|
||||||
// nickmask will be updated when the client completes registration
|
// nickmask will be updated when the client completes registration
|
||||||
// set tls info
|
// set tls info
|
||||||
client.certfp = ""
|
client.certfp = ""
|
||||||
|
@ -239,14 +239,6 @@ func (client *Client) RawHostname() (result string) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func (client *Client) SetRawHostname(rawHostname string) {
|
|
||||||
client.stateMutex.Lock()
|
|
||||||
defer client.stateMutex.Unlock()
|
|
||||||
|
|
||||||
client.rawHostname = rawHostname
|
|
||||||
client.updateNickMaskNoMutex()
|
|
||||||
}
|
|
||||||
|
|
||||||
func (client *Client) AwayMessage() (result string) {
|
func (client *Client) AwayMessage() (result string) {
|
||||||
client.stateMutex.RLock()
|
client.stateMutex.RLock()
|
||||||
result = client.awayMessage
|
result = client.awayMessage
|
||||||
|
@ -377,12 +377,9 @@ func (server *Server) tryRegister(c *Client, session *Session) (exiting bool) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
// check KLINEs
|
// we have nickname, username, and the final value of the IP address:
|
||||||
isBanned, info := server.klines.CheckMasks(c.AllNickmasks()...)
|
// do the hostname lookup and set the nickmask
|
||||||
if isBanned {
|
session.client.lookupHostname(session, false)
|
||||||
c.Quit(info.BanMessage(c.t("You are banned from this server (%s)")), nil)
|
|
||||||
return true
|
|
||||||
}
|
|
||||||
|
|
||||||
if session.client != c {
|
if session.client != c {
|
||||||
// reattached, bail out.
|
// reattached, bail out.
|
||||||
@ -392,6 +389,13 @@ func (server *Server) tryRegister(c *Client, session *Session) (exiting bool) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// check KLINEs
|
||||||
|
isBanned, info := server.klines.CheckMasks(c.AllNickmasks()...)
|
||||||
|
if isBanned {
|
||||||
|
c.Quit(info.BanMessage(c.t("You are banned from this server (%s)")), nil)
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
// registration has succeeded:
|
// registration has succeeded:
|
||||||
c.SetRegistered()
|
c.SetRegistered()
|
||||||
|
|
||||||
|
@ -40,22 +40,13 @@ func AddrIsUnix(addr net.Addr) bool {
|
|||||||
return ok
|
return ok
|
||||||
}
|
}
|
||||||
|
|
||||||
// LookupHostname returns the hostname for `addr` if it has one. Otherwise, just returns `addr`.
|
// IPStringToHostname converts a string representation of an IP address to an IRC-ready hostname
|
||||||
func LookupHostname(addr string) string {
|
func IPStringToHostname(ipStr string) string {
|
||||||
names, err := net.LookupAddr(addr)
|
if 0 < len(ipStr) && ipStr[0] == ':' {
|
||||||
if err == nil && len(names) > 0 {
|
|
||||||
candidate := strings.TrimSuffix(names[0], ".")
|
|
||||||
if IsHostname(candidate) {
|
|
||||||
return candidate
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// return original address if no hostname found
|
|
||||||
if len(addr) > 0 && addr[0] == ':' {
|
|
||||||
// fix for IPv6 hostnames (so they don't start with a colon), same as all other IRCds
|
// fix for IPv6 hostnames (so they don't start with a colon), same as all other IRCds
|
||||||
addr = "0" + addr
|
ipStr = "0" + ipStr
|
||||||
}
|
}
|
||||||
return addr
|
return ipStr
|
||||||
}
|
}
|
||||||
|
|
||||||
var allowedHostnameChars = "abcdefghijklmnopqrstuvwxyz1234567890-."
|
var allowedHostnameChars = "abcdefghijklmnopqrstuvwxyz1234567890-."
|
||||||
|
@ -85,6 +85,14 @@ server:
|
|||||||
# should clients include this STS policy when they ship their inbuilt preload lists?
|
# should clients include this STS policy when they ship their inbuilt preload lists?
|
||||||
preload: false
|
preload: false
|
||||||
|
|
||||||
|
# whether to look up user hostnames with reverse DNS
|
||||||
|
# (to suppress this for privacy purposes, use the ip-cloaking options below)
|
||||||
|
lookup-hostnames: true
|
||||||
|
# whether to confirm hostname lookups using "forward-confirmed reverse DNS", i.e., for
|
||||||
|
# any hostname returned from reverse DNS, resolve it back to an IP address and reject it
|
||||||
|
# unless it matches the connecting IP
|
||||||
|
forward-confirm-hostnames: true
|
||||||
|
|
||||||
# use ident protocol to get usernames
|
# use ident protocol to get usernames
|
||||||
check-ident: false
|
check-ident: false
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user