Tekil Mesaj gösterimi
Alt 25 Nisan 2007, 07:53   #12
Çevrimdışı
Freak
Kullanıcıların profil bilgileri misafirlere kapatılmıştır.
IF Ticaret Sayısı: (0)
IF Ticaret Yüzdesi:(%)
Cevap: /* Yuzukchat.Net IRC(d) Dosyaları */




s_kline.c
Kod:   Kodu kopyalamak için üzerine çift tıklayın!
/* * Unreal Internet Relay Chat Daemon, src/s_kline.c * (C) 1999-2000 Carsten Munk (Techie/Stskeeps) <
Bu forumdaki linkleri ve resimleri görebilmek için en az 25 mesajınız olması gerekir.
> * File to take care of dynamic K:/G:/Z: lines * * * See file AUTHORS in IRC package for additional names of * the programmers. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 1, or (at your option) * any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "struct.h" #include "common.h" #include "sys.h" #include "numeric.h" #include "msg.h" #include "channel.h" #include <time.h> #include <sys/stat.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #ifdef _WIN32 #include <io.h> #endif #include <fcntl.h> #include "h.h" #include "proto.h" #include "inet.h" aTKline *tklines[TKLISTLEN]; extern MODVAR char zlinebuf[BUFSIZE]; int MODVAR spamf_ugly_vchanoverride = 0; /** tkl hash method. * NOTE1: the input value 'c' is assumed to be in range a-z or A-Z! * NOTE2: don't blindly change the hashmethod, some things depend on * 'z'/'Z' getting the same bucket. */ inline int tkl_hash(char c) { #ifdef DEBUGMODE if ((c >= 'a') && (c <= 'z')) return c-'a'; else if ((c >= 'A') && (c <= 'Z')) return c-'A'; else { sendto_realops("[BUG] tkl_hash() called with out of range parameter (c = '%c') !!!", c); ircd_log(LOG_ERROR, "[BUG] tkl_hash() called with out of range parameter (c = '%c') !!!", c); return 0; } #else return (isupper(c) ? c-'A' : c-'a'); #endif } /** tkl type to tkl character. * NOTE: type is assumed to be valid. */ char tkl_typetochar(int type) { if (type & TKL_GLOBAL) { if (type & TKL_KILL) return 'G'; if (type & TKL_ZAP) return 'Z'; if (type & TKL_SHUN) return 's'; if (type & TKL_KILL) return 'G'; if (type & TKL_SPAMF) return 'F'; if (type & TKL_NICK) return 'Q'; } else { if (type & TKL_ZAP) return 'z'; if (type & TKL_KILL) return 'k'; if (type & TKL_SPAMF) return 'f'; if (type & TKL_NICK) return 'q'; } sendto_realops("[BUG]: tkl_typetochar(): unknown type 0x%x !!!", type); ircd_log(LOG_ERROR, "[BUG] tkl_typetochar(): unknown type 0x%x !!!", type); return 0; } void tkl_init(void) { memset(tklines, 0, sizeof(tklines)); } /* * type = TKL_* * usermask@hostmask * reason * setby = whom set it * expire_at = when to expire - 0 if not to expire * set_at = was set at * spamf_tkl_duration = duration of *line placed by spamfilter [1] * spamf_tkl_reason = escaped reason field for *lines placed by spamfilter [1] * * [1]: only relevant for spamfilters, else ignored (eg 0, NULL). */ aTKline *tkl_add_line(int type, char *usermask, char *hostmask, char *reason, char *setby, TS expire_at, TS set_at, TS spamf_tkl_duration, char *spamf_tkl_reason) { aTKline *nl; int index; nl = (aTKline *) MyMallocEx(sizeof(aTKline)); if (!nl) return NULL; nl->type = type; nl->expire_at = expire_at; nl->set_at = set_at; strncpyzt(nl->usermask, usermask, sizeof(nl->usermask)); nl->hostmask = strdup(hostmask); nl->reason = strdup(reason); nl->setby = strdup(setby); if (type & TKL_SPAMF) { /* Need to set some additional flags like 'targets' and 'action'.. */ nl->subtype = spamfilter_gettargets(usermask, NULL); nl->ptr.spamf = unreal_buildspamfilter(reason); nl->ptr.spamf->action = banact_chartoval(*hostmask); nl->expire_at = 0; /* temporary spamfilters are NOT supported! (makes no sense) */ if (!spamf_tkl_reason) { /* no exttkl support, use default values... */ nl->ptr.spamf->tkl_duration = SPAMFILTER_BAN_TIME; nl->ptr.spamf->tkl_reason = strdup(unreal_encodespace(SPAMFILTER_BAN_REASON)); } else { nl->ptr.spamf->tkl_duration = spamf_tkl_duration; nl->ptr.spamf->tkl_reason = strdup(spamf_tkl_reason); /* already encoded */ } if (nl->subtype & SPAMF_USER) loop.do_bancheck_spamf_user = 1; if (nl->subtype & SPAMF_AWAY) loop.do_bancheck_spamf_away = 1; } else if (type & TKL_KILL || type & TKL_ZAP || type & TKL_SHUN) { struct irc_netmask tmp; if ((tmp.type = parse_netmask(nl->hostmask, &tmp)) != HM_HOST) { nl->ptr.netmask = MyMallocEx(sizeof(struct irc_netmask)); bcopy(&tmp, nl->ptr.netmask, sizeof(struct irc_netmask)); } } index = tkl_hash(tkl_typetochar(type)); AddListItem(nl, tklines[index]); return nl; } aTKline *tkl_del_line(aTKline *tkl) { aTKline *p, *q; int index = tkl_hash(tkl_typetochar(tkl->type)); for (p = tklines[index]; p; p = p->next) { if (p == tkl) { q = p->next; MyFree(p->hostmask); MyFree(p->reason); MyFree(p->setby); if (p->type & TKL_SPAMF && p->ptr.spamf) { regfree(&p->ptr.spamf->expr); if (p->ptr.spamf->tkl_reason) MyFree(p->ptr.spamf->tkl_reason); MyFree(p->ptr.spamf); } if ((p->type & TKL_KILL || p->type & TKL_ZAP || p->type & TKL_SHUN) && p->ptr.netmask) MyFree(p->ptr.netmask); DelListItem(p, tklines[index]); MyFree(p); return q; } } return NULL; } /* * tkl_check_local_remove_shun: * removes shun from currently connected users affected by tmp. */ static void tkl_check_local_remove_shun(aTKline *tmp) { long i1, i; char *chost, *cname, *cip; int is_ip; aClient *acptr; for (i1 = 0; i1 <= 5; i1++) { /* winlocal for (i = 0; i <= (MAXCONNECTIONS - 1); i++) */ for (i = 0; i <= LastSlot; ++i) { if ((acptr = local[i])) if (MyClient(acptr) && IsShunned(acptr)) { chost = acptr->sockhost; cname = acptr->user->username; cip = GetIP(acptr); if ((*tmp->hostmask >= '0') && (*tmp->hostmask <= '9')) is_ip = 1; else is_ip = 0; if (is_ip == 0 ? (!match(tmp->hostmask, chost) && !match(tmp->usermask, cname)) : (!match(tmp->hostmask, chost) || !match(tmp->hostmask, cip)) && !match(tmp->usermask, cname)) { ClearShunned(acptr); #ifdef SHUN_NOTICES sendto_one(acptr, ":%s NOTICE %s :*** You are no longer shunned", me.name, acptr->name); #endif } } } } } aTKline *tkl_expire(aTKline * tmp) { char whattype[512]; if (!tmp) return NULL; whattype[0] = 0; if ((tmp->expire_at == 0) || (tmp->expire_at > TStime())) { sendto_ops ("tkl_expire(): expire for not-yet-expired tkline %s@%s", tmp->usermask, tmp->hostmask); return (tmp->next); } /* Using strlcpy here is wasteful, we know it is < 512 */ if (tmp->type & TKL_GLOBAL) { if (tmp->type & TKL_KILL) strcpy(whattype, "G:Line"); else if (tmp->type & TKL_ZAP) strcpy(whattype, "Global Z:Line"); else if (tmp->type & TKL_SHUN) strcpy(whattype, "Shun"); else if (tmp->type & TKL_NICK) strcpy(whattype, "Global Q:line"); } else { if (tmp->type & TKL_KILL) strcpy(whattype, "K:Line"); else if (tmp->type & TKL_ZAP) strcpy(whattype, "Z:Line"); else if (tmp->type & TKL_SHUN) strcpy(whattype, "Local Shun"); else if (tmp->type & TKL_NICK) strcpy(whattype, "Q:line"); } if (!(tmp->type & TKL_NICK)) { sendto_snomask(SNO_TKL, "*** Expiring %s (%s@%s) made by %s (Reason: %s) set %li seconds ago", whattype, tmp->usermask, tmp->hostmask, tmp->setby, tmp->reason, TStime() - tmp->set_at); ircd_log (LOG_TKL, "Expiring %s (%s@%s) made by %s (Reason: %s) set %li seconds ago", whattype, tmp->usermask, tmp->hostmask, tmp->setby, tmp->reason, TStime() - tmp->set_at); } else if (!(*tmp->usermask == 'H')) /* Q:line but not a hold */ { sendto_snomask(SNO_TKL, "*** Expiring %s (%s) made by %s (Reason: %s) set %li seconds ago", whattype, tmp->hostmask, tmp->setby, tmp->reason, TStime() - tmp->set_at); ircd_log (LOG_TKL, "Expiring %s (%s) made by %s (Reason: %s) set %li seconds ago", whattype, tmp->hostmask, tmp->setby, tmp->reason, TStime() - tmp->set_at); } if (tmp->type & TKL_SHUN) tkl_check_local_remove_shun(tmp); RunHook5(HOOKTYPE_TKL_DEL, NULL, NULL, tmp, 0, NULL); return (tkl_del_line(tmp)); } EVENT(tkl_check_expire) { aTKline *gp, *next; TS nowtime; int index; nowtime = TStime(); for (index = 0; index < TKLISTLEN; index++) for (gp = tklines[index]; gp; gp = next) { next = gp->next; if (gp->expire_at <= nowtime && !(gp->expire_at == 0)) { tkl_expire(gp); } } } /* returns <0 if client exists (banned) returns 1 if it is excepted */ int find_tkline_match(aClient *cptr, int xx) { aTKline *lp; char *chost, *cname, *cip; TS nowtime; char msge[1024]; int points = 0; ConfigItem_except *excepts; char host[NICKLEN+USERLEN+HOSTLEN+6], host2[NICKLEN+USERLEN+HOSTLEN+6]; int match_type = 0; int index; Hook *tmphook; if (IsServer(cptr) || IsMe(cptr)) return -1; nowtime = TStime(); chost = cptr->sockhost; cname = cptr->user ? cptr->user->username : "unknown"; cip = GetIP(cptr); points = 0; for (index = 0; index < TKLISTLEN; index++) { for (lp = tklines[index]; lp; lp = lp->next) { if ((lp->type & TKL_SHUN) || (lp->type & TKL_SPAMF) || (lp->type & TKL_NICK)) continue; /* If it's tangy and brown, you're in CIDR town! */ if (lp->ptr.netmask) { if (match_ip(cptr->ip, NULL, NULL, lp->ptr.netmask) && !match(lp->usermask, cname)) { points = 1; break; } continue; } if (!match(lp->usermask, cname) && !match(lp->hostmask, chost)) { points = 1; break; } if (!match(lp->usermask, cname) && !match(lp->hostmask, cip)) { points = 1; break; } } if (points) break; } if (points != 1) return 1; strcpy(host, make_user_host(cname, chost)); strcpy(host2, make_user_host(cname, cip)); if (((lp->type & TKL_KILL) || (lp->type & TKL_ZAP)) && !(lp->type & TKL_GLOBAL)) match_type = CONF_EXCEPT_BAN; else match_type = CONF_EXCEPT_TKL; for (excepts = conf_except; excepts; excepts = (ConfigItem_except *)excepts->next) { if (excepts->flag.type != match_type || (match_type == CONF_EXCEPT_TKL && excepts->type != lp->type)) continue; if (excepts->netmask) { if (match_ip(cptr->ip, host2, excepts->mask, excepts->netmask)) return 1; } else if (!match(excepts->mask, host) || !match(excepts->mask, host2)) return 1; } for (tmphook = Hooks[HOOKTYPE_TKL_EXCEPT]; tmphook; tmphook = tmphook->next) if (tmphook->func.intfunc(cptr, lp) > 0) return 1; if ((lp->type & TKL_KILL) && (xx != 2)) { if (lp->type & TKL_GLOBAL) { ircstp->is_ref++; if (GLINE_ADDRESS) sendto_one(cptr, ":%s NOTICE %s :*** You are %s from %s (1Serverdan uzaklastirildiniz. 2[ 5Reklam, Küfür, Clone, Trojan 2] 1Gibi eylemler yasaktir. Servera girisinizde 2[ 3/Rules 2) 4Komutunu Kullanip Server Kurallarini Okuyunuz!)" " Email %s for more information.", me.name, cptr->name, (lp->expire_at ? "banned" : "permanently banned"), ircnetwork, lp->reason, GLINE_ADDRESS); else sendto_one(cptr, ":%s NOTICE %s :*** You are %s from %s (1Serverdan uzaklastirildiniz. 2[ 5Reklam, Küfür, Clone, Trojan 2] 1Gibi eylemler yasaktir. Servera girisinizde 2[ 3/Rules 2) 4Komutunu Kullanip Server Kurallarini Okuyunuz!)", me.name, cptr->name, (lp->expire_at ? "banned" : "permanently banned"), ircnetwork, lp->reason); ircsprintf(msge, "User has been %s from %s (1Serverdan uzaklastirildiniz. 2[ 5Reklam, Küfür, Clone, Trojan 2] 1Gibi eylemler yasaktir. Servera girisinizde 2[ 3/Rules 2) 4Komutunu Kullanip Server Kurallarini Okuyunuz!)", (lp->expire_at ? "banned" : "permanently banned"), ircnetwork, lp->reason); return (exit_client(cptr, cptr, &me, msge)); } else { ircstp->is_ref++; sendto_one(cptr, ":%s NOTICE %s :*** You are %s from %s (1Serverdan uzaklastirildiniz. 2[ 5Reklam, Küfür, Clone, Trojan 2] 1Gibi eylemler yasaktir. Servera girisinizde 2[ 3/Rules 2) 4Komutunu Kullanip Server Kurallarini Okuyunuz!)" " Email %s for more information.", me.name, cptr->name, (lp->expire_at ? "banned" : "permanently banned"), me.name, lp->reason, KLINE_ADDRESS); ircsprintf(msge, "User is %s (1Serverdan uzaklastirildiniz. 2[ 5Reklam, Küfür, Clone, Trojan 2] 1Gibi eylemler yasaktir. Servera girisinizde 2[ 3/Rules 2) 4Komutunu Kullanip Server Kurallarini Okuyunuz!)", (lp->expire_at ? "banned" : "permanently banned"), lp->reason); return (exit_client(cptr, cptr, &me, msge)); } } if (lp->type & TKL_ZAP) { ircstp->is_ref++; ircsprintf(msge, "Z:lined (1Serverdan uzaklastirildiniz. 2[ 5Reklam, Küfür, Clone, Trojan 2] 1Gibi eylemler yasaktir. Servera girisinizde 2[ 3/Rules 2) 4Komutunu Kullanip Server Kurallarini Okuyunuz!)",lp->reason); return exit_client(cptr, cptr, &me, msge); } return 3; } int find_shun(aClient *cptr) { aTKline *lp; char *chost, *cname, *cip; TS nowtime; int points = 0; ConfigItem_except *excepts; char host[NICKLEN+USERLEN+HOSTLEN+6], host2[NICKLEN+USERLEN+HOSTLEN+6]; int match_type = 0; if (IsServer(cptr) || IsMe(cptr)) return -1; if (IsShunned(cptr)) return 1; if (IsAdmin(cptr)) return 1; nowtime = TStime(); chost = cptr->sockhost; cname = cptr->user ? cptr->user->username : "unknown"; cip = GetIP(cptr); for (lp = tklines[tkl_hash('s')]; lp; lp = lp->next) { points = 0; if (!(lp->type & TKL_SHUN)) continue; /* CIDR */ if (lp->ptr.netmask) { if (match_ip(cptr->ip, NULL, NULL, lp->ptr.netmask) && !match(lp->usermask, cname)) { points = 1; break; } continue; } if (!match(lp->usermask, cname) && !match(lp->hostmask, chost)) { points = 1; break; } if (!match(lp->usermask, cname) && !match(lp->hostmask, cip)) { points = 1; break; } else points = 0; } if (points != 1) return 1; strcpy(host, make_user_host(cname, chost)); strcpy(host2, make_user_host(cname, cip)); match_type = CONF_EXCEPT_TKL; for (excepts = conf_except; excepts; excepts = (ConfigItem_except *)excepts->next) { if (excepts->flag.type != match_type || (match_type == CONF_EXCEPT_TKL && excepts->type != lp->type)) continue; if (excepts->netmask) { if (match_ip(cptr->ip, NULL, NULL, excepts->netmask)) return 1; } else if (!match(excepts->mask, host) || !match(excepts->mask, host2)) return 1; } SetShunned(cptr); return 2; } /** Checks if the user matches a spamfilter of type 'u' (user, * nick!user@host:realname ban). * Written by: Syzop * Assumes: only call for clients, possible assume on local clients [?] * Return values: see dospamfilter() */ int find_spamfilter_user(aClient *sptr) { char spamfilter_user[NICKLEN + USERLEN + HOSTLEN + REALLEN + 64]; /* n!u@h:r */ if (IsAnOper(sptr)) return 0; ircsprintf(spamfilter_user, "%s!%s@%s:%s", sptr->name, sptr->user->username, sptr->user->realhost, sptr->info); return dospamfilter(sptr, spamfilter_user, SPAMF_USER, NULL); } aTKline *find_qline(aClient *cptr, char *nick, int *ishold) { aTKline *lp; char *chost, *cname, *cip; char host[NICKLEN+USERLEN+HOSTLEN+6], hostbuf2[NICKLEN+USERLEN+HOSTLEN+6], *host2 = NULL; int points = 0; ConfigItem_except *excepts; *ishold = 0; if (IsServer(cptr) || IsMe(cptr)) return NULL; for (lp = tklines[tkl_hash('q')]; lp; lp = lp->next) { points = 0; if (!(lp->type & TKL_NICK)) continue; if (!match(lp->hostmask, nick)) { points = 1; break; } } if (points != 1) return NULL; /* It's a services hold */ if (*lp->usermask == 'H') { *ishold = 1; return lp; } chost = cptr->user ? cptr->user->realhost : (MyConnect(cptr) ? cptr->sockhost : "unknown"); cname = cptr->user ? cptr->user->username : "unknown"; strcpy(host, make_user_host(cname, chost)); cip = GetIP(cptr); if (cip) { strcpy(hostbuf2, make_user_host(cname, cip)); host2 = hostbuf2; } for (excepts = conf_except; excepts; excepts = (ConfigItem_except *)excepts->next) { if (excepts->flag.type != CONF_EXCEPT_TKL || excepts->type != TKL_NICK) continue; if (excepts->netmask) { if (MyConnect(cptr) && match_ip(cptr->ip, NULL, NULL, excepts->netmask)) return NULL; } else if (!match(excepts->mask, host) || (host2 && !match(excepts->mask, host2))) return NULL; } return lp; } int find_tkline_match_zap(aClient *cptr) { aTKline *lp; char *cip; TS nowtime; char msge[1024]; ConfigItem_except *excepts; Hook *tmphook; if (IsServer(cptr) || IsMe(cptr)) return -1; nowtime = TStime(); cip = GetIP(cptr); for (lp = tklines[tkl_hash('z')]; lp; lp = lp->next) { if (lp->type & TKL_ZAP) { if ((lp->ptr.netmask && match_ip(cptr->ip, NULL, NULL, lp->ptr.netmask)) || !match(lp->hostmask, cip)) { for (excepts = conf_except; excepts; excepts = (ConfigItem_except *)excepts->next) { if (excepts->flag.type != CONF_EXCEPT_TKL || excepts->type != lp->type) continue; if (excepts->netmask) { if (match_ip(cptr->ip, NULL, NULL, excepts->netmask)) return -1; } else if (!match(excepts->mask, cip)) return -1; } for (tmphook = Hooks[HOOKTYPE_TKL_EXCEPT]; tmphook; tmphook = tmphook->next) if (tmphook->func.intfunc(cptr, lp) > 0) return -1; ircstp->is_ref++; ircsprintf(msge, "ERROR :Closing Link: [%s] Z:Lined (%s)\r\n", #ifndef INET6 inetntoa((char *)&cptr->ip), lp->reason); #else inet_ntop(AF_INET6, (char *)&cptr->ip, mydummy, MYDUMMY_SIZE), lp->reason); #endif strlcpy(zlinebuf, msge, sizeof zlinebuf); return (1); } } } return -1; } #define BY_MASK 0x1 #define BY_REASON 0x2 #define NOT_BY_MASK 0x4 #define NOT_BY_REASON 0x8 #define BY_SETBY 0x10 #define NOT_BY_SETBY 0x20 typedef struct { int flags; char *mask; char *reason; char *setby; } TKLFlag; void parse_tkl_para(char *para, TKLFlag *flag) { static char paratmp[512]; /* <- copy of para, because it gets fragged by strtok() */ char *flags, *tmp; char what = '+'; strncpyzt(paratmp, para, sizeof(paratmp)); flags = strtok(paratmp, " "); bzero(flag, sizeof(TKLFlag)); for (; *flags; flags++) { switch (*flags) { case '+': what = '+'; break; case '-': what = '-'; break; case 'm': if (flag->mask || !(tmp = strtok(NULL, " "))) continue; if (what == '+') flag->flags |= BY_MASK; else flag->flags |= NOT_BY_MASK; flag->mask = tmp; break; case 'r': if (flag->reason || !(tmp = strtok(NULL, " "))) continue; if (what == '+') flag->flags |= BY_REASON; else flag->flags |= NOT_BY_REASON; flag->reason = tmp; break; case 's': if (flag->setby || !(tmp = strtok(NULL, " "))) continue; if (what == '+') flag->flags |= BY_SETBY; else flag->flags |= NOT_BY_SETBY; flag->setby = tmp; break; } } } void tkl_stats(aClient *cptr, int type, char *para) { aTKline *tk; TS curtime; TKLFlag tklflags; int index; /* We output in this row: Glines,GZlines,KLine, ZLIne Character: G, Z, K, z */ if (!BadPtr(para)) parse_tkl_para(para, &tklflags); tkl_check_expire(NULL); curtime = TStime(); for (index = 0; index < TKLISTLEN; index++) for (tk = tklines[index]; tk; tk = tk->next) { if (type && tk->type != type) continue; if (!BadPtr(para)) { if (tklflags.flags & BY_MASK) { if (tk->type & TKL_NICK) { if (match(tklflags.mask, tk->hostmask)) continue; } else if (match(tklflags.mask, make_user_host(tk->usermask, tk->hostmask))) continue; } if (tklflags.flags & NOT_BY_MASK) { if (tk->type & TKL_NICK) { if (!match(tklflags.mask, tk->hostmask)) continue; } else if (!match(tklflags.mask, make_user_host(tk->usermask, tk->hostmask))) continue; } if (tklflags.flags & BY_REASON) if (match(tklflags.reason, tk->reason)) continue; if (tklflags.flags & NOT_BY_REASON) if (!match(tklflags.reason, tk->reason)) continue; if (tklflags.flags & BY_SETBY) if (match(tklflags.setby, tk->setby)) continue; if (tklflags.flags & NOT_BY_SETBY) if (!match(tklflags.setby, tk->setby)) continue; } if (tk->type == (TKL_KILL | TKL_GLOBAL)) { sendto_one(cptr, rpl_str(RPL_STATSGLINE), me.name, cptr->name, 'G', tk->usermask, tk->hostmask, (tk->expire_at != 0) ? (tk->expire_at - curtime) : 0, (curtime - tk->set_at), tk->setby, tk->reason); } if (tk->type == (TKL_ZAP | TKL_GLOBAL)) { sendto_one(cptr, rpl_str(RPL_STATSGLINE), me.name, cptr->name, 'Z', tk->usermask, tk->hostmask, (tk->expire_at != 0) ? (tk->expire_at - curtime) : 0, (curtime - tk->set_at), tk->setby, tk->reason); } if (tk->type == (TKL_SHUN | TKL_GLOBAL)) { sendto_one(cptr, rpl_str(RPL_STATSGLINE), me.name, cptr->name, 's', tk->usermask, tk->hostmask, (tk->expire_at != 0) ? (tk->expire_at - curtime) : 0, (curtime - tk->set_at), tk->setby, tk->reason); } if (tk->type == (TKL_KILL)) { sendto_one(cptr, rpl_str(RPL_STATSGLINE), me.name, cptr->name, 'K', tk->usermask, tk->hostmask, (tk->expire_at != 0) ? (tk->expire_at - curtime) : 0, (curtime - tk->set_at), tk->setby, tk->reason); } if (tk->type == (TKL_ZAP)) { sendto_one(cptr, rpl_str(RPL_STATSGLINE), me.name, cptr->name, 'z', tk->usermask, tk->hostmask, (tk->expire_at != 0) ? (tk->expire_at - curtime) : 0, (curtime - tk->set_at), tk->setby, tk->reason); } if (tk->type & TKL_SPAMF) { sendto_one(cptr, rpl_str(RPL_STATSSPAMF), me.name, cptr->name, (tk->type & TKL_GLOBAL) ? 'F' : 'f', spamfilter_target_inttostring(tk->subtype), banact_valtostring(tk->ptr.spamf->action), (tk->expire_at != 0) ? (tk->expire_at - curtime) : 0, curtime - tk->set_at, tk->ptr.spamf->tkl_duration, tk->ptr.spamf->tkl_reason, tk->setby, tk->reason); } if (tk->type & TKL_NICK) sendto_one(cptr, rpl_str(RPL_STATSQLINE), me.name, cptr->name, (tk->type & TKL_GLOBAL) ? 'Q' : 'q', tk->hostmask, (tk->expire_at != 0) ? (tk->expire_at - curtime) : 0, curtime - tk->set_at, tk->setby, tk->reason); } } void tkl_synch(aClient *sptr) { aTKline *tk; char typ = 0; int index; for (index = 0; index < TKLISTLEN; index++) for (tk = tklines[index]; tk; tk = tk->next) { if (tk->type & TKL_GLOBAL) { if (tk->type & TKL_KILL) typ = 'G'; if (tk->type & TKL_ZAP) typ = 'Z'; if (tk->type & TKL_SHUN) typ = 's'; if (tk->type & TKL_SPAMF) typ = 'F'; if (tk->type & TKL_NICK) typ = 'Q'; if ((tk->type & TKL_SPAMF) && (sptr->proto & PROTO_TKLEXT)) { sendto_one(sptr, ":%s %s + %c %s %s %s %li %li %li %s :%s", me.name, IsToken(sptr) ? TOK_TKL : MSG_TKL, typ, tk->usermask, tk->hostmask, tk->setby, tk->expire_at, tk->set_at, tk->ptr.spamf->tkl_duration, tk->ptr.spamf->tkl_reason, tk->reason); } else sendto_one(sptr, ":%s %s + %c %s %s %s %li %li :%s", me.name, IsToken(sptr) ? TOK_TKL : MSG_TKL, typ, tk->usermask ? tk->usermask : "*", tk->hostmask, tk->setby, tk->expire_at, tk->set_at, tk->reason); } } } /* * m_tkl: * HISTORY: * This was originall called Timed KLines, but today it's * used by various *line types eg: zline, gline, gzline, shun, * but also by spamfilter etc... * USAGE: * This routine is used both internally by the ircd (to * for example add local klines, zlines, etc) and over the * network (glines, gzlines, spamfilter, etc). * add: remove: spamfilter: spamfilter+TKLEXT sqline: * parv[ 1]: + - +/- + +/- * parv[ 2]: type type type type type * parv[ 3]: user user target target hold * parv[ 4]: host host action action host * parv[ 5]: setby removedby (un)setby setby setby * parv[ 6]: expire_at expire_at (0) expire_at (0) expire_at * parv[ 7]: set_at set_at set_at set_at * parv[ 8]: reason regex tkl duration reason * parv[ 9]: tkl reason [A] * parv[10]: regex * * [A] tkl reason field must be escaped by caller [eg: use unreal_encodespace() * if m_tkl is called internally]. * */ int m_tkl(aClient *cptr, aClient *sptr, int parc, char *parv[]) { aTKline *tk; int type; int found = 0; char gmt[256], gmt2[256]; char txt[256]; TS expiry_1, setat_1, spamf_tklduration = 0; char *reason = NULL; if (!IsServer(sptr) && !IsOper(sptr) && !IsMe(sptr)) return 0; if (parc < 2) return 0; tkl_check_expire(NULL); switch (*parv[1]) { case '+': { /* we relay on servers to be failsafe.. */ if (!IsServer(sptr) && !IsMe(sptr)) return 0; if (parc < 9) return 0; if (parv[2][0] == 'G') type = TKL_KILL | TKL_GLOBAL; else if (parv[2][0] == 'Z') type = TKL_ZAP | TKL_GLOBAL; else if (parv[2][0] == 'z') type = TKL_ZAP; else if (parv[2][0] == 'k') type = TKL_KILL; else if (parv[2][0] == 's') type = TKL_SHUN | TKL_GLOBAL; else if (parv[2][0] == 'f') type = TKL_SPAMF; else if (parv[2][0] == 'F') type = TKL_SPAMF | TKL_GLOBAL; else if (parv[2][0] == 'Q') type = TKL_NICK | TKL_GLOBAL; else if (parv[2][0] == 'q') type = TKL_NICK; else return 0; expiry_1 = atol(parv[6]); setat_1 = atol(parv[7]); reason = parv[8]; found = 0; if ((type & TKL_SPAMF) && (parc >= 11)) { reason = parv[10]; spamf_tklduration = config_checkval(parv[8], CFG_TIME); /* was: atol(parv[8]); */ } for (tk = tklines[tkl_hash(parv[2][0])]; tk; tk = tk->next) { if (tk->type == type) { if ((tk->type & TKL_NICK) && !stricmp(tk->hostmask, parv[4])) { found = 1; break; } else if (!strcmp(tk->hostmask, parv[4]) && !strcmp(tk->usermask, parv[3]) && (!(type & TKL_SPAMF) || !stricmp(tk->reason, reason))) { found = 1; break; } } } /* *:Line already exists! */ if (found == 1) { /* SYZTAG: TODO: check for tklreason/tklduration differnces */ /* do they differ in ANY way? */ if (type & TKL_NICK) { /* for sqline: usermask = H overrides */ if (*parv[3] == 'H') *tk->usermask = 'H'; } if ((setat_1 != tk->set_at) || (expiry_1 != tk->expire_at) || strcmp(tk->reason, reason) || strcmp(tk->setby, parv[5])) { /* here's how it goes: * set_at: oldest wins * expire_at: longest wins * reason: highest strcmp wins * setby: highest strcmp wins * We broadcast the result of this back to all servers except * cptr's direction, because cptr will do the same thing and * send it back to his servers (except us)... no need for a * double networkwide flood ;p. -- Syzop */ tk->set_at = MIN(tk->set_at, setat_1); if (!tk->expire_at || !expiry_1) tk->expire_at = 0; else tk->expire_at = MAX(tk->expire_at, expiry_1); if (strcmp(tk->reason, reason) < 0) { MyFree(tk->reason); tk->reason = strdup(reason); } if (strcmp(tk->setby, parv[5]) < 0) { MyFree(tk->setby); tk->setby = strdup(parv[5]); } if (tk->type & TKL_NICK) { if (!(*tk->usermask) == 'H') sendto_snomask(SNO_JUNK, "tkl update for %s/reason='%s'/by=%s/set=%ld/expire=%ld [causedby: %s]", tk->hostmask, tk->reason, tk->setby, tk->set_at, tk->expire_at, sptr->name); } else sendto_snomask(SNO_JUNK, "tkl update for %s@%s/reason='%s'/by=%s/set=%ld/expire=%ld [causedby: %s]", tk->usermask, tk->hostmask, tk->reason, tk->setby, tk->set_at, tk->expire_at, sptr->name); if ((parc == 11) && (type & TKL_SPAMF)) { /* I decided to only send updates to OPT_TKLEXT in this case, * it's pretty useless to send it also to OPT_NOT_TKLEXT because * spamfilter entries are permanent (no expire time), the only stuff * that can differ for non-opt is the 'setby' and 'setat' field... */ sendto_serv_butone_token_opt(cptr, OPT_TKLEXT, sptr->name, MSG_TKL, TOK_TKL, "%s %s %s %s %s %ld %ld %ld %s :%s", parv[1], parv[2], parv[3], parv[4], tk->setby, tk->expire_at, tk->set_at, tk->ptr.spamf->tkl_duration, tk->ptr.spamf->tkl_reason, tk->reason); } else if (type & TKL_GLOBAL) sendto_serv_butone(cptr, ":%s TKL %s %s %s %s %s %ld %ld :%s", sptr->name, parv[1], parv[2], parv[3], parv[4], tk->setby, tk->expire_at, tk->set_at, tk->reason); } return 0; } /* there is something fucked here? */ if ((type & TKL_SPAMF) && (parc >= 11)) tk = tkl_add_line(type, parv[3], parv[4], reason, parv[5], expiry_1, setat_1, spamf_tklduration, parv[9]); else tk = tkl_add_line(type, parv[3], parv[4], reason, parv[5], expiry_1, setat_1, 0, NULL); if (tk) RunHook5(HOOKTYPE_TKL_ADD, cptr, sptr, tk, parc, parv); strncpyzt(gmt, asctime(gmtime((TS *)&setat_1)), sizeof(gmt)); strncpyzt(gmt2, asctime(gmtime((TS *)&expiry_1)), sizeof(gmt2)); iCstrip(gmt); iCstrip(gmt2); switch (type) { case TKL_KILL: strcpy(txt, "K:Line"); break; case TKL_ZAP: strcpy(txt, "Z:Line"); break; case TKL_KILL | TKL_GLOBAL: strcpy(txt, "G:Line"); break; case TKL_ZAP | TKL_GLOBAL: strcpy(txt, "Global Z:line"); break; case TKL_SHUN | TKL_GLOBAL: strcpy(txt, "Shun"); break; case TKL_NICK | TKL_GLOBAL: strcpy(txt, "Global Q:line"); break; case TKL_NICK: strcpy(txt, "Q:line"); break; default: strcpy(txt, "Unknown *:Line"); } if (type & TKL_SPAMF) { char buf[512]; snprintf(buf, 512, "Spamfilter added: '%s' [target: %s] [action: %s] [reason: %s] on %s GMT (from %s)", reason, parv[3], banact_valtostring(banact_chartoval(*parv[4])), parc >= 10 ? unreal_decodespace(parv[9]) : SPAMFILTER_BAN_REASON, gmt, parv[5]); sendto_snomask(SNO_TKL, "*** %s", buf); ircd_log(LOG_TKL, "%s", buf); } else { char buf[512]; if (expiry_1 != 0) { if (type & TKL_NICK) { if (*parv[3] != 'H') snprintf(buf, 512, "%s added for %s on %s GMT (from %s to expire at %s GMT: %s)", txt, parv[4], gmt, parv[5], gmt2, reason); } else snprintf(buf, 512, "%s added for %s@%s on %s GMT (from %s to expire at %s GMT: %s)", txt, parv[3], parv[4], gmt, parv[5], gmt2, reason); } else { if (type & TKL_NICK) { if (*parv[3] != 'H') snprintf(buf, 512, "Permanent %s added for %s on %s GMT (from %s: %s)", txt, parv[4], gmt, parv[5], reason); } else snprintf(buf, 512, "Permanent %s added for %s@%s on %s GMT (from %s: %s)", txt, parv[3], parv[4], gmt, parv[5], reason); } if (!((type & TKL_NICK) && *parv[3] == 'H')) { sendto_snomask(SNO_TKL, "*** %s", buf); ircd_log(LOG_TKL, "%s", buf); } } loop.do_bancheck = 1; /* Makes check_pings be run ^^ */ if (type & TKL_GLOBAL) { if ((parc == 11) && (type & TKL_SPAMF)) { sendto_serv_butone_token_opt(cptr, OPT_TKLEXT, sptr->name, MSG_TKL, TOK_TKL, "%s %s %s %s %s %s %s %s %s :%s", parv[1], parv[2], parv[3], parv[4], parv[5], parv[6], parv[7], parv[8], parv[9], parv[10]); sendto_serv_butone_token_opt(cptr, OPT_NOT_TKLEXT, sptr->name, MSG_TKL, TOK_TKL, "%s %s %s %s %s %s %s :%s", parv[1], parv[2], parv[3], parv[4], parv[5], parv[6], parv[7], parv[10]); } else sendto_serv_butone(cptr, ":%s TKL %s %s %s %s %s %s %s :%s", sptr->name, parv[1], parv[2], parv[3], parv[4], parv[5], parv[6], parv[7], parv[8]); } /* TKL_GLOBAL */ return 0; } case '-': if (!IsServer(sptr) && !IsMe(sptr)) return 0; if (*parv[2] == 'G') type = TKL_KILL | TKL_GLOBAL; else if (*parv[2] == 'Z') type = TKL_ZAP | TKL_GLOBAL; else if (*parv[2] == 'z') type = TKL_ZAP; else if (*parv[2] == 'k') type = TKL_KILL; else if (*parv[2] == 's') type = TKL_SHUN | TKL_GLOBAL; else if (*parv[2] == 'Q') type = TKL_NICK | TKL_GLOBAL; else if (*parv[2] == 'q') type = TKL_NICK; else if (*parv[2] == 'F') { if (parc < 8) { sendto_realops("[BUG] m_tkl called with bogus spamfilter removal request [F], from=%s, parc=%d", sptr->name, parc); return 0; /* bogus */ } type = TKL_SPAMF | TKL_GLOBAL; if (parc >= 11) reason = parv[10]; else reason = parv[8]; } else if (*parv[2] == 'f') { if (parc < 8) { sendto_realops("[BUG] m_tkl called with bogus spamfilter removal request [f], from=%s, parc=%d", sptr->name, parc); return 0; /* bogus */ } type = TKL_SPAMF; if (parc >= 11) reason = parv[10]; else reason = parv[8]; } else return 0; switch (type) { case TKL_KILL: strcpy(txt, "K:Line"); break; case TKL_ZAP: strcpy(txt, "Z:Line"); break; case TKL_KILL | TKL_GLOBAL: strcpy(txt, "G:Line"); break; case TKL_ZAP | TKL_GLOBAL: strcpy(txt, "Global Z:line"); break; case TKL_SHUN | TKL_GLOBAL: strcpy(txt, "Shun"); break; case TKL_NICK | TKL_GLOBAL: strcpy(txt, "Global Q:line"); break; case TKL_NICK: strcpy(txt, "Q:line"); break; default: strcpy(txt, "Unknown *:Line"); } found = 0; for (tk = tklines[tkl_hash(parv[2][0])]; tk; tk = tk->next) { if (tk->type == type) { int match = 0; if (type & TKL_NICK) { if (!stricmp(tk->hostmask, parv[4])) match = 1; } else if (type & TKL_SPAMF) { if (!strcmp(tk->hostmask, parv[4]) && !strcmp(tk->usermask, parv[3]) && !stricmp(tk->reason, reason)) match = 1; } else /* all other types... */ if (!stricmp(tk->hostmask, parv[4]) && !stricmp(tk->usermask, parv[3])) match = 1; if (match) { strncpyzt(gmt, asctime(gmtime((TS *)&tk->set_at)), sizeof(gmt)); iCstrip(gmt); /* broadcast remove msg to opers... */ if (type & TKL_NICK) { if (!(*parv[3] == 'H')) { sendto_snomask(SNO_TKL, "%s removed %s %s (set at %s - reason: %s)", parv[5], txt, tk->hostmask, gmt, tk->reason); ircd_log(LOG_TKL, "%s removed %s %s (set at %s - reason: %s)", parv[5], txt, tk->hostmask, gmt, tk->reason); } } else if (type & TKL_SPAMF) { sendto_snomask(SNO_TKL, "%s removed Spamfilter '%s' (set at %s)", parv[5], tk->reason, gmt); ircd_log(LOG_TKL, "%s removed Spamfilter '%s' (set at %s)", parv[5], tk->reason, gmt); } else { sendto_snomask(SNO_TKL, "%s removed %s %s@%s (set at %s - reason: %s)", parv[5], txt, tk->usermask, tk->hostmask, gmt, tk->reason); ircd_log(LOG_TKL, "%s removed %s %s@%s (set at %s - reason: %s)", parv[5], txt, tk->usermask, tk->hostmask, gmt, tk->reason); } if (type & TKL_SHUN) tkl_check_local_remove_shun(tk); RunHook5(HOOKTYPE_TKL_DEL, cptr, sptr, tk, parc, parv); tkl_del_line(tk); if (type & TKL_GLOBAL) { if (parc < 8) sendto_serv_butone(cptr, ":%s TKL %s %s %s %s %s", sptr->name, parv[1], parv[2], parv[3], parv[4], parv[5]); else sendto_serv_butone(cptr, ":%s TKL %s %s %s %s %s %s %s :%s", sptr->name, parv[1], parv[2], parv[3], parv[4], parv[5], parv[6], parv[7], reason); } break; } } } break; case '?': if (IsAnOper(sptr)) tkl_stats(sptr,0,NULL); } return 0; } /* execute_ban_action, a tkl helper. (Syzop/2003) * PARAMETERS: * sptr: the client which is affected * action: type of ban (BAN_ACT*) * reason: ban reason * duration: duration of ban in seconds * WHAT IT DOES: * This function will shun/kline/gline/zline the user. * If the action field is 0 (BAN_ACT_KILL) the user is * just killed (and the time parameter is ignored). * ASSUMES: * This function assumes that sptr is locally connected. * RETURN VALUE: * -1 in case of block/tempshun, FLUSH_BUFFER in case of * kill/zline/gline/etc.. (you should NOT read from 'sptr' * after you got FLUSH_BUFFER!!!) */ int place_host_ban(aClient *sptr, int action, char *reason, long duration) { switch(action) { case BAN_ACT_TEMPSHUN: /* We simply mark this connection as shunned and do not add a ban record */ sendto_snomask(SNO_TKL, "Temporary shun added at user %s (%s@%s) [%s]", sptr->name, sptr->user ? sptr->user->username : "unknown", sptr->user ? sptr->user->realhost : GetIP(sptr), reason); SetShunned(sptr); break; case BAN_ACT_SHUN: case BAN_ACT_KLINE: case BAN_ACT_ZLINE: case BAN_ACT_GLINE: case BAN_ACT_GZLINE: { char hostip[128], mo[100], mo2[100]; char *tkllayer[9] = { me.name, /*0 server.name */ "+", /*1 +|- */ "?", /*2 type */ "*", /*3 user */ NULL, /*4 host */ NULL, NULL, /*6 expire_at */ NULL, /*7 set_at */ NULL /*8 reason */ }; strlcpy(hostip, GetIP(sptr), sizeof(hostip)); if (action == BAN_ACT_KLINE) tkllayer[2] = "k"; else if (action == BAN_ACT_ZLINE) tkllayer[2] = "z"; else if (action == BAN_ACT_GZLINE) tkllayer[2] = "Z"; else if (action == BAN_ACT_GLINE) tkllayer[2] = "G"; else if (action == BAN_ACT_SHUN) tkllayer[2] = "s"; tkllayer[4] = hostip; tkllayer[5] = me.name; if (!duration) strcpy(mo, "0"); /* perm */ else ircsprintf(mo, "%li", duration + TStime()); ircsprintf(mo2, "%li", TStime()); tkllayer[6] = mo; tkllayer[7] = mo2; tkllayer[8] = reason; m_tkl(&me, &me, 9, tkllayer); if (action == BAN_ACT_SHUN) { find_shun(sptr); return -1; } else return find_tkline_match(sptr, 0); } case BAN_ACT_KILL: default: return exit_client(sptr, sptr, sptr, reason); } return -1; } /** Checks if 'target' is on the spamfilter exception list. * RETURNS 1 if found in list, 0 if not. */ int target_is_spamexcept(char *target) { SpamExcept *e; for (e = iConf.spamexcept; e; e = e->next) { if (!match(e->name, target)) return 1; } return 0; } /** dospamfilter: executes the spamfilter onto the string. * str: the text (eg msg text, notice text, part text, quit text, etc * type: the spamfilter type (SPAMF_*) * RETURN VALUE: * 0 if not matched, non-0 if it should be blocked. * Return value can be FLUSH_BUFFER (-2) which means 'sptr' is * _NOT_ valid anymore so you should return immediately * (like from m_message, m_part, m_quit, etc). */ int dospamfilter(aClient *sptr, char *str_in, int type, char *target) { aTKline *tk; char *str; if (type == SPAMF_USER) str = str_in; else str = (char *)StripControlCodes(str_in); /* (note: using sptr->user check here instead of IsPerson() * due to SPAMF_USER where user isn't marked as client/person yet. */ if (!sptr->user || IsAnOper(sptr) || IsULine(sptr)) return 0; for (tk = tklines[tkl_hash('F')]; tk; tk = tk->next) { if (!(tk->subtype & type)) continue; if (!regexec(&tk->ptr.spamf->expr, str, 0, NULL, 0)) { /* matched! */ char buf[1024]; char targetbuf[48]; if (target) { targetbuf[0] = ' '; strlcpy(targetbuf+1, target, sizeof(targetbuf)-1); /* cut it off */ } else targetbuf[0] = '\0'; /* Hold on.. perhaps it's on the exceptions list... */ if (target && target_is_spamexcept(target)) return 0; /* No problem! */ ircsprintf(buf, "[Spamfilter] %s!%s@%s matches filter '%s': [%s%s: '%s'] [%s]", sptr->name, sptr->user->username, sptr->user->realhost, tk->reason, spamfilter_inttostring_long(type), targetbuf, str, unreal_decodespace(tk->ptr.spamf->tkl_reason)); sendto_snomask(SNO_SPAMF, "%s", buf); sendto_serv_butone_token(NULL, me.name, MSG_SENDSNO, TOK_SENDSNO, "S :%s", buf); ircd_log(LOG_SPAMFILTER, "%s", buf); if (tk->ptr.spamf->action == BAN_ACT_BLOCK) { switch(type) { case SPAMF_USERMSG: case SPAMF_USERNOTICE: sendnotice(sptr, "Message to %s blocked: %s", target, unreal_decodespace(tk->ptr.spamf->tkl_reason)); break; case SPAMF_CHANMSG: case SPAMF_CHANNOTICE: sendto_one(sptr, ":%s 404 %s %s :Message blocked: %s", me.name, sptr->name, target, unreal_decodespace(tk->ptr.spamf->tkl_reason)); break; case SPAMF_DCC: sendnotice(sptr, "DCC to %s blocked: %s", target, unreal_decodespace(tk->ptr.spamf->tkl_reason)); break; case SPAMF_AWAY: /* hack to deal with 'after-away-was-set-filters' */ if (sptr->user->away && !strcmp(str_in, sptr->user->away)) { /* free away & broadcast the unset */ MyFree(sptr->user->away); sptr->user->away = NULL; sendto_serv_butone_token(sptr, sptr->name, MSG_AWAY, TOK_AWAY, ""); } break; case SPAMF_TOPIC: //... sendnotice(sptr, "Setting of topic on %s to that text is blocked: %s", target, unreal_decodespace(tk->ptr.spamf->tkl_reason)); break; default: break; } return -1; } else if (tk->ptr.spamf->action == BAN_ACT_DCCBLOCK) { if (type == SPAMF_DCC) { sendnotice(sptr, "DCC to %s blocked: %s", target, unreal_decodespace(tk->ptr.spamf->tkl_reason)); sendnotice(sptr, "*** You have been blocked from sending files, " "reconnect to regain permission to send files"); sptr->flags |= FLAGS_DCCBLOCK; } return -1; } else if (tk->ptr.spamf->action == BAN_ACT_VIRUSCHAN) { char *xparv[3], chbuf[CHANNELLEN + 16]; aChannel *chptr; int ret; if (IsVirus(sptr)) /* Already tagged */ return 0; ircsprintf(buf, "0,%s", SPAMFILTER_VIRUSCHAN); xparv[0] = sptr->name; xparv[1] = buf; xparv[2] = NULL; /* RECURSIVE CAUTION in case we ever add blacklisted chans */ spamf_ugly_vchanoverride = 1; ret = do_cmd(sptr, sptr, "JOIN", 2, xparv); spamf_ugly_vchanoverride = 0; if (ret == FLUSH_BUFFER) return FLUSH_BUFFER; /* don't ask me how we could have died... */ sendnotice(sptr, "You are now restricted to talking in %s: %s", SPAMFILTER_VIRUSCHAN, unreal_decodespace(tk->ptr.spamf->tkl_reason)); /* todo: send notice to channel? */ chptr = find_channel(SPAMFILTER_VIRUSCHAN, NULL); if (chptr) { ircsprintf(chbuf, "@%s", chptr->chname); ircsprintf(buf, "[Spamfilter] %s matched filter '%s' [%s%s] [%s]", sptr->name, tk->reason, spamfilter_inttostring_long(type), targetbuf, unreal_decodespace(tk->ptr.spamf->tkl_reason)); sendto_channelprefix_butone_tok(NULL, &me, chptr, PREFIX_OP|PREFIX_ADMIN|PREFIX_OWNER, MSG_NOTICE, TOK_NOTICE, chbuf, buf, 0); } SetVirus(sptr); return -1; } else return place_host_ban(sptr, tk->ptr.spamf->action, unreal_decodespace(tk->ptr.spamf->tkl_reason), tk->ptr.spamf->tkl_duration); } } return 0; }


 
Alıntı ile Cevapla

IRCForumlari.NET Reklamlar
sohbet odaları reklam ver Benimmekan Mobil Sohbet