0
|
1 /* Distributed Checksum Clearinghouse |
|
2 * |
|
3 * work on a job in the server |
|
4 * |
|
5 * Copyright (c) 2008 by Rhyolite Software, LLC |
|
6 * |
|
7 * This agreement is not applicable to any entity which sells anti-spam |
|
8 * solutions to others or provides an anti-spam solution as part of a |
|
9 * security solution sold to other entities, or to a private network |
|
10 * which employs the DCC or uses data provided by operation of the DCC |
|
11 * but does not provide corresponding data to other users. |
|
12 * |
|
13 * Permission to use, copy, modify, and distribute this software without |
|
14 * changes for any purpose with or without fee is hereby granted, provided |
|
15 * that the above copyright notice and this permission notice appear in all |
|
16 * copies and any distributed versions or copies are either unchanged |
|
17 * or not called anything similar to "DCC" or "Distributed Checksum |
|
18 * Clearinghouse". |
|
19 * |
|
20 * Parties not eligible to receive a license under this agreement can |
|
21 * obtain a commercial license to use DCC by contacting Rhyolite Software |
|
22 * at sales@rhyolite.com. |
|
23 * |
|
24 * A commercial license would be for Distributed Checksum and Reputation |
|
25 * Clearinghouse software. That software includes additional features. This |
|
26 * free license for Distributed ChecksumClearinghouse Software does not in any |
|
27 * way grant permision to use Distributed Checksum and Reputation Clearinghouse |
|
28 * software |
|
29 * |
|
30 * THE SOFTWARE IS PROVIDED "AS IS" AND RHYOLITE SOFTWARE, LLC DISCLAIMS ALL |
|
31 * WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES |
|
32 * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL RHYOLITE SOFTWARE, LLC |
|
33 * BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES |
|
34 * OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, |
|
35 * WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, |
|
36 * ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS |
|
37 * SOFTWARE. |
|
38 * |
|
39 * Rhyolite Software DCC 1.3.103-1.287 $Revision$ |
|
40 */ |
|
41 |
|
42 #include "dccd_defs.h" |
|
43 |
|
44 typedef struct { |
|
45 time_t us; |
|
46 u_int ops; |
|
47 } Q_DELAY_SEC; |
|
48 static Q_DELAY_SEC q_delays[9]; |
|
49 static Q_DELAY_SEC q_delays_sum; /* sum of all but q_delays[0] */ |
|
50 static time_t q_delays_start; /* second for q_delayw[0] */ |
|
51 |
|
52 DCCD_STATS dccd_stats; |
|
53 |
|
54 u_char query_only; /* 1=treat reports as queries */ |
|
55 |
|
56 u_char grey_weak_body; /* 1=ignore bodies for greylisting */ |
|
57 u_char grey_weak_ip; /* 1=a good triple whitelists addr */ |
|
58 |
|
59 static u_char ridc_get(QUEUE *); |
|
60 |
|
61 |
|
62 /* report cache used to detect duplicate or retransmitted reports */ |
|
63 static RIDC *ridc_newest, *ridc_oldest; |
|
64 static RIDC **ridc_hash; |
|
65 static int ridc_hash_len; |
|
66 |
|
67 |
|
68 static inline RIDC ** |
|
69 ridc_hash_fnc(DCC_HDR *hdr) |
|
70 { |
|
71 u_int32_t sum; |
|
72 |
|
73 /* The client's (ID,RID,HID,PID) should be unique and constant for |
|
74 * retransmissions of a single request. It should make a reasonable |
|
75 * hash value. We cannot trust it entirely, if only because of |
|
76 * anonymous clients */ |
|
77 sum = hdr->sender; |
|
78 sum += hdr->op_nums.h; |
|
79 sum += hdr->op_nums.p; |
|
80 sum += hdr->op_nums.r; |
|
81 |
|
82 return &ridc_hash[mhash(sum, ridc_hash_len)]; |
|
83 } |
|
84 |
|
85 |
|
86 |
|
87 static void |
|
88 ridc_ref(RIDC *ridc) |
|
89 { |
|
90 ridc->last_used = db_time.tv_sec; |
|
91 if (!ridc->newer) |
|
92 return; /* it's already newest */ |
|
93 |
|
94 ridc->newer->older = ridc->older; |
|
95 if (ridc->older) |
|
96 ridc->older->newer = ridc->newer; |
|
97 else |
|
98 ridc_oldest = ridc->newer; |
|
99 ridc->older = ridc_newest; |
|
100 ridc->newer = 0; |
|
101 ridc_newest->newer = ridc; |
|
102 ridc_newest = ridc; |
|
103 } |
|
104 |
|
105 |
|
106 |
|
107 /* get a free report cache block */ |
|
108 static RIDC * |
|
109 ridc_get_free(void) |
|
110 { |
|
111 RIDC *ridc; |
|
112 time_t stale = db_time.tv_sec - DCC_MAX_RETRANS_DELAY_SECS; |
|
113 |
|
114 for (ridc = ridc_oldest; ridc != 0; ridc = ridc->newer) { |
|
115 if (ridc->last_used < stale) { |
|
116 /* found one, so recycle it */ |
|
117 if (ridc->fwd) |
|
118 ridc->fwd->bak = ridc->bak; |
|
119 if (ridc->bak) |
|
120 ridc->bak->fwd = ridc->fwd; |
|
121 else if (ridc->hash) |
|
122 *ridc->hash = ridc->fwd; |
|
123 ridc->bak = 0; |
|
124 ridc_ref(ridc); |
|
125 return ridc; |
|
126 } |
|
127 } |
|
128 |
|
129 /* there are no free blocks that are old enough to recycle */ |
|
130 return 0; |
|
131 } |
|
132 |
|
133 |
|
134 |
|
135 /* make some (more) RID blocks and (re)build the hash table */ |
|
136 static void |
|
137 ridc_make(void) |
|
138 { |
|
139 int new_len, old_len, j; |
|
140 RIDC *ridc, *ridc2, **ridch, **old_ridc_hash; |
|
141 |
|
142 new_len = queue_max; |
|
143 ridc = dcc_malloc(new_len*sizeof(*ridc)); |
|
144 if (!ridc) |
|
145 dcc_logbad(EX_OSERR, "malloc(%d RIDC blocks) failed", |
|
146 new_len); |
|
147 memset(ridc, 0, new_len*sizeof(*ridc)); |
|
148 for (j = 0; j < new_len; ++j, ++ridc) { /* make the new blocks oldest */ |
|
149 if (!ridc_oldest) { |
|
150 ridc_oldest = ridc_newest = ridc; |
|
151 } else { |
|
152 ridc_oldest->older = ridc; |
|
153 ridc->newer = ridc_oldest; |
|
154 ridc_oldest = ridc; |
|
155 } |
|
156 } |
|
157 |
|
158 /* rebuild and expand the hash table */ |
|
159 old_len = ridc_hash_len; |
|
160 ridc_hash_len += new_len; |
|
161 old_ridc_hash = ridc_hash; |
|
162 ridc_hash = dcc_malloc(ridc_hash_len*sizeof(*ridch)); |
|
163 if (!ridc_hash) |
|
164 dcc_logbad(EX_OSERR, "malloc(%d RIDC hash table) failed", |
|
165 ridc_hash_len); |
|
166 memset(ridc_hash, 0, ridc_hash_len*sizeof(*ridch)); |
|
167 if (old_len != 0) { |
|
168 do { |
|
169 for (ridc = old_ridc_hash[--old_len]; |
|
170 ridc != 0; |
|
171 ridc = ridc2) { |
|
172 ridch = ridc_hash_fnc(&ridc->hdr); |
|
173 ridc2 = ridc->fwd; |
|
174 ridc->bak = 0; |
|
175 ridc->hash = ridch; |
|
176 if ((ridc->fwd = *ridch) != 0) |
|
177 ridc->fwd->bak = ridc; |
|
178 *ridch = ridc; |
|
179 } |
|
180 } while (old_len != 0); |
|
181 dcc_free(old_ridc_hash); |
|
182 } |
|
183 } |
|
184 |
|
185 |
|
186 |
|
187 /* get the report cache block for an operation */ |
|
188 static u_char /* 0=new operation, 1=retransmission */ |
|
189 ridc_get(QUEUE *q) |
|
190 { |
|
191 RIDC *ridc, **ridch; |
|
192 |
|
193 for (;;) { |
|
194 if (ridc_hash) { |
|
195 /* look for the existing report cache block */ |
|
196 ridch = ridc_hash_fnc(&q->pkt.hdr); |
|
197 for (ridc = *ridch; ridc; ridc = ridc->fwd) { |
|
198 /* Reports are relatively small, so we |
|
199 * can afford to not trust the client's |
|
200 * RID to be unique. Compare all but the |
|
201 * client's transmission #. |
|
202 * Also check client's UDP port # because |
|
203 * it should be unchanged regardless of |
|
204 * multi-homing. */ |
|
205 if (ridc->clnt_port == q->clnt_su.ipv4.sin_port |
|
206 && !memcmp(&ridc->hdr, &q->pkt.hdr, |
|
207 sizeof(ridc->hdr) |
|
208 - sizeof(ridc->hdr.op_nums.t))) { |
|
209 /* found it, so make it newest */ |
|
210 ridc_ref(ridc); |
|
211 q->ridc = ridc; |
|
212 return 1; |
|
213 } |
|
214 } |
|
215 |
|
216 /* the block does not already exist, so create it */ |
|
217 ridc = ridc_get_free(); |
|
218 if (ridc) |
|
219 break; |
|
220 } |
|
221 /* we are out of report cache blocks, so make more */ |
|
222 ridc_make(); |
|
223 |
|
224 /* re-hash because our previous pointer is invalid */ |
|
225 } |
|
226 |
|
227 memcpy(&ridc->hdr, &q->pkt.hdr, sizeof(ridc->hdr)); |
|
228 ridc->clnt_port = q->clnt_su.ipv4.sin_port; |
|
229 ridc->op = DCC_OP_INVALID; |
|
230 ridc->bad = 1; |
|
231 ridc->len = 0; |
|
232 ridc->hash = ridch; |
|
233 ridc->fwd = *ridch; |
|
234 if (ridc->fwd) |
|
235 ridc->fwd->bak = ridc; |
|
236 *ridch = ridc; |
|
237 |
|
238 q->ridc = ridc; |
|
239 return 0; |
|
240 } |
|
241 |
|
242 |
|
243 |
|
244 #define RIDC_BAD(q) {if ((q)->ridc) (q)->ridc->bad = 1;} |
|
245 |
|
246 |
|
247 /* update the average queue delay at the start of a new second */ |
|
248 static void |
|
249 update_q_delay(void) |
|
250 { |
|
251 time_t secs; |
|
252 Q_DELAY_SEC *src, *tgt; |
|
253 |
|
254 secs = db_time.tv_sec - q_delays_start; |
|
255 if (secs == 0) |
|
256 return; |
|
257 |
|
258 /* At the start of a new second, |
|
259 * forget the delays for old seconds we no longer care about |
|
260 * and start accumulating delays for the new second |
|
261 * Slide accumulated delays and total operations previous seconds. */ |
|
262 q_delays_start = db_time.tv_sec; |
|
263 q_delays_sum.us = 0; |
|
264 q_delays_sum.ops = 0; |
|
265 tgt = LAST(q_delays); |
|
266 if (secs > 0 && secs < DIM(q_delays)) { |
|
267 src = tgt - secs; |
|
268 do { |
|
269 q_delays_sum.us += (tgt->us = src->us); |
|
270 q_delays_sum.ops += (tgt->ops = src->ops); |
|
271 --tgt; |
|
272 } while (src-- != &q_delays[0]); |
|
273 } |
|
274 memset(q_delays, 0, sizeof(q_delays[0]) * (tgt+1 - q_delays)); |
|
275 } |
|
276 |
|
277 |
|
278 |
|
279 /* compute the average queue delay this client should see */ |
|
280 static u_int |
|
281 avg_q_delay_ms(const QUEUE *q) |
|
282 { |
|
283 u_int ops; |
|
284 time_t us; |
|
285 |
|
286 /* get the average service delay excluding per-client-ID delays */ |
|
287 update_q_delay(); |
|
288 ops = q_delays[0].ops + q_delays_sum.ops; |
|
289 if (ops == 0) |
|
290 us = 0; |
|
291 else |
|
292 us = (q_delays[0].us + q_delays_sum.us + ops/2) / ops; |
|
293 |
|
294 /* add the per-client-ID penalty */ |
|
295 us += q->delay_us; |
|
296 return (us + 500) / 1000; |
|
297 } |
|
298 |
|
299 |
|
300 |
|
301 /* get a unique timestamp */ |
|
302 static void |
|
303 get_ts(DCC_TS *ts) /* put it here */ |
|
304 { |
|
305 static struct timeval prev_time; |
|
306 static int faked; |
|
307 |
|
308 /* if we have generated a lot of fake timestamps |
|
309 * and our snapshot of the clock is old, |
|
310 * then check the clock in the hope it has ticked */ |
|
311 if (db_time.tv_usec <= prev_time.tv_usec |
|
312 && db_time.tv_sec == prev_time.tv_sec |
|
313 && faked > 100) { |
|
314 faked = 0; |
|
315 gettimeofday(&db_time, 0); |
|
316 } |
|
317 |
|
318 /* Try to make the next timestamp unique, but only as long |
|
319 * as time itself marches forward. This must work many times |
|
320 * a second, or the resoltion of DCC timestaps. |
|
321 * Worse, the increment can exhaust values from future seconds. |
|
322 * Forget about it if the problem lasts for more than 5 minutes. */ |
|
323 if (db_time.tv_sec > prev_time.tv_sec |
|
324 || (db_time.tv_sec == prev_time.tv_sec |
|
325 && db_time.tv_usec > prev_time.tv_usec) |
|
326 || db_time.tv_sec < prev_time.tv_sec-5*60) { |
|
327 /* either the current time is good enough or we must |
|
328 * give up and use it to make the timestamp */ |
|
329 prev_time = db_time; |
|
330 faked = 0; |
|
331 |
|
332 } else { |
|
333 /* fudge the previous timestamp to make it good enough */ |
|
334 prev_time.tv_usec += DCC_TS_US_MULT; |
|
335 if (prev_time.tv_usec >= DCC_US) { |
|
336 prev_time.tv_usec -= DCC_US; |
|
337 ++prev_time.tv_sec; |
|
338 } |
|
339 ++faked; |
|
340 } |
|
341 |
|
342 dcc_timeval2ts(ts, &prev_time, 0); |
|
343 } |
|
344 |
|
345 |
|
346 |
|
347 /* find database record for a server-ID |
|
348 * use only db_sts.hash and db_sts.rcd2 |
|
349 * put the result in db_sts.rcd2 */ |
|
350 int /* -1=broken database 0=no record */ |
|
351 find_srvr_rcd(const DCC_SUM sum, const char *str) |
|
352 { |
|
353 DB_RCD_CK *found_ck; |
|
354 DB_PTR prev; |
|
355 int failsafe; |
|
356 |
|
357 switch (db_lookup(dcc_emsg, DCC_CK_SRVR_ID, sum, |
|
358 0, MAX_HASH_ENTRIES, |
|
359 &db_sts.hash, &db_sts.rcd2, &found_ck)) { |
|
360 case DB_FOUND_LATER: |
|
361 case DB_FOUND_SYSERR: |
|
362 DB_ERROR_MSG2(str, dcc_emsg); |
|
363 return -1; |
|
364 case DB_FOUND_IT: |
|
365 /* look for a record that is neither obsolete nor deleted */ |
|
366 for (failsafe = 0; failsafe < 20; ++failsafe) { |
|
367 if (!DB_CK_OBS(found_ck) |
|
368 && DB_TGTS_RCD(db_sts.rcd2.d.r) != 0) |
|
369 return 1; |
|
370 prev = DB_PTR_EX(found_ck->prev); |
|
371 if (prev == DB_PTR_NULL) |
|
372 return 0; |
|
373 found_ck = db_map_rcd_ck(dcc_emsg, &db_sts.rcd2, prev, |
|
374 DCC_CK_SRVR_ID); |
|
375 if (!found_ck) { |
|
376 DB_ERROR_MSG2(str, dcc_emsg); |
|
377 return -1; |
|
378 } |
|
379 } |
|
380 break; |
|
381 case DB_FOUND_EMPTY: |
|
382 case DB_FOUND_CHAIN: |
|
383 case DB_FOUND_INTRUDER: |
|
384 break; |
|
385 } |
|
386 return 0; |
|
387 } |
|
388 |
|
389 |
|
390 |
|
391 /* find the database record of the type of a server |
|
392 * use only db_sts.hash and db_sts.rcd2 |
|
393 * put the result in db_sts.rcd2 */ |
|
394 int /* -1=broken database 0=no record */ |
|
395 find_srvr_rcd_type(DCC_SRVR_ID tgt_id) |
|
396 { |
|
397 DCC_SUM srvr_id_sum; |
|
398 |
|
399 if (db_failed_line) |
|
400 return -1; |
|
401 memset(srvr_id_sum, 0, sizeof(srvr_id_sum)); |
|
402 srvr_id_sum[0] = DCC_CK_SRVR_ID; |
|
403 srvr_id_sum[1] = tgt_id >> 8; |
|
404 srvr_id_sum[2] = tgt_id; |
|
405 return find_srvr_rcd(srvr_id_sum, "checking server-ID state"); |
|
406 } |
|
407 |
|
408 |
|
409 |
|
410 /* find the server type in the table of IDs */ |
|
411 ID_TBL * |
|
412 find_srvr_type(DCC_SRVR_ID tgt_id) |
|
413 { |
|
414 ID_TBL *tp; |
|
415 DCC_SRVR_ID srvr_type; |
|
416 |
|
417 tp = find_id_tbl(tgt_id); |
|
418 if (!tp) { |
|
419 /* check the database if it is not in the table */ |
|
420 if (0 >= find_srvr_rcd_type(tgt_id)) { |
|
421 /* assume it is a simple server if there is |
|
422 * no declaration in the database */ |
|
423 srvr_type = DCC_ID_SRVR_SIMPLE; |
|
424 } else { |
|
425 srvr_type = DB_RCD_ID(db_sts.rcd2.d.r); |
|
426 if (!DCC_ID_SRVR_TYPE(srvr_type)) |
|
427 srvr_type = DCC_ID_SRVR_SIMPLE; |
|
428 /* the free code knows nothing about reputations */ |
|
429 if (srvr_type == DCC_ID_SRVR_REP_OK) |
|
430 srvr_type = DCC_ID_SRVR_SIMPLE; |
|
431 } |
|
432 /* cache it in the table */ |
|
433 tp = add_id_tbl(tgt_id); |
|
434 tp->srvr_type = srvr_type; |
|
435 } |
|
436 return tp; |
|
437 } |
|
438 |
|
439 |
|
440 |
|
441 /* refresh our claim to our server-ID or similar |
|
442 * use only db_sts.hash and db_sts.rcd2 */ |
|
443 void |
|
444 refresh_srvr_rcd(const DCC_SUM sum, DCC_SRVR_ID val, const char *str) |
|
445 { |
|
446 DCC_TS old; |
|
447 DB_RCD rcd; |
|
448 int i; |
|
449 |
|
450 /* add a new record |
|
451 * only if no recent record of the right value exists */ |
|
452 i = find_srvr_rcd(sum, str); |
|
453 if (i < 0) |
|
454 return; /* broken database */ |
|
455 if (i > 0 |
|
456 && DB_RCD_ID(db_sts.rcd2.d.r) == val) { |
|
457 dcc_timeval2ts(&old, &db_time, -DCC_SRVR_ID_SECS/2); |
|
458 if (!dcc_ts_older_ts(&db_sts.rcd2.d.r->ts, &old)) |
|
459 return; |
|
460 } |
|
461 |
|
462 memset(&rcd, 0, sizeof(rcd)); |
|
463 get_ts(&rcd.ts); |
|
464 rcd.srvr_id_auth = val; |
|
465 DB_TGTS_RCD_SET(&rcd, 1); |
|
466 rcd.fgs_num_cks = 1; |
|
467 rcd.cks[0].type_fgs = DCC_CK_SRVR_ID; |
|
468 memcpy(rcd.cks[0].sum, sum, sizeof(DCC_SUM)); |
|
469 if (!db_add_rcd(dcc_emsg, &rcd)) |
|
470 DB_ERROR_MSG2(str, dcc_emsg); |
|
471 } |
|
472 |
|
473 |
|
474 |
|
475 static void |
|
476 send_resp(const QUEUE *q, |
|
477 DCC_HDR *hdr, /* length in host byte order */ |
|
478 u_char no_msg) |
|
479 { |
|
480 u_int save_len; |
|
481 char ob[DCC_OPBUF]; |
|
482 int len, i; |
|
483 |
|
484 len = hdr->len; |
|
485 hdr->len = htons(len); |
|
486 /* callers must have dealt with the variations due to versions */ |
|
487 if (q->pkt.hdr.pkt_vers < DCC_PKT_VERSION_MIN) |
|
488 hdr->pkt_vers = DCC_PKT_VERSION_MIN; |
|
489 else if (q->pkt.hdr.pkt_vers > DCC_PKT_VERSION_MAX) |
|
490 hdr->pkt_vers = DCC_PKT_VERSION_MAX; |
|
491 else |
|
492 hdr->pkt_vers = q->pkt.hdr.pkt_vers; |
|
493 hdr->sender = htonl(my_srvr_id); |
|
494 hdr->op_nums = q->pkt.hdr.op_nums; |
|
495 if (q->passwd[0] != '\0') { |
|
496 /* sign with the password that authenticated the client */ |
|
497 dcc_sign(q->passwd, sizeof(q->passwd), hdr, len); |
|
498 #ifdef DCC_PKT_VERSION8 |
|
499 } else if (q->pkt.hdr.pkt_vers <= DCC_PKT_VERSION8) { |
|
500 /* Sign old protocol responses with the client's transaction |
|
501 * numbers if we do not have a good password. |
|
502 * This happens with anonymous clients */ |
|
503 dcc_sign((char *)&q->pkt.hdr.op_nums, |
|
504 sizeof(q->pkt.hdr.op_nums), |
|
505 hdr, len); |
|
506 #endif |
|
507 } else { |
|
508 memset((char *)hdr + (len-sizeof(DCC_SIGNATURE)), 0, |
|
509 sizeof(DCC_SIGNATURE)); |
|
510 } |
|
511 |
|
512 if (q->ridc) { |
|
513 save_len = len-sizeof(*hdr)-sizeof(DCC_SIGNATURE); |
|
514 if (save_len > ISZ(q->ridc->result)) { |
|
515 if (hdr->op == DCC_OP_ERROR) |
|
516 save_len = sizeof(q->ridc->result); |
|
517 else |
|
518 dcc_logbad(EX_SOFTWARE, "RIDC buffer overflow"); |
|
519 } |
|
520 q->ridc->len = save_len; |
|
521 memcpy(&q->ridc->result, hdr+1, save_len); |
|
522 q->ridc->op = hdr->op; |
|
523 q->ridc->bad = 0; |
|
524 } |
|
525 |
|
526 i = sendto(q->sp->udp, hdr, len, 0, |
|
527 &q->clnt_su.sa, DCC_SU_LEN(&q->clnt_su)); |
|
528 if (i < 0) { |
|
529 clnt_msg(q, "sendto(%s, %s): %s", |
|
530 dcc_hdr_op2str(ob, sizeof(ob), hdr), Q_CIP(q), |
|
531 ERROR_STR()); |
|
532 } else if (len != i) { |
|
533 clnt_msg(q, "sendto(%s, %s)=%d instead of %d", |
|
534 dcc_hdr_op2str(ob, sizeof(ob), hdr), Q_CIP(q), |
|
535 i, len); |
|
536 } else if (!no_msg |
|
537 && (dccd_tracemask & ((hdr->op == DCC_OP_ANSWER |
|
538 || hdr->op == DCC_OP_NOP) |
|
539 ? DCC_TRACE_QUERY_BIT |
|
540 : DCC_TRACE_ADMN_BIT))) { |
|
541 dcc_trace_msg("sent %s to %s for %s", |
|
542 dcc_hdr_op2str(ob, sizeof(ob), hdr), |
|
543 Q_CIP(q), qop2str(q)); |
|
544 } |
|
545 |
|
546 } |
|
547 |
|
548 |
|
549 |
|
550 /* do not send an error response to a client */ |
|
551 static void PATTRIB(2,3) |
|
552 forget_error(const QUEUE *q, const char *p, ...) |
|
553 { |
|
554 va_list args; |
|
555 |
|
556 RIDC_BAD(q); |
|
557 |
|
558 if ((!q->flags & Q_FG_BAD_PASSWD) |
|
559 && !(q->rl->d.flags & RL_FG_BLS)) { |
|
560 q->rl->d.flags |= RL_FG_BL_BAD; |
|
561 ++dccd_stats.bad_op; |
|
562 } |
|
563 |
|
564 va_start(args, p); |
|
565 vclnt_msg(q, p, args); |
|
566 va_end(args); |
|
567 } |
|
568 |
|
569 |
|
570 |
|
571 /* send an error response to a client */ |
|
572 static void |
|
573 send_error(const QUEUE *q, const char *p, ...) |
|
574 { |
|
575 DCC_ERROR buf; |
|
576 int slen; |
|
577 va_list args; |
|
578 |
|
579 |
|
580 /* build and log the message */ |
|
581 va_start(args, p); |
|
582 slen = vsnprintf(buf.msg, sizeof(buf.msg), p, args); |
|
583 if (slen > ISZ(buf.msg)-1) |
|
584 slen = ISZ(buf.msg)-1; |
|
585 va_end(args); |
|
586 clnt_msg(q, "\"%s\" sent to %s", buf.msg, Q_CIP(q)); |
|
587 |
|
588 /* send it */ |
|
589 buf.hdr.len = sizeof(buf)-sizeof(buf.msg)+slen+1; |
|
590 buf.hdr.op = DCC_OP_ERROR; |
|
591 send_resp(q, &buf.hdr, 1); |
|
592 |
|
593 ++dccd_stats.send_error; |
|
594 } |
|
595 |
|
596 |
|
597 |
|
598 #define NORESP_EMSG(q) noresp_emsg(q, __LINE__) |
|
599 |
|
600 static void |
|
601 noresp_emsg(const QUEUE *q, int linenum) |
|
602 { |
|
603 dcc_error_msg("error near line %d in "DCC_VERSION" "__FILE__, linenum); |
|
604 RIDC_BAD(q); |
|
605 } |
|
606 |
|
607 |
|
608 |
|
609 /* tell client that a NOP or an administrative request was ok */ |
|
610 static void |
|
611 send_ok(QUEUE *q) |
|
612 { |
|
613 DCC_OK buf; |
|
614 time_t us; |
|
615 |
|
616 memset(&buf, 0, sizeof(buf)); |
|
617 |
|
618 buf.max_pkt_vers = max(min(q->pkt.hdr.pkt_vers, DCC_PKT_VERSION_MAX), |
|
619 DCC_PKT_VERSION_MIN); |
|
620 us = (q->delay_us + 500) / 1000; |
|
621 buf.qdelay_ms = htons(us); |
|
622 strncpy(buf.brand, brand, sizeof(buf.brand)); |
|
623 buf.hdr.op = DCC_OP_OK; |
|
624 buf.hdr.len = sizeof(buf); |
|
625 |
|
626 send_resp(q, &buf.hdr, 0); |
|
627 } |
|
628 |
|
629 |
|
630 |
|
631 static void |
|
632 repeat_resp(QUEUE *q) |
|
633 { |
|
634 struct { |
|
635 DCC_HDR hdr; |
|
636 u_char b[sizeof(q->ridc->result)]; |
|
637 } buf; |
|
638 char ob[DCC_OPBUF]; |
|
639 |
|
640 ++dccd_stats.report_retrans; |
|
641 |
|
642 if (q->ridc->bad) { |
|
643 TMSG1(RIDC, "repeat drop of %s", from_id_ip(q, 1)); |
|
644 return; |
|
645 } |
|
646 |
|
647 memcpy(&buf.hdr+1, &q->ridc->result, q->ridc->len); |
|
648 buf.hdr.op = q->ridc->op; |
|
649 buf.hdr.len = htons(q->ridc->len |
|
650 + sizeof(buf.hdr) + sizeof(DCC_SIGNATURE)); |
|
651 TMSG2(RIDC, "repeat previous answer of %s for %s", |
|
652 dcc_hdr_op2str(ob, sizeof(ob), &buf.hdr), |
|
653 from_id_ip(q, 1)); |
|
654 buf.hdr.len = ntohs(buf.hdr.len); |
|
655 send_resp(q, &buf.hdr, 0); |
|
656 } |
|
657 |
|
658 |
|
659 |
|
660 /* find a checksum in the database |
|
661 * use only db_sts.hash and db_sts.rcd2 |
|
662 * put the result in db_sts.rcd2 */ |
|
663 static u_char /* 0=broken database */ |
|
664 get_ck_tgts(DCC_TGTS *tgtsp, |
|
665 const DB_RCD_CK **pfound_ck, |
|
666 u_char must_have_it, /* 1=database broken if cksum absent */ |
|
667 DCC_CK_TYPES type, |
|
668 const DCC_SUM sum) |
|
669 { |
|
670 DB_RCD_CK *found_ck; |
|
671 |
|
672 switch (db_lookup(dcc_emsg, type, sum, 0, MAX_HASH_ENTRIES, |
|
673 &db_sts.hash, &db_sts.rcd2, &found_ck)) { |
|
674 case DB_FOUND_LATER: |
|
675 case DB_FOUND_SYSERR: |
|
676 DB_ERROR_MSG(dcc_emsg); |
|
677 return 0; |
|
678 case DB_FOUND_IT: |
|
679 if (pfound_ck) |
|
680 *pfound_ck = found_ck; |
|
681 if (tgtsp) |
|
682 *tgtsp = DB_TGTS_CK(found_ck); |
|
683 break; |
|
684 case DB_FOUND_EMPTY: |
|
685 case DB_FOUND_CHAIN: |
|
686 case DB_FOUND_INTRUDER: |
|
687 if (must_have_it) { |
|
688 db_error_msg(__LINE__,__FILE__, |
|
689 "missing hash entry for %s %s ", |
|
690 DB_TYPE2STR(type), |
|
691 dcc_ck2str_err(type, sum, 0)); |
|
692 return 0; |
|
693 } |
|
694 if (pfound_ck) |
|
695 *pfound_ck = 0; |
|
696 if (tgtsp) |
|
697 *tgtsp = 0; |
|
698 break; |
|
699 } |
|
700 return 1; |
|
701 } |
|
702 |
|
703 |
|
704 |
|
705 /* see if a count just passed a multiple of a threshold and so is |
|
706 * worth flooding or summarizing */ |
|
707 static u_char /* 1=time to summarize this checksum */ |
|
708 quick_sum_thold(DCC_CK_TYPES type, |
|
709 DCC_TGTS rpt_tgts, /* targets in this report */ |
|
710 DCC_TGTS ck_tgts) /* grand total */ |
|
711 { |
|
712 static DCC_TGTS thold_mults[] = { |
|
713 1, 2, 3, 5, 10 |
|
714 }; |
|
715 DCC_TGTS thold; |
|
716 DCC_TGTS mult, new_mult, old_mult; |
|
717 int i; |
|
718 |
|
719 thold = flod_tholds[type]; |
|
720 if (ck_tgts < thold |
|
721 || thold >= DCC_TGTS_TOO_MANY) |
|
722 return 0; |
|
723 if (thold == 0) |
|
724 return 1; |
|
725 |
|
726 new_mult = ck_tgts / thold; |
|
727 old_mult = (ck_tgts - rpt_tgts) / thold; |
|
728 for (i = 0; i < DIM(thold_mults); ++i) { |
|
729 mult = thold_mults[i]; |
|
730 if (old_mult < mult) |
|
731 return (new_mult >= mult); |
|
732 } |
|
733 return 0; |
|
734 } |
|
735 |
|
736 |
|
737 |
|
738 /* compute summarizable total for one checksum |
|
739 * use db_sts.hash, db_sts.rcd2, and *rcd_st */ |
|
740 static DCC_TGTS /* DCC_TGTS_INVALID=broken database */ |
|
741 sum_total(DCC_CK_TYPES type, /* look for this */ |
|
742 const DCC_SUM sum, |
|
743 u_char must_have_it, |
|
744 DB_STATE *rcd_st, /* starting here */ |
|
745 const DB_RCD_CK *found_ck, |
|
746 u_char *undelay_ok, /* 0=cannot undelay by clearing bit */ |
|
747 DB_PTR *sum_oldest) |
|
748 { |
|
749 DB_PTR prev; |
|
750 DCC_TGTS rcd_tgts, sub_total; |
|
751 int limit; |
|
752 |
|
753 if (!rcd_st) { |
|
754 if (!get_ck_tgts(0, &found_ck, must_have_it, type, sum)) |
|
755 return DCC_TGTS_INVALID; |
|
756 if (!found_ck) |
|
757 return 0; |
|
758 rcd_st = &db_sts.rcd2; |
|
759 } |
|
760 |
|
761 if (sum_oldest) |
|
762 *sum_oldest = DB_PTR_MAX; |
|
763 sub_total = 0; |
|
764 for (limit = 10000; limit >= 0; --limit) { |
|
765 /* stop adding reports at the first summary or |
|
766 * compressed record in the hash chain */ |
|
767 if (DB_RCD_SUMRY(rcd_st->d.r) |
|
768 || DB_RCD_ID(rcd_st->d.r) == DCC_ID_COMP) |
|
769 break; |
|
770 |
|
771 /* honor deletions */ |
|
772 rcd_tgts = DB_TGTS_RCD(rcd_st->d.r); |
|
773 if (rcd_tgts == 0) |
|
774 break; |
|
775 |
|
776 /* We can only summarize our own delayed reports |
|
777 * to keep loops in the flooding topology from |
|
778 * inflating totals. */ |
|
779 if (DB_RCD_DELAY(rcd_st->d.r) |
|
780 && DB_RCD_ID(rcd_st->d.r) == my_srvr_id) { |
|
781 if (sum_oldest) |
|
782 *sum_oldest = rcd_st->s.rptr; |
|
783 sub_total = db_sum_ck(sub_total, rcd_tgts, type); |
|
784 /* if we summarize more than one record, |
|
785 * then we cannot simply convert the record */ |
|
786 if (undelay_ok |
|
787 && db_sts.sumrcd.s.rptr != rcd_st->s.rptr) |
|
788 *undelay_ok = 0; |
|
789 } |
|
790 prev = DB_PTR_EX(found_ck->prev); |
|
791 if (prev == DB_PTR_NULL) |
|
792 break; |
|
793 rcd_st = &db_sts.rcd2; |
|
794 found_ck = db_map_rcd_ck(dcc_emsg, rcd_st, prev, type); |
|
795 if (!found_ck) { |
|
796 DB_ERROR_MSG(dcc_emsg); |
|
797 return 0; |
|
798 } |
|
799 } |
|
800 |
|
801 return sub_total; |
|
802 } |
|
803 |
|
804 |
|
805 |
|
806 /* generate a summary record of checksum counts |
|
807 * db_sts.sumrcd points to the record being summarize on entry |
|
808 * On exit db_sts.sumrcd points to the same record or the original |
|
809 * has been trashed and db_sts.sumrcd points to a moved copy. |
|
810 * Use db_sts.rcd, db_sts.hash, db_sts.rcd2, db_sts.free, db_sts.tmp */ |
|
811 static u_char /* 0=sick db, 1=ok, 2=moved rcd */ |
|
812 summarize_rcd(u_char dly) /* 1=working on delayed records */ |
|
813 { |
|
814 DB_RCD new; |
|
815 DCC_TGTS rcd_tgts, ck_tgts, new_tgts, sub_total; |
|
816 DCC_CK_TYPES type; |
|
817 DB_RCD_CK *cur_ck, *new_ck; |
|
818 int cur_num_cks; |
|
819 u_char ck_needed; /* 0=junk cksum, 2=needed in new rcd */ |
|
820 u_char rcd_needed; /* 1=have created rcd to add */ |
|
821 u_char undelay_ok; /* 1=ok to remove delay bit */ |
|
822 u_char move_ok; |
|
823 DB_PTR sum_oldest; |
|
824 DB_PTR rcd_pos; |
|
825 |
|
826 if (db_lock() < 0) |
|
827 return 0; |
|
828 |
|
829 /* For each checksum whose flooding was delayed but is now needed, |
|
830 * generate a fake record that will be flooded */ |
|
831 cur_num_cks = DB_NUM_CKS(db_sts.sumrcd.d.r); |
|
832 cur_ck = db_sts.sumrcd.d.r->cks; |
|
833 new_tgts = 0; |
|
834 undelay_ok = (FLODS_OK() |
|
835 && (DB_RCD_ID(db_sts.sumrcd.d.r) == my_srvr_id)); |
|
836 move_ok = 1; |
|
837 rcd_needed = 0; |
|
838 new_ck = new.cks; |
|
839 do { |
|
840 /* Sum counts of all delayed reports for this checksum */ |
|
841 type = DB_CK_TYPE(cur_ck); |
|
842 if (DB_TEST_NOKEEP(db_parms.nokeep_cks, type)) |
|
843 continue; |
|
844 |
|
845 ck_needed = DB_CK_OBS(cur_ck) ? 0 : 1; |
|
846 |
|
847 /* skip trudging through the hash table to find the |
|
848 * most recent instance of the checksum if we |
|
849 * are dealing with a new record and so already |
|
850 * have the most recent instance. */ |
|
851 sub_total = sum_total(type, cur_ck->sum, 1, |
|
852 !dly ? &db_sts.sumrcd : 0, |
|
853 cur_ck, &undelay_ok, &sum_oldest); |
|
854 if (sub_total == DCC_TGTS_INVALID) |
|
855 return 0; |
|
856 |
|
857 /* Deletions and summaries between our record and the start |
|
858 * of the hash chain remove the need to flood this checkusm */ |
|
859 if (sub_total == 0) { |
|
860 /* skipping a checksum in the original |
|
861 * record makes it impossible to move it */ |
|
862 move_ok = 0; |
|
863 continue; |
|
864 } |
|
865 |
|
866 if (ck_needed == 1) { |
|
867 ck_tgts = DB_TGTS_CK(cur_ck); |
|
868 if (dly) { |
|
869 /* Flood only 1 summary per delay period */ |
|
870 if ((flod_mmaps == 0 |
|
871 || sum_oldest <= flod_mmaps->delay_pos) |
|
872 && ck_tgts >= flod_tholds[type]) |
|
873 ck_needed = 2; |
|
874 } else { |
|
875 /* We are considering the need for a summary |
|
876 * based on a report just received from a client |
|
877 * or by flooding */ |
|
878 if (quick_sum_thold(type, sub_total, ck_tgts)) |
|
879 ck_needed = 2; |
|
880 } |
|
881 } |
|
882 |
|
883 if (new_ck != new.cks) { |
|
884 /* We have already begun a summary record. */ |
|
885 |
|
886 if (sub_total == new_tgts) { |
|
887 /* extend it with this checksum even if we do |
|
888 * not really need to flood this checksum */ |
|
889 new_ck->type_fgs = type; |
|
890 memcpy(new_ck->sum, cur_ck->sum, |
|
891 sizeof(new_ck->sum)); |
|
892 ++new.fgs_num_cks; |
|
893 ++new_ck; |
|
894 if (ck_needed == 2) |
|
895 rcd_needed = 1; |
|
896 continue; |
|
897 } |
|
898 /* We cannot extend the current summary record. */ |
|
899 |
|
900 /* If we don't really need the checksum, |
|
901 * then forget the checksum. */ |
|
902 if (ck_needed != 2) { |
|
903 /* skipping a checksum in the original |
|
904 * record makes it impossible to move */ |
|
905 move_ok = 0; |
|
906 continue; |
|
907 } |
|
908 |
|
909 /* Add the current summary record to the database if |
|
910 * it is needed. */ |
|
911 if (rcd_needed) { |
|
912 if (!db_add_rcd(dcc_emsg, &new)) { |
|
913 DB_ERROR_MSG(dcc_emsg); |
|
914 return 0; |
|
915 } |
|
916 } |
|
917 /* start a new summary with this checksum. */ |
|
918 rcd_needed = 0; |
|
919 /* having added one summary record, |
|
920 * we cannot undelay or move the original record */ |
|
921 undelay_ok = 0; |
|
922 } |
|
923 |
|
924 /* start a new summary record */ |
|
925 new.srvr_id_auth = my_srvr_id; |
|
926 get_ts(&new.ts); |
|
927 new_tgts = sub_total; |
|
928 DB_TGTS_RCD_SET(&new, new_tgts); |
|
929 new.fgs_num_cks = DB_RCD_FG_SUMRY+1; |
|
930 new_ck = new.cks; |
|
931 new_ck->type_fgs = type; |
|
932 memcpy(new_ck->sum, cur_ck->sum, sizeof(new_ck->sum)); |
|
933 ++new_ck; |
|
934 if (ck_needed == 2) |
|
935 rcd_needed = 1; |
|
936 } while (++cur_ck, --cur_num_cks > 0); |
|
937 |
|
938 /* finished if nothing more to summarize */ |
|
939 if (!rcd_needed) { |
|
940 return 1; |
|
941 } |
|
942 |
|
943 /* Add the last summary record */ |
|
944 if (undelay_ok) { |
|
945 /* If possible, instead of adding a new record, |
|
946 * change the preceding record to not be delayed |
|
947 * That is possible if the preceding record has |
|
948 * not yet been passed by the flooding */ |
|
949 if (db_sts.sumrcd.s.rptr >= oflods_max_cur_pos |
|
950 && oflods_max_cur_pos != 0) { |
|
951 db_sts.sumrcd.d.r->fgs_num_cks &= ~DB_RCD_FG_DELAY; |
|
952 SET_FLUSH_RCD_HDR(&db_sts.sumrcd, 1); |
|
953 return 1; |
|
954 } |
|
955 |
|
956 /* failing that, try to move the record by making a new copy |
|
957 * and deleting the original */ |
|
958 if (move_ok) { |
|
959 /* make the new record */ |
|
960 memcpy(&new, db_sts.sumrcd.d.r, DB_RCD_LEN(&new)); |
|
961 new.fgs_num_cks &= ~DB_RCD_FG_DELAY; |
|
962 |
|
963 /* delete the old record */ |
|
964 DB_TGTS_RCD_SET(db_sts.sumrcd.d.r, 0); |
|
965 |
|
966 /* adjust the totals in the old record so |
|
967 * that the totals in the new record will be right */ |
|
968 rcd_tgts = DB_TGTS_RCD(&new); |
|
969 cur_num_cks = DB_NUM_CKS(db_sts.sumrcd.d.r); |
|
970 cur_ck = db_sts.sumrcd.d.r->cks; |
|
971 do { |
|
972 new_tgts = DB_TGTS_CK(cur_ck); |
|
973 if (new_tgts >= DCC_TGTS_TOO_MANY) |
|
974 continue; |
|
975 if (new_tgts != 0) |
|
976 new_tgts -= rcd_tgts; |
|
977 DB_TGTS_CK_SET(cur_ck, new_tgts); |
|
978 } while (++cur_ck, --cur_num_cks > 0); |
|
979 SET_FLUSH_RCD_HDR(&db_sts.sumrcd, 1); |
|
980 |
|
981 rcd_pos = db_add_rcd(dcc_emsg, &new); |
|
982 if (rcd_pos == DB_PTR_NULL) { |
|
983 DB_ERROR_MSG(dcc_emsg); |
|
984 return 0; |
|
985 } |
|
986 if (!db_map_rcd(dcc_emsg, &db_sts.sumrcd, rcd_pos, 0)) { |
|
987 DB_ERROR_MSG(dcc_emsg); |
|
988 return 0; |
|
989 } |
|
990 return 1; |
|
991 } |
|
992 } |
|
993 |
|
994 if (!db_add_rcd(dcc_emsg, &new)) { |
|
995 DB_ERROR_MSG(dcc_emsg); |
|
996 return 0; |
|
997 } |
|
998 |
|
999 return 1; |
|
1000 } |
|
1001 |
|
1002 |
|
1003 |
|
1004 /* generate a delayed summary for checksums in a record if necessary |
|
1005 * The target record is specified by db_sts.sumrcd. It might be changed |
|
1006 * Use db_sts.hash and db_sts.rcd2 */ |
|
1007 u_char |
|
1008 summarize_dly(void) |
|
1009 { |
|
1010 DCC_CK_TYPES type; |
|
1011 const DB_RCD_CK *cur_ck; |
|
1012 int cur_num_cks; |
|
1013 DCC_TGTS ck_tgts; |
|
1014 |
|
1015 /* look for a checksum that could be summarized */ |
|
1016 cur_num_cks = DB_NUM_CKS(db_sts.sumrcd.d.r); |
|
1017 cur_ck = db_sts.sumrcd.d.r->cks; |
|
1018 do { |
|
1019 type = DB_CK_TYPE(cur_ck); |
|
1020 if (DB_TEST_NOKEEP(db_parms.nokeep_cks, type)) |
|
1021 continue; |
|
1022 |
|
1023 if (!get_ck_tgts(&ck_tgts, 0, 1, type, cur_ck->sum)) |
|
1024 return 0; |
|
1025 |
|
1026 /* nothing to do if the checksum has already been summarized */ |
|
1027 if (DB_RCD_SUMRY(db_sts.rcd2.d.r)) |
|
1028 continue; |
|
1029 |
|
1030 /* spam reports are ignored or not delayed */ |
|
1031 if (ck_tgts == DCC_TGTS_TOO_MANY) |
|
1032 continue; |
|
1033 |
|
1034 /* Generate a summary for a bulk checksum |
|
1035 * Records that are marked "delayed" are not flooded. |
|
1036 * If a summary record is not synthesized and if the delay |
|
1037 * marking not removed (instead of synthesizing a summary), |
|
1038 * then the counts for a checksum will not be flooded. */ |
|
1039 |
|
1040 if (ck_tgts >= flod_tholds[type]) |
|
1041 return summarize_rcd(1); |
|
1042 } while (++cur_ck, --cur_num_cks > 0); |
|
1043 |
|
1044 return 1; |
|
1045 } |
|
1046 |
|
1047 |
|
1048 |
|
1049 /* See if passing on a flooded report would be worthwhile. It is worthwhile |
|
1050 * to pass on reports of spam that have not been flooded recently |
|
1051 * and of checksums that not yet or just barely reached spam. |
|
1052 * |
|
1053 * db_sts.sumrcd points to the new record */ |
|
1054 static u_char /* 0=sick database */ |
|
1055 flod_worth(u_char *pflod, /* set =1 if report should be flooded */ |
|
1056 const DB_RCD_CK *ck, |
|
1057 DCC_CK_TYPES type) |
|
1058 { |
|
1059 DCC_TS past; |
|
1060 DCC_TGTS total; |
|
1061 int limit; |
|
1062 DB_PTR prev; |
|
1063 |
|
1064 /* if the total with the new report is small, |
|
1065 * then we should flood it */ |
|
1066 total = DB_TGTS_CK(ck); |
|
1067 if (total < REFLOOD_THRESHOLD) { |
|
1068 /* but only if it is not trivial. |
|
1069 * our neighbors should not send trivial reports, |
|
1070 * but bugs happen */ |
|
1071 if (total >= BULK_THRESHOLD/2) |
|
1072 *pflod = 1; |
|
1073 return 1; |
|
1074 } |
|
1075 |
|
1076 /* Look for a recent report for this checksum that has been |
|
1077 * or will be flooded. If we find one, and if the total |
|
1078 * including it is large enough, we may not need to flood |
|
1079 * the incoming report. If the total is too small, we |
|
1080 * must flood the report. */ |
|
1081 dcc_timeval2ts(&past, &db_time, -summarize_delay_secs); |
|
1082 for (limit = 20; limit >= 0; --limit) { |
|
1083 prev = DB_PTR_EX(ck->prev); |
|
1084 if (prev == DB_PTR_NULL) |
|
1085 break; |
|
1086 ck = db_map_rcd_ck(dcc_emsg, &db_sts.rcd2, prev, type); |
|
1087 if (!ck) { |
|
1088 DB_ERROR_MSG(dcc_emsg); |
|
1089 return 0; |
|
1090 } |
|
1091 |
|
1092 /* if the previous total was small, |
|
1093 * then we must flood the new report */ |
|
1094 total = DB_TGTS_CK(ck); |
|
1095 if (total < REFLOOD_THRESHOLD*4) { |
|
1096 *pflod = 1; |
|
1097 return 1; |
|
1098 } |
|
1099 |
|
1100 /* The old total is large. |
|
1101 * If this found old report is not very old and good, |
|
1102 * we will flood it and so the newest needed not be flooded |
|
1103 * and can be marked obsolete. */ |
|
1104 if (!DB_CK_OBS(ck) |
|
1105 && dcc_ts_newer_ts(&db_sts.rcd2.d.r->ts, &past)) |
|
1106 return 1; |
|
1107 } |
|
1108 |
|
1109 /* flood this one if we can't find a recent preceding report */ |
|
1110 *pflod = 1; |
|
1111 return 1; |
|
1112 } |
|
1113 |
|
1114 |
|
1115 |
|
1116 /* Add a record and deal with delaying its flooding. |
|
1117 * We will delay flooding it if its totals are not interesting. |
|
1118 * db_sts.sumrcd points to the new record on exit |
|
1119 * Use db_sts.rcd, db_sts.hash, db_sts.rcd2, db_sts.free, db_sts.tmp |
|
1120 * the database must be locked */ |
|
1121 u_char /* 1=ok, delayed or not, 0=failure */ |
|
1122 add_dly_rcd(DB_RCD *new_rcd, u_char flod_in) |
|
1123 { |
|
1124 DB_PTR rcd_pos; |
|
1125 int num_cks; |
|
1126 DB_RCD_CK *new_ck; |
|
1127 DCC_CK_TYPES type; |
|
1128 DCC_TGTS rpt_tgts, ck_tgts; |
|
1129 u_char flod_out; /* 0=flooded in but not worth flooding out */ |
|
1130 u_char useful = 0; /* 1=worth delaying */ |
|
1131 u_char summarize = 0; |
|
1132 |
|
1133 /* put the record in the database */ |
|
1134 rcd_pos = db_add_rcd(dcc_emsg, new_rcd); |
|
1135 if (rcd_pos == DB_PTR_NULL) { |
|
1136 DB_ERROR_MSG(dcc_emsg); |
|
1137 return 0; |
|
1138 } |
|
1139 if (!db_map_rcd(dcc_emsg, &db_sts.sumrcd, rcd_pos, 0)) { |
|
1140 DB_ERROR_MSG(dcc_emsg); |
|
1141 return 0; |
|
1142 } |
|
1143 |
|
1144 /* delete requests should not be delayed */ |
|
1145 rpt_tgts = DB_TGTS_RCD_RAW(db_sts.sumrcd.d.r); |
|
1146 if (rpt_tgts == DCC_TGTS_DEL) |
|
1147 return 1; |
|
1148 |
|
1149 /* we always consider flooding our own reports |
|
1150 * and the greylist thresholds are zilch */ |
|
1151 flod_out = !flod_in || grey_on; |
|
1152 |
|
1153 for (num_cks = DB_NUM_CKS(db_sts.sumrcd.d.r), |
|
1154 new_ck = db_sts.sumrcd.d.r->cks; |
|
1155 num_cks > 0; |
|
1156 ++new_ck, --num_cks) { |
|
1157 /* ingore already obsolete reports of spam */ |
|
1158 if (DB_CK_OBS(new_ck)) |
|
1159 continue; |
|
1160 /* ignore checksums we won't keep and so won't be flooded */ |
|
1161 type = DB_CK_TYPE(new_ck); |
|
1162 if (DB_TEST_NOKEEP(db_parms.nokeep_cks, type)) |
|
1163 continue; |
|
1164 |
|
1165 /* Server-ID declarations cannot be summarized and should |
|
1166 * not be delayed. */ |
|
1167 if (type == DCC_CK_SRVR_ID) { |
|
1168 flod_out = 1; |
|
1169 break; |
|
1170 } |
|
1171 |
|
1172 ck_tgts = DB_TGTS_CK(new_ck); |
|
1173 if (ck_tgts == DCC_TGTS_TOO_MANY) { |
|
1174 /* This checksum has a total of TOO_MANY and so |
|
1175 * either the report has a target count of TOO_MANY |
|
1176 * or is a report of a checksum already known to |
|
1177 * be spam. Since this report of this checksum |
|
1178 * was not marked obsolete as it was linked into the |
|
1179 * database, it should not be delayed. */ |
|
1180 if (rpt_tgts == DCC_TGTS_TOO_MANY) { |
|
1181 /* if the report is of spam, then all of its |
|
1182 * individual checksum totals will be |
|
1183 * DCC_TGTS_TOO_MANY. The checksums will be |
|
1184 * obsolete, not kept, or the same as this. |
|
1185 * There will be no reputation checksums. */ |
|
1186 return 1; |
|
1187 } |
|
1188 /* it is worth sending on even if was not ours */ |
|
1189 flod_out = 1; |
|
1190 continue; |
|
1191 } |
|
1192 |
|
1193 /* This report has some potential value and should be delayed |
|
1194 * instead of forgotten */ |
|
1195 useful = 1; |
|
1196 |
|
1197 /* Summarize our records for the checksums in this record |
|
1198 * if we just passed the threshold for one checksum. */ |
|
1199 if (!summarize |
|
1200 && quick_sum_thold(type, rpt_tgts, ck_tgts)) |
|
1201 summarize = 1; |
|
1202 |
|
1203 /* If this is an incoming flooded checksum, |
|
1204 * then pass it on if it is novel (has a low total) |
|
1205 * or if we have not passed it on recently. */ |
|
1206 if (!flod_out |
|
1207 && !flod_worth(&flod_out, new_ck, type)) |
|
1208 return 0; /* broken database */ |
|
1209 } |
|
1210 |
|
1211 /* Reports that are reports of spam or "trimmed" or "obsolete" |
|
1212 * noise should not be summarized or marked to be delayed. |
|
1213 * They will be flooded or skipped by the flooder */ |
|
1214 if (!useful) |
|
1215 return 1; |
|
1216 |
|
1217 if (!flod_in) { |
|
1218 /* Delay and sooner or later summarize our own |
|
1219 * reports of non-spam */ |
|
1220 db_sts.sumrcd.d.r->fgs_num_cks |= DB_RCD_FG_DELAY; |
|
1221 |
|
1222 } else if (!flod_out) { |
|
1223 /* We are dealing with a report flooded in from another |
|
1224 * server that is not (yet?) worth flooding out. |
|
1225 * We can't delay it, because we can't delay reports from |
|
1226 * other servers, because we cannot summarize them. |
|
1227 * Summarizing other servers' reports would allow |
|
1228 * loops in the flooding topology to inflate the totals. |
|
1229 * So mark it to be expired but not delayed. */ |
|
1230 for (num_cks = DB_NUM_CKS(db_sts.sumrcd.d.r), |
|
1231 new_ck = db_sts.sumrcd.d.r->cks; |
|
1232 num_cks > 0; |
|
1233 ++new_ck, --num_cks) { |
|
1234 new_ck->type_fgs |= DB_CK_FG_OBS; |
|
1235 } |
|
1236 } |
|
1237 |
|
1238 /* If this record pushed us past a threshold for at least one |
|
1239 * checksum, then try to generate a summary of our own previously |
|
1240 * delayed reports even if this record was not our own. */ |
|
1241 if (summarize |
|
1242 && !summarize_rcd(0)) |
|
1243 return 0; |
|
1244 |
|
1245 return 1; |
|
1246 } |
|
1247 |
|
1248 |
|
1249 |
|
1250 /* the database must be locked */ |
|
1251 static u_char |
|
1252 add_del(const DCC_CK *del_ck) |
|
1253 { |
|
1254 DB_RCD del_rcd; |
|
1255 |
|
1256 memset(&del_rcd, 0, sizeof(del_rcd)); |
|
1257 get_ts(&del_rcd.ts); |
|
1258 DB_TGTS_RCD_SET(&del_rcd, DCC_TGTS_DEL); |
|
1259 del_rcd.srvr_id_auth = my_srvr_id; |
|
1260 del_rcd.fgs_num_cks = 1; |
|
1261 del_rcd.cks[0].type_fgs = del_ck->type; |
|
1262 memcpy(del_rcd.cks[0].sum, del_ck->sum, sizeof(del_rcd.cks[0].sum)); |
|
1263 if (!db_add_rcd(dcc_emsg, &del_rcd)) { |
|
1264 DB_ERROR_MSG2("add delete", dcc_emsg); |
|
1265 return 0; |
|
1266 } |
|
1267 |
|
1268 return 1; |
|
1269 } |
|
1270 |
|
1271 |
|
1272 |
|
1273 static const DCC_CK * |
|
1274 start_work(QUEUE *q) |
|
1275 { |
|
1276 const DCC_CK *ck, *ck_lim; |
|
1277 DCC_CK_TYPES type, prev_type; |
|
1278 int num_cks; |
|
1279 |
|
1280 num_cks = q->pkt_len - (sizeof(q->pkt.r) - sizeof(q->pkt.r.cks)); |
|
1281 if (num_cks < 0 |
|
1282 || num_cks > ISZ(q->pkt.r.cks) |
|
1283 || num_cks % sizeof(DCC_CK) != 0) { |
|
1284 forget_error(q, "packet length %d wrong for %s", |
|
1285 q->pkt_len, from_id_ip(q, 1)); |
|
1286 return 0; |
|
1287 } |
|
1288 num_cks /= sizeof(DCC_CK); |
|
1289 |
|
1290 /* send previous answer if this is a retransmission */ |
|
1291 if (ridc_get(q)) { |
|
1292 repeat_resp(q); |
|
1293 return 0; |
|
1294 } |
|
1295 |
|
1296 if (db_failed_line) /* be silent while database bad */ |
|
1297 return 0; |
|
1298 |
|
1299 ck = q->pkt.r.cks; |
|
1300 ck_lim = &q->pkt.r.cks[num_cks]; |
|
1301 |
|
1302 /* check each checksum */ |
|
1303 for (prev_type = DCC_CK_INVALID; ck < ck_lim; ++ck, prev_type = type) { |
|
1304 if (ck->len != sizeof(*ck)) { |
|
1305 forget_error(q, "unknown checksum length %d%s", |
|
1306 ck->len, from_id_ip(q, 0)); |
|
1307 return 0; |
|
1308 } |
|
1309 /* requiring that the checksums be ordered makes it easy |
|
1310 * to check for duplicates and for bogus long packets */ |
|
1311 type = ck->type; |
|
1312 if (!DCC_CK_OK_DCC_CLNT(grey_on, type)) { |
|
1313 forget_error(q, "unknown checksum %s%s", |
|
1314 DB_TYPE2STR(type), from_id_ip(q, 0)); |
|
1315 return 0; |
|
1316 } |
|
1317 if (prev_type >= type) { |
|
1318 forget_error(q, "out of order %s checksum%s", |
|
1319 DB_TYPE2STR(ck->type), from_id_ip(q, 0)); |
|
1320 return 0; |
|
1321 } |
|
1322 } |
|
1323 |
|
1324 if (db_lock() < 0) { |
|
1325 NORESP_EMSG(q); |
|
1326 return 0; |
|
1327 } |
|
1328 |
|
1329 return ck_lim; |
|
1330 } |
|
1331 |
|
1332 |
|
1333 |
|
1334 /* send the response and release q */ |
|
1335 static void |
|
1336 fin_work(const QUEUE *q, DCC_HDR *answer) |
|
1337 { |
|
1338 int delay_us; |
|
1339 |
|
1340 /* send the response */ |
|
1341 answer->op = DCC_OP_ANSWER; |
|
1342 send_resp(q, answer, 0); |
|
1343 |
|
1344 /* update the average queue delay, unless it is crazy */ |
|
1345 gettimeofday(&db_time, 0); |
|
1346 delay_us = tv_diff2us(&db_time, &q->answer); |
|
1347 if (delay_us < 0) |
|
1348 return; |
|
1349 |
|
1350 update_q_delay(); |
|
1351 q_delays[0].us += delay_us; |
|
1352 ++q_delays[0].ops; |
|
1353 } |
|
1354 |
|
1355 |
|
1356 |
|
1357 /* use only db_sts.hash and db_sts.rcd2 |
|
1358 * release q on failure */ |
|
1359 static u_char |
|
1360 make_answer(QUEUE *q, |
|
1361 const DCC_CK *ck_lim, |
|
1362 u_char have_rcd, /* db_sts.sumrcd.d.r is new record */ |
|
1363 DCC_ANSWER *answer, |
|
1364 DCC_TGTS gross_tgts, /* total for this report, maybe MANY */ |
|
1365 DCC_TGTS* max_tgts) /* statistics */ |
|
1366 { |
|
1367 const DCC_CK *ck; |
|
1368 DCC_TGTS c_tgts; /* current count with this report */ |
|
1369 DCC_TGTS p_tgts; /* count before this report */ |
|
1370 DCC_ANSWER_BODY_CKS *b; |
|
1371 DCC_CK_TYPES type; |
|
1372 const DB_RCD_CK *rcd_ck, *prev_rcd_ck; |
|
1373 int num_rcd_cks; |
|
1374 DB_PTR prev; |
|
1375 *max_tgts = 0; |
|
1376 |
|
1377 if (have_rcd) { |
|
1378 rcd_ck = db_sts.sumrcd.d.r->cks; |
|
1379 num_rcd_cks = DB_NUM_CKS(db_sts.sumrcd.d.r); |
|
1380 } else { |
|
1381 num_rcd_cks = 0; |
|
1382 rcd_ck = 0; |
|
1383 } |
|
1384 b = answer->b; |
|
1385 for (ck = q->pkt.r.cks; ck < ck_lim; ++ck) { |
|
1386 type = ck->type; |
|
1387 if (num_rcd_cks > 0 |
|
1388 && type == DB_CK_TYPE(rcd_ck)) { |
|
1389 /* try to copy answer from report's new record */ |
|
1390 c_tgts = DB_TGTS_CK(rcd_ck); |
|
1391 if (c_tgts < DCC_TGTS_TOO_MANY) { |
|
1392 p_tgts = c_tgts - gross_tgts; |
|
1393 } else if (prev = DB_PTR_EX(rcd_ck->prev), |
|
1394 prev == DB_PTR_NULL) { |
|
1395 p_tgts = 0; |
|
1396 } else { |
|
1397 prev_rcd_ck = db_map_rcd_ck(dcc_emsg, |
|
1398 &db_sts.rcd2, |
|
1399 prev, type); |
|
1400 if (!prev_rcd_ck) { |
|
1401 DB_ERROR_MSG(dcc_emsg); |
|
1402 RIDC_BAD(q); |
|
1403 return 0; |
|
1404 } |
|
1405 p_tgts = DB_TGTS_CK(prev_rcd_ck); |
|
1406 } |
|
1407 --num_rcd_cks; |
|
1408 ++rcd_ck; |
|
1409 |
|
1410 } else { |
|
1411 if (!get_ck_tgts(&p_tgts, 0, 0, type, ck->sum)) { |
|
1412 NORESP_EMSG(q); |
|
1413 return 0; |
|
1414 } |
|
1415 if (DB_TEST_NOKEEP(db_parms.nokeep_cks, type)) { |
|
1416 /* uninteresting checksums have no value |
|
1417 * unless they are whitelisted */ |
|
1418 c_tgts = p_tgts; |
|
1419 if (p_tgts == 0) |
|
1420 p_tgts = DCC_TGTS_INVALID; |
|
1421 } else { |
|
1422 c_tgts = db_sum_ck(p_tgts, gross_tgts, type); |
|
1423 } |
|
1424 } |
|
1425 |
|
1426 b->c = htonl(c_tgts); |
|
1427 b->p = htonl(p_tgts); |
|
1428 #ifdef DCC_PKT_VERSION5 |
|
1429 if (q->pkt.hdr.pkt_vers <= DCC_PKT_VERSION5) |
|
1430 b = (DCC_ANSWER_BODY_CKS *)&b->p; |
|
1431 else |
|
1432 #endif |
|
1433 ++b; |
|
1434 |
|
1435 if (*max_tgts < c_tgts |
|
1436 && c_tgts <= DCC_TGTS_OK2) { |
|
1437 *max_tgts = c_tgts; |
|
1438 /* Complain about failures to whitelist by |
|
1439 * trusted clients. The main use of this is |
|
1440 * to detect whitelisting failures of IP addresses |
|
1441 * such as 127.0.0.1 for reputations, and those |
|
1442 * matter only for known clients. */ |
|
1443 if ((p_tgts >= DCC_TGTS_OK) |
|
1444 && !(q->flags & Q_FG_UNTRUSTED)) |
|
1445 TMSG4(WLIST, "%s whitelisted %s %s%s", |
|
1446 qop2str(q), |
|
1447 DB_TYPE2STR(type), |
|
1448 dcc_ck2str_err(type, ck->sum, 0), |
|
1449 from_id_ip(q, 0)); |
|
1450 } |
|
1451 } |
|
1452 answer->hdr.len = (sizeof(*answer) - sizeof(answer->b) |
|
1453 + ((char *)b - (char *)answer->b)); |
|
1454 return 1; |
|
1455 } |
|
1456 |
|
1457 |
|
1458 |
|
1459 /* release q on failure |
|
1460 * the database must be locked */ |
|
1461 static u_char |
|
1462 do_report(QUEUE *q, |
|
1463 DCC_TGTS tgts0, const DCC_CK *ck_lim, |
|
1464 DCC_ANSWER *answer, |
|
1465 DCC_TGTS *max_tgts) |
|
1466 { |
|
1467 const DCC_CK *ck; |
|
1468 DCC_TGTS tgts; |
|
1469 DCC_TGTS gross_tgts; /* DCC_TGTS_TOO_MANY if spam */ |
|
1470 DB_PTR rcd_pos; |
|
1471 DB_RCD new; |
|
1472 DB_RCD_CK *new_ck; |
|
1473 DCC_CK_TYPES type; |
|
1474 char tgts_buf[DCC_XHDR_MAX_TGTS_LEN]; |
|
1475 |
|
1476 tgts = tgts0; |
|
1477 if (tgts & (DCC_TGTS_SPAM | DCC_TGTS_REP_SPAM)) { |
|
1478 tgts &= DCC_TGTS_MASK; |
|
1479 if (tgts == 0) |
|
1480 tgts = 1; |
|
1481 gross_tgts = DCC_TGTS_TOO_MANY; |
|
1482 } else if (tgts == DCC_TGTS_TOO_MANY) { |
|
1483 tgts = 1; |
|
1484 gross_tgts = DCC_TGTS_TOO_MANY; |
|
1485 } else if (tgts > DCC_TGTS_RPT_MAX) { |
|
1486 forget_error(q, "bogus target count %s%s", |
|
1487 dcc_tgts2str(tgts_buf, sizeof(tgts_buf), |
|
1488 tgts, grey_on), |
|
1489 from_id_ip(q, 0)); |
|
1490 return 0; |
|
1491 } else { |
|
1492 gross_tgts = tgts; |
|
1493 } |
|
1494 |
|
1495 if (gross_tgts < 10) { |
|
1496 ; |
|
1497 } else if (gross_tgts == DCC_TGTS_TOO_MANY) { |
|
1498 ++dccd_stats.reportmany; |
|
1499 } else if (gross_tgts > 1000) { |
|
1500 ++dccd_stats.report1000; |
|
1501 } else if (gross_tgts > 100) { |
|
1502 ++dccd_stats.report100; |
|
1503 } else if (gross_tgts > 10) { |
|
1504 ++dccd_stats.report10; |
|
1505 } |
|
1506 |
|
1507 /* Get ready to add the report to the database, |
|
1508 * and as a side effect, find the data to answer the query. |
|
1509 * Start by creating the record to add to the database. */ |
|
1510 get_ts(&new.ts); |
|
1511 new.srvr_id_auth = my_srvr_id; |
|
1512 DB_TGTS_RCD_SET(&new, gross_tgts); |
|
1513 |
|
1514 /* copy checksums to the new record */ |
|
1515 new.fgs_num_cks = 0; |
|
1516 new_ck = new.cks; |
|
1517 for (ck = q->pkt.r.cks; ck < ck_lim; ++ck) { |
|
1518 type = ck->type; |
|
1519 if (DB_TEST_NOKEEP(db_parms.nokeep_cks, type)) |
|
1520 continue; |
|
1521 memcpy(new_ck->sum, ck->sum, sizeof(new_ck->sum)); |
|
1522 new_ck->type_fgs = type; |
|
1523 ++new_ck; |
|
1524 ++new.fgs_num_cks; |
|
1525 } |
|
1526 |
|
1527 if (!(q->flags & Q_FG_RPT_OK)) { |
|
1528 /* finished if this is a query */ |
|
1529 return make_answer(q, ck_lim, 0, answer, gross_tgts, |
|
1530 max_tgts); |
|
1531 } |
|
1532 |
|
1533 if (new.fgs_num_cks == 0) { |
|
1534 rcd_pos = DB_PTR_NULL; |
|
1535 } else { |
|
1536 /* Add the record to the database. |
|
1537 * That will update the totals for each checksum */ |
|
1538 if (!add_dly_rcd(&new, 0)) { |
|
1539 NORESP_EMSG(q); |
|
1540 return 0; |
|
1541 } |
|
1542 rcd_pos = db_sts.sumrcd.s.rptr; |
|
1543 } |
|
1544 |
|
1545 /* generate the response, perhaps from the new record */ |
|
1546 return make_answer(q, ck_lim, rcd_pos!=DB_PTR_NULL, answer, gross_tgts, |
|
1547 max_tgts); |
|
1548 } |
|
1549 |
|
1550 |
|
1551 |
|
1552 /* process a single real request */ |
|
1553 void |
|
1554 do_work(QUEUE *q) |
|
1555 { |
|
1556 const DCC_CK *ck_lim; |
|
1557 DCC_ANSWER answer; |
|
1558 DCC_TGTS max_tgts, tgts; |
|
1559 |
|
1560 ck_lim = start_work(q); |
|
1561 if (!ck_lim) |
|
1562 return; |
|
1563 |
|
1564 tgts = 0; |
|
1565 switch (q->pkt.hdr.op) { |
|
1566 case DCC_OP_QUERY: |
|
1567 ++dccd_stats.queries; |
|
1568 q->flags &= ~Q_FG_RPT_OK; |
|
1569 break; |
|
1570 |
|
1571 case DCC_OP_REPORT: |
|
1572 if (!(q->flags & Q_FG_RPT_OK)) { |
|
1573 ++dccd_stats.report_reject; |
|
1574 clnt_msg(q, "treat %s as query", from_id_ip(q, 1)); |
|
1575 ++dccd_stats.queries; |
|
1576 } else { |
|
1577 tgts = ntohl(q->pkt.r.tgts); |
|
1578 ++dccd_stats.reports; |
|
1579 } |
|
1580 break; |
|
1581 |
|
1582 case DCC_OP_INVALID: |
|
1583 case DCC_OP_NOP: |
|
1584 case DCC_OP_ANSWER: |
|
1585 case DCC_OP_ADMN: |
|
1586 case DCC_OP_OK: |
|
1587 case DCC_OP_ERROR: |
|
1588 case DCC_OP_DELETE: |
|
1589 case DCC_OP_GREY_REPORT: |
|
1590 case DCC_OP_GREY_QUERY: |
|
1591 case DCC_OP_GREY_SPAM: |
|
1592 case DCC_OP_GREY_WHITE: |
|
1593 dcc_logbad(EX_SOFTWARE, "impossible queued operation"); |
|
1594 break; |
|
1595 } |
|
1596 |
|
1597 if (!do_report(q, tgts, ck_lim, &answer, |
|
1598 &max_tgts)) { |
|
1599 /* ensure that the clock ticks so rate limits don't stick */ |
|
1600 gettimeofday(&db_time, 0); |
|
1601 } else { |
|
1602 /* notice the size of our answer */ |
|
1603 if (max_tgts == DCC_TGTS_OK || max_tgts == DCC_TGTS_OK2) { |
|
1604 ++dccd_stats.respwhite; |
|
1605 } else if (max_tgts == DCC_TGTS_TOO_MANY) { |
|
1606 ++dccd_stats.respmany; |
|
1607 } else if (max_tgts > 1000) { |
|
1608 ++dccd_stats.resp1000; |
|
1609 } else if (max_tgts > 100) { |
|
1610 ++dccd_stats.resp100; |
|
1611 } else if (max_tgts > 10) { |
|
1612 ++dccd_stats.resp10; |
|
1613 } |
|
1614 |
|
1615 fin_work(q, &answer.hdr); |
|
1616 } |
|
1617 } |
|
1618 |
|
1619 |
|
1620 |
|
1621 /* return 0 for a new embargo, |
|
1622 * embargo count for an existing embargo, |
|
1623 * DCC_TGTS_TOO_MANY no embargo |
|
1624 * DCC_TGTS_OK a newly expired embargo |
|
1625 * DCC_TGTS_INVALID broken database */ |
|
1626 static DCC_TGTS |
|
1627 search_grey(const DCC_CK *req_ck3, /* triple checksum */ |
|
1628 const DCC_CK *req_ckb, /* body seen with it */ |
|
1629 u_char body_known) |
|
1630 { |
|
1631 DB_RCD_CK *ck3, *ckb; |
|
1632 DB_PTR prev3; |
|
1633 DCC_TS old_ts; |
|
1634 DCC_TGTS result_tgts; |
|
1635 int i; |
|
1636 |
|
1637 /* look for the triple checksum */ |
|
1638 switch (db_lookup(dcc_emsg, DCC_CK_GREY3, req_ck3->sum, |
|
1639 0, MAX_HASH_ENTRIES, |
|
1640 &db_sts.hash, &db_sts.rcd, &ck3)) { |
|
1641 case DB_FOUND_EMPTY: |
|
1642 case DB_FOUND_CHAIN: |
|
1643 case DB_FOUND_INTRUDER: |
|
1644 return 0; |
|
1645 |
|
1646 case DB_FOUND_IT: |
|
1647 /* We found the triple checksum. |
|
1648 * If it is marked ok (MANY) or deleted, |
|
1649 * then we have our answer */ |
|
1650 result_tgts = DB_TGTS_CK(ck3); |
|
1651 if (result_tgts == DCC_TGTS_TOO_MANY || result_tgts == 0) |
|
1652 return result_tgts; |
|
1653 |
|
1654 /* Otherwise look for a report of the triple with |
|
1655 * the right body checksum that is old enough. */ |
|
1656 result_tgts = 0; |
|
1657 dcc_timeval2ts(&old_ts, &db_time, -grey_embargo); |
|
1658 for (;;) { |
|
1659 ckb = db_sts.rcd.d.r->cks; |
|
1660 for (i = DB_NUM_CKS(db_sts.rcd.d.r); |
|
1661 i > 0; |
|
1662 --i, ++ckb) { |
|
1663 /* try the next report in the database |
|
1664 * if it has the wrong body checksum |
|
1665 * |
|
1666 * If we are weak on bodies, |
|
1667 * act as if all reports of the triple checksums |
|
1668 * are with the right body checksum. */ |
|
1669 if (!grey_weak_body && req_ckb) { |
|
1670 if (DB_CK_TYPE(ckb) != DCC_CK_BODY) |
|
1671 continue; |
|
1672 if (memcmp(req_ckb->sum, ckb->sum, |
|
1673 sizeof(DCC_SUM))) |
|
1674 break; |
|
1675 } |
|
1676 |
|
1677 /* We found the right body checksum in |
|
1678 * chain of the triple checksum |
|
1679 * or we don't care. |
|
1680 * |
|
1681 * If the report is old enough, then |
|
1682 * the embargo is over. */ |
|
1683 if (dcc_ts_newer_ts(&old_ts, |
|
1684 &db_sts.rcd.d.r->ts)) |
|
1685 return DCC_TGTS_OK; |
|
1686 |
|
1687 /* If it is not old enough, |
|
1688 * then we know this is not a new embargo for |
|
1689 * this body (i.e. the reported target count |
|
1690 * will be >0) and we must keep looking for an |
|
1691 * old enough report with the body checksum. */ |
|
1692 ++result_tgts; |
|
1693 break; |
|
1694 } |
|
1695 |
|
1696 /* If we know the body checksum is not in the database, |
|
1697 * then there is no profit in looking at other reports |
|
1698 * of the triple checksum to try to find an old enough |
|
1699 * report that is with the right body checksum. |
|
1700 * We know this is a new embargo. */ |
|
1701 if (!body_known) |
|
1702 return 0; |
|
1703 |
|
1704 /* If we reach the end of the chain of the |
|
1705 * triple checksum without finding an old |
|
1706 * enough report for the right body, |
|
1707 * then the embargo is not over. */ |
|
1708 prev3 = DB_PTR_EX(ck3->prev); |
|
1709 if (prev3 == DB_PTR_NULL) |
|
1710 return result_tgts; |
|
1711 |
|
1712 /* examine the timestamp of the preceding report |
|
1713 * of the triple */ |
|
1714 ck3 = db_map_rcd_ck(dcc_emsg, &db_sts.rcd, |
|
1715 prev3, DCC_CK_GREY3); |
|
1716 if (!ck3) |
|
1717 return DCC_TGTS_INVALID; |
|
1718 } |
|
1719 break; |
|
1720 |
|
1721 case DB_FOUND_LATER: |
|
1722 case DB_FOUND_SYSERR: |
|
1723 DB_ERROR_MSG(dcc_emsg); |
|
1724 return DCC_TGTS_INVALID; |
|
1725 } |
|
1726 return DCC_TGTS_INVALID; |
|
1727 } |
|
1728 |
|
1729 |
|
1730 |
|
1731 void |
|
1732 do_grey(QUEUE *q) |
|
1733 { |
|
1734 DCC_OPS op; |
|
1735 DB_RCD new; |
|
1736 const DCC_CK *req, *req_lim; |
|
1737 const DCC_CK *req_ck_ip, *req_ck_triple, *req_ck_msg, *req_ck_body; |
|
1738 u_char body_known; |
|
1739 DB_RCD_CK *new_ck, *found_ck; |
|
1740 DCC_GREY_ANSWER resp; |
|
1741 DCC_TGTS tgts; |
|
1742 DCC_TGTS ip_tgts; /* existing count for DCC_CK_IP */ |
|
1743 DCC_TGTS triple_tgts; /* " count for GREY_TRIPLE */ |
|
1744 DCC_TGTS msg_tgts; /* " count for GREY_MSG */ |
|
1745 DCC_TGTS eff_msg_tgts; /* effective value: 0=reported to DCC */ |
|
1746 DCC_TGTS new_msg_tgts; /* value after this */ |
|
1747 DCC_TGTS result_tgts; /* no embargo, ending, whitelist or # */ |
|
1748 |
|
1749 TMSG1(QUERY, "received %s", op_id_ip(q)); |
|
1750 if (!ck_clnt_id(q)) |
|
1751 return; |
|
1752 if (q->flags & Q_FG_UNTRUSTED) { |
|
1753 anon_msg("drop %s", from_id_ip(q, 1)); |
|
1754 return; |
|
1755 } |
|
1756 |
|
1757 /* an embargo of 0 seconds means we should only collect names */ |
|
1758 op = q->pkt.hdr.op; |
|
1759 if (op == DCC_OP_GREY_REPORT && grey_embargo == 0) |
|
1760 op = DCC_OP_GREY_WHITE; |
|
1761 |
|
1762 req_lim = start_work(q); |
|
1763 if (!req_lim) |
|
1764 return; |
|
1765 |
|
1766 /* Require |
|
1767 * the body checksum, |
|
1768 * the checksum of the (body,sender,target), |
|
1769 * and the checksum of the (source,sender,target) triple. |
|
1770 * Allow other checksums for whitelisting. */ |
|
1771 ip_tgts = 0; |
|
1772 body_known = grey_weak_body; |
|
1773 req_ck_ip = 0; |
|
1774 req_ck_body = 0; |
|
1775 req_ck_triple = 0; |
|
1776 req_ck_msg = 0; |
|
1777 msg_tgts = eff_msg_tgts = 0; |
|
1778 for (req = q->pkt.r.cks; req < req_lim; ++req) { |
|
1779 /* Note our main checksums of the greylist triple and |
|
1780 * the message body. Search the database for it later */ |
|
1781 if (DCC_CK_IS_GREY_TRIPLE(1, req->type)) { |
|
1782 req_ck_triple = req; |
|
1783 continue; |
|
1784 } |
|
1785 |
|
1786 if (!DCC_CK_OK_GREY_CLNT(req->type)) |
|
1787 continue; /* ignore unknown checksums */ |
|
1788 switch (req->type) { |
|
1789 case DCC_CK_IP: |
|
1790 req_ck_ip = req; |
|
1791 break; |
|
1792 case DCC_CK_BODY: |
|
1793 req_ck_body = req; |
|
1794 break; |
|
1795 case DCC_CK_GREY_MSG: |
|
1796 req_ck_msg = req; |
|
1797 break; |
|
1798 } |
|
1799 /* check for whitelisting and whether this is a new embargo */ |
|
1800 switch (db_lookup(dcc_emsg, req->type, req->sum, |
|
1801 0, MAX_HASH_ENTRIES, |
|
1802 &db_sts.hash, &db_sts.rcd, &found_ck)) { |
|
1803 case DB_FOUND_LATER: |
|
1804 case DB_FOUND_SYSERR: |
|
1805 DB_ERROR_MSG(dcc_emsg); |
|
1806 RIDC_BAD(q); |
|
1807 return; |
|
1808 case DB_FOUND_IT: |
|
1809 /* ignore deleted checksums */ |
|
1810 tgts = DB_TGTS_CK(found_ck); |
|
1811 if (tgts == 0) |
|
1812 continue; |
|
1813 |
|
1814 /* honor whitelisting */ |
|
1815 if (tgts == DCC_TGTS_GREY_WHITE |
|
1816 && op != DCC_OP_GREY_WHITE) { |
|
1817 op = DCC_OP_GREY_WHITE; |
|
1818 ++dccd_stats.respwhite; |
|
1819 } |
|
1820 |
|
1821 switch (req->type) { |
|
1822 case DCC_CK_BODY: |
|
1823 /* notice if the target body exists at all */ |
|
1824 body_known = 1; |
|
1825 break; |
|
1826 case DCC_CK_GREY_MSG: |
|
1827 msg_tgts = tgts; |
|
1828 if (msg_tgts != DCC_TGTS_TOO_MANY) { |
|
1829 /* this is an old embargo that has |
|
1830 * already been reported by the client |
|
1831 * to a normal DCC server */ |
|
1832 eff_msg_tgts = 1; |
|
1833 } |
|
1834 break; |
|
1835 case DCC_CK_IP: |
|
1836 ip_tgts = tgts; |
|
1837 break; |
|
1838 default: |
|
1839 break; |
|
1840 } |
|
1841 break; |
|
1842 case DB_FOUND_EMPTY: |
|
1843 case DB_FOUND_CHAIN: |
|
1844 case DB_FOUND_INTRUDER: |
|
1845 break; |
|
1846 } |
|
1847 } |
|
1848 if (!req_ck_triple) { |
|
1849 send_error(q, "missing %s checksum for %s", |
|
1850 DB_TYPE2STR(DCC_CK_GREY3), qop2str(q)); |
|
1851 return; |
|
1852 } |
|
1853 if (op == DCC_OP_GREY_REPORT && !grey_weak_body) { |
|
1854 if (!req_ck_body) { |
|
1855 send_error(q, "missing body checksum for %s", |
|
1856 qop2str(q)); |
|
1857 return; |
|
1858 } |
|
1859 if (!req_ck_msg) { |
|
1860 send_error(q, "missing %s checksum for %s", |
|
1861 DB_TYPE2STR(DCC_CK_GREY_MSG), qop2str(q)); |
|
1862 return; |
|
1863 } |
|
1864 } |
|
1865 |
|
1866 /* decide if the embargo should end */ |
|
1867 triple_tgts = search_grey(req_ck_triple, req_ck_body, body_known); |
|
1868 if (triple_tgts == DCC_TGTS_INVALID) { |
|
1869 NORESP_EMSG(q); /* broken database */ |
|
1870 return; |
|
1871 } |
|
1872 /* End existing embargo on a newly whitelisted sender so its |
|
1873 * messages are logged. |
|
1874 * Quietly prevent future embargos of whitelisted senders that have |
|
1875 * not been greylisted. |
|
1876 * Honor grey_weak_ip whitelisting even after it is turned off */ |
|
1877 if (triple_tgts >= DCC_TGTS_TOO_MANY) { |
|
1878 result_tgts = triple_tgts; |
|
1879 } else if (op == DCC_OP_GREY_WHITE) { |
|
1880 result_tgts = eff_msg_tgts ? DCC_TGTS_OK : DCC_TGTS_TOO_MANY; |
|
1881 } else if (ip_tgts == DCC_TGTS_TOO_MANY) { |
|
1882 result_tgts = DCC_TGTS_TOO_MANY; |
|
1883 } else { |
|
1884 result_tgts = triple_tgts; |
|
1885 } |
|
1886 |
|
1887 if (op == DCC_OP_GREY_QUERY) { |
|
1888 ++dccd_stats.queries; |
|
1889 |
|
1890 } else if (!(q->flags & Q_FG_RPT_OK)) { |
|
1891 ++dccd_stats.report_reject; |
|
1892 clnt_msg(q, "treat %s as query", from_id_ip(q, 1)); |
|
1893 ++dccd_stats.queries; |
|
1894 |
|
1895 } else { |
|
1896 /* add a report for this message */ |
|
1897 ++dccd_stats.reports; |
|
1898 new.srvr_id_auth = my_srvr_id; |
|
1899 new_ck = new.cks; |
|
1900 new.fgs_num_cks = 0; |
|
1901 if (result_tgts < DCC_TGTS_TOO_MANY) { |
|
1902 if (req_ck_body) { |
|
1903 new_ck->type_fgs = DCC_CK_BODY; |
|
1904 memcpy(new_ck->sum, req_ck_body->sum, |
|
1905 sizeof(new_ck->sum)); |
|
1906 ++new.fgs_num_cks; |
|
1907 ++new_ck; |
|
1908 } |
|
1909 new_msg_tgts = 1; |
|
1910 DB_TGTS_RCD_SET(&new, 1); |
|
1911 } else { |
|
1912 /* embargo now ending (DCC_TGTS_TOO_OK) |
|
1913 * or no embargo (DCC_TGTS_TOO_MANY) */ |
|
1914 if (grey_weak_ip && req_ck_ip) { |
|
1915 new_ck->type_fgs = DCC_CK_IP; |
|
1916 memcpy(new_ck->sum, req_ck_ip->sum, |
|
1917 sizeof(new_ck->sum)); |
|
1918 ++new.fgs_num_cks; |
|
1919 ++new_ck; |
|
1920 } |
|
1921 new_msg_tgts = 0; |
|
1922 DB_TGTS_RCD_SET(&new, DCC_TGTS_TOO_MANY); |
|
1923 } |
|
1924 |
|
1925 /* Include the GREY_MSG checksum in the database |
|
1926 * record for a new embargo. |
|
1927 * The message checksum lets an SMTP server report an |
|
1928 * embargoed message to the DCC before the embargo is over, |
|
1929 * but not report it more than once even if more than one |
|
1930 * SMTP client retransmits the message. |
|
1931 * |
|
1932 * If the GREY_MSG checksum does not exist in the |
|
1933 * database, then tell the DCC client the message is new |
|
1934 * and should be reported to the DCC server. We must put the |
|
1935 * the _GREY_MSG into the database so we will recognize |
|
1936 * the message as not new when it is retransmitted. |
|
1937 * |
|
1938 * If the GREY_MSG checksum exists and is not MANY, |
|
1939 * then we may have a retransmission of the message |
|
1940 * from another IP address. |
|
1941 * We need to tell the DCC client to not report to the |
|
1942 * DCC server. The new value for the CK_GREY_MSG checksum |
|
1943 * should be whatever we are using for the triple checksum. |
|
1944 * |
|
1945 * If the existing count for the GREY_MSG checksum is |
|
1946 * MANY, and the new value for triple checksum is not MANY, |
|
1947 * then we have a new copy of the message and a new embargo. |
|
1948 * We have a spammer with multiple senders instead of a |
|
1949 * legitimate multihomed SMTP client. We need to tell the |
|
1950 * DCC client to report to the DCC server. To remember |
|
1951 * that we told the DCC client to report to the DCC server, |
|
1952 * we must first delete the existing MANY report of the |
|
1953 * GREY_MSG checksum. */ |
|
1954 if (eff_msg_tgts != new_msg_tgts |
|
1955 && req_ck_msg) { |
|
1956 if (msg_tgts == DCC_TGTS_TOO_MANY |
|
1957 && !add_del(req_ck_msg)) { |
|
1958 NORESP_EMSG(q); |
|
1959 return; |
|
1960 } |
|
1961 new_ck->type_fgs = DCC_CK_GREY_MSG; |
|
1962 memcpy(new_ck->sum, req_ck_msg->sum, |
|
1963 sizeof(new_ck->sum)); |
|
1964 ++new.fgs_num_cks; |
|
1965 ++new_ck; |
|
1966 } |
|
1967 |
|
1968 /* Add the triple checksum if we are not whitelisting |
|
1969 * by the IP address |
|
1970 * or triple checksum is not new. |
|
1971 * We do not want to leave any dangling triples in the |
|
1972 * database */ |
|
1973 if (!(grey_weak_ip && req_ck_ip) |
|
1974 || result_tgts != DCC_TGTS_TOO_MANY) { |
|
1975 new_ck->type_fgs = DCC_CK_GREY3; |
|
1976 memcpy(new_ck->sum, req_ck_triple->sum, |
|
1977 sizeof(new_ck->sum)); |
|
1978 ++new.fgs_num_cks; |
|
1979 } |
|
1980 |
|
1981 get_ts(&new.ts); |
|
1982 if (!db_add_rcd(dcc_emsg, &new)) { |
|
1983 DB_ERROR_MSG(dcc_emsg); |
|
1984 RIDC_BAD(q); |
|
1985 return; |
|
1986 } |
|
1987 } |
|
1988 |
|
1989 /* In the result sent to the DCC client, |
|
1990 * the triple checksum is preceeded by the message checksum |
|
1991 * with a count of 0 if this is a new embargo. |
|
1992 * Targets of messages of new embargos should be counted among |
|
1993 * total targets in reports sent to DCC servers. After they |
|
1994 * have been included in such an early report to a DCC server, |
|
1995 * they should never be included again, except for bad reputations. */ |
|
1996 resp.msg = htonl(eff_msg_tgts); |
|
1997 |
|
1998 /* Answer SMTP DATA command greylist operations with the target |
|
1999 * count of the triple checksum: |
|
2000 * DCC_TGTS_OK if the embargo is just now being removed |
|
2001 * DCC_TGTS_TOO_MANY if there is no current embargo |
|
2002 * DCC_TGTS_GREY_WHITE if whitelisted. |
|
2003 * embargo # otherwise */ |
|
2004 resp.triple = htonl(result_tgts); |
|
2005 resp.hdr.len = sizeof(resp); |
|
2006 |
|
2007 fin_work(q, &resp.hdr); |
|
2008 } |
|
2009 |
|
2010 |
|
2011 |
|
2012 static time_t |
|
2013 picky_time(const QUEUE *q) |
|
2014 { |
|
2015 time_t ts, delta; |
|
2016 |
|
2017 /* If the request arrived while we were asleep, then the client's |
|
2018 * timestamp ought to be smaller than when select() finished and |
|
2019 * we think the request arrived. */ |
|
2020 ts = ntohl(q->pkt.d.date); |
|
2021 delta = ts - q->answer.tv_sec; |
|
2022 if (delta <= 0) |
|
2023 return delta; |
|
2024 |
|
2025 /* If the request arrived while we were handling some other request, |
|
2026 * then its timestamp can be larger than the select() wake-up time |
|
2027 * but should not be in the future. */ |
|
2028 delta = ts - db_time.tv_sec; |
|
2029 if (delta < 0) |
|
2030 delta = 0; |
|
2031 return delta; |
|
2032 } |
|
2033 |
|
2034 |
|
2035 |
|
2036 static u_char /* 0=refuse the bad guy, 1=continue */ |
|
2037 picky_admn(const QUEUE *q, u_char any_id, u_char any_time) |
|
2038 { |
|
2039 time_t delta; |
|
2040 |
|
2041 if ((q->flags & Q_FG_UNTRUSTED) |
|
2042 || (q->clnt_id != my_srvr_id && !any_id)) { |
|
2043 forget_error(q, "drop %s", from_id_ip(q, 1)); |
|
2044 return 0; |
|
2045 } |
|
2046 |
|
2047 if (any_id && any_time) |
|
2048 return 1; |
|
2049 |
|
2050 /* Demand a current timestamp to guard against replay attacks. |
|
2051 * This requires that administrators have clocks close to servers', |
|
2052 * and that network and server delays be reasonable. */ |
|
2053 delta = picky_time(q); |
|
2054 if (delta < -MAX_CMD_CLOCK_SKEW || delta > MAX_CMD_CLOCK_SKEW) { |
|
2055 send_error(q, "drop %s; timestamp off by %d seconds", |
|
2056 qop2str(q), (int)delta); |
|
2057 return 0; |
|
2058 } |
|
2059 |
|
2060 return 1; |
|
2061 } |
|
2062 |
|
2063 |
|
2064 |
|
2065 /* the database must be locked */ |
|
2066 static u_char /* 1=ok, 0=error sent to client */ |
|
2067 delete_sub(QUEUE *q, DCC_CK *del_ck, |
|
2068 u_char grey_spam) |
|
2069 { |
|
2070 DB_RCD_CK *rcd_ck; |
|
2071 char buf[80]; |
|
2072 DB_PTR prev; |
|
2073 DCC_TGTS tgts; |
|
2074 |
|
2075 buf[0] = '\0'; |
|
2076 switch (db_lookup(dcc_emsg, del_ck->type, del_ck->sum, |
|
2077 0, MAX_HASH_ENTRIES, |
|
2078 &db_sts.hash, &db_sts.rcd, &rcd_ck)) { |
|
2079 case DB_FOUND_EMPTY: |
|
2080 case DB_FOUND_CHAIN: |
|
2081 case DB_FOUND_INTRUDER: |
|
2082 /* finished if we have not greylisted the spammer */ |
|
2083 if (grey_spam) |
|
2084 return 1; |
|
2085 |
|
2086 /* ordinary deletions need a delete request added |
|
2087 * to the database and flooded */ |
|
2088 snprintf(buf, sizeof(buf), "\"%s %s\" not found to delete", |
|
2089 DB_TYPE2STR(del_ck->type), |
|
2090 dcc_ck2str_err(del_ck->type, del_ck->sum, 0)); |
|
2091 |
|
2092 if (del_ck->type == DCC_CK_SRVR_ID) { |
|
2093 send_error(q, "%s", buf); |
|
2094 return 0; |
|
2095 } |
|
2096 break; |
|
2097 |
|
2098 case DB_FOUND_IT: |
|
2099 tgts = DB_TGTS_CK(rcd_ck); |
|
2100 /* handle an ordinary delete request */ |
|
2101 if (!grey_spam) { |
|
2102 if (tgts == 0) |
|
2103 snprintf(buf, sizeof(buf), |
|
2104 "%s %s already deleted", |
|
2105 DB_TYPE2STR(del_ck->type), |
|
2106 dcc_ck2str_err(del_ck->type, |
|
2107 del_ck->sum, 0)); |
|
2108 break; |
|
2109 } |
|
2110 /* We are deleting a greylist checksum. |
|
2111 * If we are deleting very new greylist records, |
|
2112 * we can cheat and avoid adding to the database |
|
2113 * by scribbling over the records. |
|
2114 * If there is an older record that might have been flooded, |
|
2115 * we must add a delete request to the database |
|
2116 * that will itself be flooded. */ |
|
2117 for (;;) { |
|
2118 /* finished if the target has already been deleted */ |
|
2119 if (tgts == 0) |
|
2120 return 1; |
|
2121 if (db_sts.rcd.s.rptr < oflods_max_cur_pos |
|
2122 || oflods_max_cur_pos == 0) { |
|
2123 /* We need to add a delete request, because |
|
2124 * the record might have been flooded */ |
|
2125 break; |
|
2126 } |
|
2127 prev = DB_PTR_EX(rcd_ck->prev); |
|
2128 /* try to delete the entire greylist entry |
|
2129 * starting with the target triple checksum */ |
|
2130 do { |
|
2131 /* only if the embargo is not over */ |
|
2132 if (DB_TGTS_CK(rcd_ck) >= DCC_TGTS_TOO_MANY) |
|
2133 goto need_rcd; |
|
2134 DB_TGTS_CK_SET(rcd_ck, 0); |
|
2135 } while (--rcd_ck >= db_sts.rcd.d.r->cks); |
|
2136 DB_TGTS_RCD_SET(db_sts.rcd.d.r, 0); |
|
2137 SET_FLUSH_RCD_HDR(&db_sts.rcd, 1); |
|
2138 |
|
2139 /* stop after the last record */ |
|
2140 if (prev == DB_PTR_NULL) |
|
2141 return 1; |
|
2142 |
|
2143 rcd_ck = db_map_rcd_ck(dcc_emsg, &db_sts.rcd, |
|
2144 prev, del_ck->type); |
|
2145 if (!rcd_ck) { |
|
2146 NORESP_EMSG(q); |
|
2147 return 0; |
|
2148 } |
|
2149 tgts = DB_TGTS_CK(rcd_ck); |
|
2150 } |
|
2151 need_rcd:; |
|
2152 break; |
|
2153 |
|
2154 case DB_FOUND_LATER: |
|
2155 case DB_FOUND_SYSERR: |
|
2156 DB_ERROR_MSG(dcc_emsg); |
|
2157 RIDC_BAD(q); |
|
2158 return 0; |
|
2159 } |
|
2160 |
|
2161 /* Add the delete request to the database even if the |
|
2162 * checksum seems deleted or absent so that we will |
|
2163 * flood the delete request. This is required to ensure that |
|
2164 * records get deleted when they are created at one DCC server |
|
2165 * and deleted at another. */ |
|
2166 if (!add_del(del_ck)) |
|
2167 BUFCPY(buf, dcc_emsg); |
|
2168 |
|
2169 if (buf[0] != '\0') { |
|
2170 send_error(q, "%s", buf); |
|
2171 return 0; |
|
2172 } |
|
2173 |
|
2174 TMSG3(ADMN, "deleted %s %s%s", |
|
2175 DB_TYPE2STR(del_ck->type), |
|
2176 dcc_ck2str_err(del_ck->type, del_ck->sum, 0), |
|
2177 from_id_ip(q, 0)); |
|
2178 return 1; |
|
2179 } |
|
2180 |
|
2181 |
|
2182 |
|
2183 void |
|
2184 do_delete(QUEUE *q) |
|
2185 { |
|
2186 if (!ck_clnt_srvr_id(q)) |
|
2187 return; |
|
2188 if (!picky_admn(q, 0, 0)) |
|
2189 return; |
|
2190 /* if we've already answered, then just repeat ourselves */ |
|
2191 if (ridc_get(q)) { |
|
2192 repeat_resp(q); |
|
2193 return; |
|
2194 } |
|
2195 |
|
2196 dcc_error_msg("received %s", op_id_ip(q)); |
|
2197 ++dccd_stats.admin; |
|
2198 |
|
2199 if (q->pkt_len != sizeof(q->pkt.d)) { |
|
2200 send_error(q, "wrong packet length %d for %s", |
|
2201 q->pkt_len, qop2str(q)); |
|
2202 return; |
|
2203 } |
|
2204 if (q->pkt.d.ck.len != sizeof(q->pkt.d.ck)) { |
|
2205 send_error(q, "unknown checksum length %d", q->pkt.d.ck.len); |
|
2206 return; |
|
2207 } |
|
2208 if (!DCC_CK_OK_DB(grey_on, q->pkt.d.ck.type)) { |
|
2209 send_error(q, "unknown checkksum type %d", q->pkt.d.ck.type); |
|
2210 return; |
|
2211 } |
|
2212 |
|
2213 if (db_lock() < 0) { |
|
2214 NORESP_EMSG(q); |
|
2215 return; |
|
2216 } |
|
2217 if (delete_sub(q, &q->pkt.d.ck, 0)) { |
|
2218 /* We need to clean the database after a deletion |
|
2219 * to correct the totals of other checksums. |
|
2220 * Don't bother for reputations or server-ID declarations. */ |
|
2221 if (!DCC_CK_IS_REP_CMN(grey_on, q->pkt.d.ck.type) |
|
2222 && q->pkt.d.ck.type != DCC_CK_SRVR_ID) |
|
2223 need_del_dbclean = "checksum deleted"; |
|
2224 |
|
2225 send_ok(q); |
|
2226 } |
|
2227 } |
|
2228 |
|
2229 |
|
2230 |
|
2231 /* restore the embargo against a sender of spam */ |
|
2232 void |
|
2233 do_grey_spam(QUEUE *q) |
|
2234 { |
|
2235 TMSG1(QUERY, "received %s", op_id_ip(q)); |
|
2236 if (!ck_clnt_id(q)) |
|
2237 return; |
|
2238 if (q->flags & Q_FG_UNTRUSTED) { |
|
2239 anon_msg("drop %s", from_id_ip(q, 1)); |
|
2240 return; |
|
2241 } |
|
2242 |
|
2243 /* require the checksum of the (source,sender,target) triple */ |
|
2244 if (q->pkt_len != sizeof(q->pkt.gs)) { |
|
2245 send_error(q, "wrong packet length %d for %s", |
|
2246 q->pkt_len, qop2str(q)); |
|
2247 return; |
|
2248 } |
|
2249 if (q->pkt.gs.triple.type != DCC_CK_GREY3) { |
|
2250 send_error(q, "%s instead of %s for %s", |
|
2251 DB_TYPE2STR(q->pkt.gs.msg.type), |
|
2252 DB_TYPE2STR(DCC_CK_GREY3), |
|
2253 qop2str(q)); |
|
2254 return; |
|
2255 } |
|
2256 if (q->pkt.gs.triple.len != sizeof(q->pkt.gs.triple)) { |
|
2257 send_error(q, "unknown triple checksum length %d", |
|
2258 q->pkt.gs.ip.len); |
|
2259 return; |
|
2260 } |
|
2261 if (q->pkt.gs.msg.type != DCC_CK_GREY_MSG) { |
|
2262 send_error(q, "%s instead of %s for %s", |
|
2263 DB_TYPE2STR(q->pkt.gs.msg.type), |
|
2264 DB_TYPE2STR(DCC_CK_GREY_MSG), |
|
2265 qop2str(q)); |
|
2266 return; |
|
2267 } |
|
2268 if (q->pkt.gs.msg.len != sizeof(q->pkt.gs.msg)) { |
|
2269 send_error(q, "unknown msg checksum length %d", |
|
2270 q->pkt.gs.ip.len); |
|
2271 return; |
|
2272 } |
|
2273 if (q->pkt.gs.ip.type != DCC_CK_IP) { |
|
2274 send_error(q, "%s instead of %s for %s", |
|
2275 DB_TYPE2STR(q->pkt.gs.msg.type), |
|
2276 DB_TYPE2STR(DCC_CK_IP), |
|
2277 qop2str(q)); |
|
2278 return; |
|
2279 } |
|
2280 if (q->pkt.gs.ip.len != sizeof(q->pkt.gs.ip)) { |
|
2281 send_error(q, "unknown IP checksum length %d", |
|
2282 q->pkt.gs.ip.len); |
|
2283 return; |
|
2284 } |
|
2285 |
|
2286 if (db_lock() < 0) { |
|
2287 NORESP_EMSG(q); |
|
2288 return; |
|
2289 } |
|
2290 if (delete_sub(q, &q->pkt.gs.ip, 1) |
|
2291 && delete_sub(q, &q->pkt.gs.triple, 1) |
|
2292 && delete_sub(q, &q->pkt.gs.msg, 1)) |
|
2293 send_ok(q); |
|
2294 } |
|
2295 |
|
2296 |
|
2297 |
|
2298 static void |
|
2299 do_flod(QUEUE *q) |
|
2300 { |
|
2301 DCC_ADMN_RESP check; |
|
2302 int print_len; |
|
2303 u_int32_t val, arg; |
|
2304 DCC_AOP_FLODS fop; |
|
2305 FLOD_MMAP *mp; |
|
2306 OFLOD_INFO *ofp; |
|
2307 u_char loaded, found_it; |
|
2308 |
|
2309 val = ntohl(q->pkt.ad.val1); |
|
2310 fop = val % 256; |
|
2311 arg = val / 256; |
|
2312 |
|
2313 if (fop != DCC_AOP_FLOD_LIST) { |
|
2314 if (!picky_admn(q, fop == DCC_AOP_FLOD_STATS, 0)) |
|
2315 return; |
|
2316 } |
|
2317 |
|
2318 switch (fop) { |
|
2319 case DCC_AOP_FLOD_CHECK: |
|
2320 /* `cdcc "flood check"` forces occasional defenses of |
|
2321 * our server-ID */ |
|
2322 if (host_id_next > db_time.tv_sec + 60) |
|
2323 host_id_next = db_time.tv_sec; |
|
2324 |
|
2325 next_flods_ck = 0; |
|
2326 if (0 >= check_load_ids(0)) { |
|
2327 dcc_error_msg("%s", dcc_emsg); |
|
2328 send_error(q, "%s", dcc_emsg); |
|
2329 return; |
|
2330 } |
|
2331 flod_stats_printf(check.val.string, sizeof(check.val.string), |
|
2332 (!FLODS_OK() || flods_st == FLODS_ST_OFF) |
|
2333 ? 0 |
|
2334 : (flods_st != FLODS_ST_ON) ? 1 |
|
2335 : 2, |
|
2336 oflods.total, oflods.open, iflods.open); |
|
2337 check.hdr.len = (strlen(check.val.string) |
|
2338 + sizeof(check)-sizeof(check.val)); |
|
2339 check.hdr.op = DCC_OP_ADMN; |
|
2340 send_resp(q, &check.hdr, 0); |
|
2341 flods_ck(1); |
|
2342 check_blacklist_file(); |
|
2343 return; |
|
2344 |
|
2345 case DCC_AOP_FLOD_SHUTDOWN: |
|
2346 if (ridc_get(q)) { |
|
2347 repeat_resp(q); |
|
2348 return; |
|
2349 } |
|
2350 ++flods_off; |
|
2351 flods_stop("shutdown flooding", 0); |
|
2352 send_ok(q); |
|
2353 return; |
|
2354 |
|
2355 case DCC_AOP_FLOD_HALT: |
|
2356 if (ridc_get(q)) { |
|
2357 repeat_resp(q); |
|
2358 return; |
|
2359 } |
|
2360 ++flods_off; |
|
2361 flods_stop("stop flooding", 1); |
|
2362 send_ok(q); |
|
2363 return; |
|
2364 |
|
2365 case DCC_AOP_FLOD_RESUME: |
|
2366 if (ridc_get(q)) { |
|
2367 repeat_resp(q); |
|
2368 return; |
|
2369 } |
|
2370 if (0 >= check_load_ids(0)) { |
|
2371 dcc_error_msg("%s", dcc_emsg); |
|
2372 send_error(q, "%s", dcc_emsg); |
|
2373 return; |
|
2374 } |
|
2375 if (flods_off) { |
|
2376 flods_off = 0; |
|
2377 flods_restart("resume flooding", 0); |
|
2378 } |
|
2379 send_ok(q); |
|
2380 flods_ck(0); |
|
2381 return; |
|
2382 |
|
2383 case DCC_AOP_FLOD_REWIND: |
|
2384 if (ridc_get(q)) { |
|
2385 repeat_resp(q); |
|
2386 return; |
|
2387 } |
|
2388 if (flod_mmaps) { |
|
2389 loaded = 0; |
|
2390 } else if (!load_flod(0)) { |
|
2391 send_error(q, "too busy to rewind floods"); |
|
2392 return; |
|
2393 } else { |
|
2394 loaded = 1; |
|
2395 } |
|
2396 found_it = (arg == DCC_ID_INVALID); |
|
2397 for (mp = flod_mmaps->mmaps; |
|
2398 mp <= LAST(flod_mmaps->mmaps); |
|
2399 ++mp) { |
|
2400 if (arg == DCC_ID_INVALID |
|
2401 || mp->rem_id == arg) { |
|
2402 mp->flags |= FLODMAP_FG_NEED_REWIND; |
|
2403 mp->flags &= ~FLODMAP_FG_FFWD_IN; |
|
2404 dcc_trace_msg("rewind flood from server-ID %d", |
|
2405 arg); |
|
2406 found_it = 1; |
|
2407 } |
|
2408 } |
|
2409 if (!found_it) { |
|
2410 send_error(q, "unknown server-ID %d for %s", |
|
2411 arg, qop2str(q)); |
|
2412 } else { |
|
2413 send_ok(q); |
|
2414 flods_ck(0); |
|
2415 } |
|
2416 if (loaded) |
|
2417 oflods_clear(); |
|
2418 return; |
|
2419 |
|
2420 case DCC_AOP_FLOD_LIST: |
|
2421 loaded = !flod_mmaps && load_flod(0); |
|
2422 if (flod_mmaps) { |
|
2423 print_len = flods_list(check.val.string, |
|
2424 sizeof(check.val.string), |
|
2425 (q->flags & Q_FG_UNTRUSTED)!=0); |
|
2426 } else { |
|
2427 /* it is not an error if map is locked, because |
|
2428 * dbclean uses this operation to see if we are |
|
2429 * listening */ |
|
2430 print_len = snprintf(check.val.string, |
|
2431 ISZ(check.val.string), |
|
2432 "too busy to list floods"); |
|
2433 if (print_len > ISZ(check.val.string)) |
|
2434 print_len = ISZ(check.val.string); |
|
2435 } |
|
2436 check.hdr.len = (print_len |
|
2437 + sizeof(check)-sizeof(check.val)); |
|
2438 check.hdr.op = DCC_OP_ADMN; |
|
2439 send_resp(q, &check.hdr, 0); |
|
2440 if (loaded) |
|
2441 oflods_clear(); |
|
2442 return; |
|
2443 |
|
2444 case DCC_AOP_FLOD_STATS: |
|
2445 case DCC_AOP_FLOD_STATS_CLEAR: |
|
2446 print_len = flod_stats(check.val.string, |
|
2447 sizeof(check.val.string), |
|
2448 arg, |
|
2449 fop == DCC_AOP_FLOD_STATS_CLEAR); |
|
2450 if (print_len < 0) { |
|
2451 send_error(q, "too busy to find flood stats"); |
|
2452 return; |
|
2453 } |
|
2454 check.hdr.len = print_len + sizeof(check)-sizeof(check.val); |
|
2455 check.hdr.op = DCC_OP_ADMN; |
|
2456 send_resp(q, &check.hdr, 0); |
|
2457 flods_ck(0); |
|
2458 return; |
|
2459 |
|
2460 case DCC_AOP_FLOD_FFWD_IN: |
|
2461 case DCC_AOP_FLOD_FFWD_OUT: |
|
2462 if (ridc_get(q)) { |
|
2463 repeat_resp(q); |
|
2464 return; |
|
2465 } |
|
2466 if (flod_mmaps) { |
|
2467 loaded = 0; |
|
2468 } else if (!load_flod(0)) { |
|
2469 send_error(q, "too busy to fast-forward floods"); |
|
2470 return; |
|
2471 } else { |
|
2472 loaded = 1; |
|
2473 } |
|
2474 ofp = oflods.infos; |
|
2475 for (;;) { |
|
2476 mp = ofp->mp; |
|
2477 if (mp->rem_id == arg) { |
|
2478 /* found the target */ |
|
2479 if (fop == DCC_AOP_FLOD_FFWD_OUT) { |
|
2480 ofp->cur_pos = db_csize; |
|
2481 if (ofp->soc < 0) |
|
2482 mp->confirm_pos = db_csize; |
|
2483 dcc_trace_msg("fast forward flood to" |
|
2484 " server-ID %d", |
|
2485 arg); |
|
2486 } else { |
|
2487 mp->flags |= FLODMAP_FG_FFWD_IN; |
|
2488 mp->flags &= ~FLODMAP_FG_NEED_REWIND; |
|
2489 } |
|
2490 send_ok(q); |
|
2491 if (!loaded) |
|
2492 flods_ck(0); |
|
2493 break; |
|
2494 } |
|
2495 if (++ofp > LAST(oflods.infos)) { |
|
2496 send_error(q, "unknown server-ID %d for %s", |
|
2497 arg, qop2str(q)); |
|
2498 break; |
|
2499 } |
|
2500 } |
|
2501 if (loaded) |
|
2502 oflods_clear(); |
|
2503 return; |
|
2504 } |
|
2505 |
|
2506 send_error(q, "unrecognized %s value %d", qop2str(q), fop); |
|
2507 } |
|
2508 |
|
2509 |
|
2510 |
|
2511 void |
|
2512 stats_clear(void) |
|
2513 { |
|
2514 OFLOD_INFO *ofp; |
|
2515 |
|
2516 memset(&dccd_stats, 0, sizeof(dccd_stats)); |
|
2517 for (ofp = oflods.infos; ofp <= LAST(oflods.infos); ++ofp) { |
|
2518 if (ofp->rem_hostname[0] == '\0') |
|
2519 continue; |
|
2520 |
|
2521 /* The counts reported to `cdcc stats` are sums |
|
2522 * of the dccd_stats and ofp->cnts values. Bias |
|
2523 * the dccd_stats values by the current ofp->cnts values |
|
2524 * so the reported counts will be zero. When the flooding |
|
2525 * connection is closed, the ofp->cnts values will be added |
|
2526 * to the dccd_stats values. */ |
|
2527 dccd_stats.iflod_total -= ofp->cnts.total; |
|
2528 dccd_stats.iflod_accepted -= ofp->cnts.accepted; |
|
2529 dccd_stats.iflod_stale -= ofp->lc.stale.cur; |
|
2530 dccd_stats.iflod_dup -= ofp->lc.dup.cur; |
|
2531 dccd_stats.iflod_wlist -= ofp->lc.wlist.cur; |
|
2532 dccd_stats.iflod_not_deleted -= ofp->lc.not_deleted.cur; |
|
2533 } |
|
2534 |
|
2535 q_delays_start = 0; |
|
2536 |
|
2537 memset(&db_stats, 0, sizeof(db_stats)); |
|
2538 dccd_stats.reset = db_time; |
|
2539 } |
|
2540 |
|
2541 |
|
2542 |
|
2543 static u_char /* 1=sent 0=something wrong */ |
|
2544 stats_send(QUEUE *q) |
|
2545 { |
|
2546 DCC_ADMN_RESP stats; |
|
2547 char tbuf[80]; |
|
2548 OFLOD_INFO *ofp; |
|
2549 IFLOD_INFO *ifp; |
|
2550 int oflods_connecting, iflods_connecting; |
|
2551 SCNTR iflod_total, iflod_accepted, iflod_stale; |
|
2552 SCNTR iflod_dup, iflod_wlist, iflod_not_deleted; |
|
2553 char flod_buf[60]; |
|
2554 char clients_reset[40], reset_buf[36], now_buf[20]; |
|
2555 int clients; |
|
2556 int age; |
|
2557 const char *client_ovf; |
|
2558 int blen, plen, len; |
|
2559 |
|
2560 tbuf[0] = '\0'; |
|
2561 if (dccd_tracemask & DCC_TRACE_ADMN_BIT) |
|
2562 strcat(tbuf, "ADMN "); |
|
2563 if (dccd_tracemask & DCC_TRACE_ANON_BIT) |
|
2564 strcat(tbuf, "ANON "); |
|
2565 if (dccd_tracemask & DCC_TRACE_CLNT_BIT) |
|
2566 strcat(tbuf, "CLNT "); |
|
2567 if (dccd_tracemask & DCC_TRACE_RLIM_BIT) |
|
2568 strcat(tbuf, "RLIM "); |
|
2569 if (dccd_tracemask & DCC_TRACE_QUERY_BIT) |
|
2570 strcat(tbuf, "QUERY "); |
|
2571 if (dccd_tracemask & DCC_TRACE_RIDC_BIT) |
|
2572 strcat(tbuf, "RIDC "); |
|
2573 if (dccd_tracemask & DCC_TRACE_FLOD_BIT) |
|
2574 strcat(tbuf, "FLOOD "); |
|
2575 if (dccd_tracemask & DCC_TRACE_FLOD2_BIT) |
|
2576 strcat(tbuf, "FLOOD2 "); |
|
2577 if (dccd_tracemask & DCC_TRACE_IDS_BIT) |
|
2578 strcat(tbuf, "IDS "); |
|
2579 if (dccd_tracemask & DCC_TRACE_BL_BIT) |
|
2580 strcat(tbuf, "BL "); |
|
2581 if (dccd_tracemask & DCC_TRACE_DB_BIT) |
|
2582 strcat(tbuf, "DB "); |
|
2583 if (dccd_tracemask & DCC_TRACE_WLIST_BIT) |
|
2584 strcat(tbuf, "WLIST "); |
|
2585 |
|
2586 clients = clients_get(0, 0, 0, 0, 0, 0, 0); |
|
2587 if (clients >= 0) { |
|
2588 client_ovf = ""; |
|
2589 } else { |
|
2590 client_ovf = ">"; |
|
2591 clients = -clients; |
|
2592 } |
|
2593 age = db_time.tv_sec - clients_cleared; |
|
2594 if (age <= 24*60*60) { |
|
2595 dcc_time2str(clients_reset, sizeof(clients_reset), |
|
2596 "since %X", clients_cleared); |
|
2597 } else if (age <= 3*24*60*60) { |
|
2598 snprintf(clients_reset, sizeof(clients_reset), |
|
2599 "in %d hours", (age + 60*60/2) / (60*60)); |
|
2600 } else { |
|
2601 snprintf(clients_reset, sizeof(clients_reset), |
|
2602 "in %d days", (age + 24*60*60/2) / (24*60*60)); |
|
2603 } |
|
2604 |
|
2605 oflods_connecting = 0; |
|
2606 iflod_total = dccd_stats.iflod_total; |
|
2607 iflod_accepted = dccd_stats.iflod_accepted; |
|
2608 iflod_stale = dccd_stats.iflod_stale; |
|
2609 iflod_dup = dccd_stats.iflod_dup; |
|
2610 iflod_wlist = dccd_stats.iflod_wlist; |
|
2611 iflod_not_deleted = dccd_stats.iflod_not_deleted; |
|
2612 for (ofp = oflods.infos; ofp <= LAST(oflods.infos); ++ofp) { |
|
2613 if (ofp->soc >= 0 && !(ofp->flags & OFLOD_FG_CONNECTED)) |
|
2614 ++oflods_connecting; |
|
2615 iflod_total += ofp->cnts.total; |
|
2616 iflod_accepted += ofp->cnts.accepted; |
|
2617 iflod_stale += ofp->lc.stale.cur; |
|
2618 iflod_dup += ofp->lc.dup.cur; |
|
2619 iflod_wlist += ofp->lc.wlist.cur; |
|
2620 iflod_not_deleted += ofp->lc.not_deleted.cur; |
|
2621 } |
|
2622 iflods_connecting = 0; |
|
2623 for (ifp = iflods.infos; ifp <= LAST(iflods.infos); ++ifp) { |
|
2624 if (ifp->soc >= 0 && !(ifp->flags & IFLOD_FG_VERS_CK)) |
|
2625 ++iflods_connecting; |
|
2626 } |
|
2627 dcc_time2str(reset_buf, sizeof(reset_buf),"%b %d %X", |
|
2628 dccd_stats.reset.tv_sec); |
|
2629 dcc_time2str(now_buf, sizeof(now_buf), "%b %d %X %Z", |
|
2630 db_time.tv_sec); |
|
2631 |
|
2632 blen = min(sizeof(stats.val.string), ntohl(q->pkt.ad.val1)); |
|
2633 plen = snprintf(stats.val.string, blen, |
|
2634 " version "DCC_VERSION" %s%s%stracing %s\n" |
|
2635 "%7d hash entries %6d used "L_DWPAT(9)" DB bytes\n" |
|
2636 "%5d ms delay "L_DPAT" NOPs "L_DPAT"" |
|
2637 " ADMN "L_DPAT" query %s%d clients %s\n", |
|
2638 |
|
2639 db_minimum_map ? "DB UNLOCKED " : "", |
|
2640 query_only ? "Q-mode " : "", |
|
2641 grey_on ? "greylist " : "", |
|
2642 tbuf[0] ? tbuf : "nothing", |
|
2643 |
|
2644 HADDR2LEN(db_hash_len), HADDR2LEN(db_hash_used), db_csize, |
|
2645 |
|
2646 avg_q_delay_ms(q), |
|
2647 |
|
2648 dccd_stats.nops, dccd_stats.admin, dccd_stats.queries, |
|
2649 client_ovf, clients, clients_reset); |
|
2650 if (plen >= blen) |
|
2651 plen = blen-1; |
|
2652 blen -= plen; |
|
2653 |
|
2654 if (grey_on) { |
|
2655 len = snprintf(&stats.val.string[plen], blen, |
|
2656 L_DWPAT(7)" reports "L_DWPAT(2)" whitelisted\n", |
|
2657 |
|
2658 dccd_stats.reports, |
|
2659 dccd_stats.respwhite); |
|
2660 |
|
2661 } else { |
|
2662 len = snprintf(&stats.val.string[plen], blen, |
|
2663 L_DWPAT(8)" reports " |
|
2664 L_DWPAT(7)">10 " |
|
2665 L_DWPAT(7)">100 " |
|
2666 L_DWPAT(7)">1000 " |
|
2667 L_DWPAT(7)" many\n" |
|
2668 " answers "L_DWPAT(7)">10 " |
|
2669 L_DWPAT(7)">100 " |
|
2670 L_DWPAT(7)">1000 " |
|
2671 L_DWPAT(7)" many\n", |
|
2672 |
|
2673 dccd_stats.reports, |
|
2674 (dccd_stats.report10 + dccd_stats.report100 |
|
2675 + dccd_stats.report1000 + dccd_stats.reportmany), |
|
2676 (dccd_stats.report100 + dccd_stats.report1000 |
|
2677 + dccd_stats.reportmany), |
|
2678 dccd_stats.report1000 + dccd_stats.reportmany, |
|
2679 dccd_stats.reportmany, |
|
2680 |
|
2681 (dccd_stats.resp10 + dccd_stats.resp100 |
|
2682 + dccd_stats.resp1000 + dccd_stats.respmany), |
|
2683 dccd_stats.resp100 + dccd_stats.resp1000 + dccd_stats.respmany, |
|
2684 dccd_stats.resp1000 + dccd_stats.respmany, |
|
2685 dccd_stats.respmany); |
|
2686 } |
|
2687 if (len >= blen) |
|
2688 len = blen-1; |
|
2689 blen -= len; |
|
2690 plen += len; |
|
2691 |
|
2692 len = snprintf(&stats.val.string[plen], blen, |
|
2693 L_DWPAT(8)" bad op " |
|
2694 L_DWPAT(4)" passwd " |
|
2695 L_DWPAT(6)" blist " |
|
2696 L_DWPAT(4)" reject " |
|
2697 L_DWPAT(6)" retrans\n", |
|
2698 dccd_stats.bad_op, dccd_stats.bad_passwd, dccd_stats.blist, |
|
2699 dccd_stats.send_error, dccd_stats.report_retrans); |
|
2700 if (len >= blen) |
|
2701 len = blen-1; |
|
2702 blen -= len; |
|
2703 plen += len; |
|
2704 |
|
2705 if (!grey_on) { |
|
2706 len = snprintf(&stats.val.string[plen], blen, |
|
2707 L_DWPAT(8)" answers rate-limited " |
|
2708 L_DWPAT(4)" anon " |
|
2709 L_DWPAT(5)" reports rejected\n", |
|
2710 dccd_stats.rl, dccd_stats.anon_rl, dccd_stats.report_reject); |
|
2711 if (len >= blen) |
|
2712 len = blen-1; |
|
2713 blen -= len; |
|
2714 plen += len; |
|
2715 } |
|
2716 |
|
2717 len = snprintf(&stats.val.string[plen], blen, |
|
2718 " %s " |
|
2719 L_DWPAT(8)" total flooded in\n" |
|
2720 L_DWPAT(8)" accepted " |
|
2721 L_DWPAT(6)" stale " |
|
2722 L_DWPAT(8)" dup " |
|
2723 L_DWPAT(5)" white " |
|
2724 L_DPAT" delete\n" |
|
2725 L_DWPAT(8)" reports added between %s and %s", |
|
2726 flod_stats_printf(flod_buf, sizeof(flod_buf), |
|
2727 (db_minimum_map || flods_st == FLODS_ST_OFF) ? 0 |
|
2728 : (flods_st != FLODS_ST_ON) ? 1 |
|
2729 : 2, |
|
2730 oflods.total, |
|
2731 oflods.open - oflods_connecting, |
|
2732 iflods.open - iflods_connecting), |
|
2733 iflod_total, |
|
2734 iflod_accepted, iflod_stale, iflod_dup, |
|
2735 iflod_wlist, iflod_not_deleted, |
|
2736 |
|
2737 dccd_stats.adds+db_stats.adds, reset_buf, now_buf); |
|
2738 if (len >= blen) |
|
2739 len = blen-1; |
|
2740 blen -= len; |
|
2741 plen += len; |
|
2742 |
|
2743 stats.hdr.len = plen + sizeof(stats)-sizeof(stats.val); |
|
2744 stats.hdr.op = DCC_OP_ADMN; |
|
2745 send_resp(q, &stats.hdr, 0); |
|
2746 return 1; |
|
2747 } |
|
2748 |
|
2749 |
|
2750 |
|
2751 void |
|
2752 timestamp_send(const QUEUE *q) |
|
2753 { |
|
2754 time_t delta; |
|
2755 DCC_ADMN_RESP msg; |
|
2756 int blen, plen; |
|
2757 |
|
2758 delta = picky_time(q); |
|
2759 |
|
2760 blen = min(sizeof(msg.val.string), ntohl(q->pkt.ad.val1)); |
|
2761 if (delta < -MAX_CMD_CLOCK_SKEW || delta > MAX_CMD_CLOCK_SKEW) { |
|
2762 if (delta < -MAX_FLOD_CLOCK_SKEW |
|
2763 || delta > MAX_FLOD_CLOCK_SKEW) { |
|
2764 plen = snprintf(msg.val.string, blen, |
|
2765 " clocks differ by about %d seconds" |
|
2766 "\n which is more than the" |
|
2767 " maximum allowed for flooding, %d", |
|
2768 (int)delta, MAX_FLOD_CLOCK_SKEW); |
|
2769 } else { |
|
2770 plen = snprintf(msg.val.string, blen, |
|
2771 " clocks differ by about %d seconds" |
|
2772 "\n which is more than the" |
|
2773 " maximum allowed for commands, %d", |
|
2774 (int)delta, MAX_CMD_CLOCK_SKEW); |
|
2775 } |
|
2776 } else { |
|
2777 plen = snprintf(msg.val.string, blen, |
|
2778 " clocks differ by about %d seconds", |
|
2779 (int)delta); |
|
2780 } |
|
2781 |
|
2782 msg.hdr.len = plen + sizeof(msg)-sizeof(msg.val); |
|
2783 msg.hdr.op = DCC_OP_ADMN; |
|
2784 send_resp(q, &msg.hdr, 0); |
|
2785 } |
|
2786 |
|
2787 |
|
2788 |
|
2789 void |
|
2790 do_nop(QUEUE *q) |
|
2791 { |
|
2792 /* respond immediately to even anonymous NOPs so that clients |
|
2793 * that are confused about passwords and whether they are anonymous |
|
2794 * do not retransmit unnecessarily */ |
|
2795 TMSG1(ADMN, "received %s", op_id_ip(q)); |
|
2796 ++dccd_stats.nops; |
|
2797 |
|
2798 if (!ck_clnt_srvr_id(q)) { |
|
2799 ++q->rl->d.nops; |
|
2800 return; |
|
2801 } |
|
2802 |
|
2803 ++q->rl->d.nops; |
|
2804 send_ok(q); |
|
2805 } |
|
2806 |
|
2807 |
|
2808 |
|
2809 /* deal with an adminstative request */ |
|
2810 void |
|
2811 do_admn(QUEUE *q) |
|
2812 { |
|
2813 u_int32_t val1; |
|
2814 DCC_ADMN_RESP resp; |
|
2815 int len, offset; |
|
2816 u_int32_t adelay_ms; |
|
2817 struct in6_addr addr6, mask6; |
|
2818 const struct in6_addr *addr6p, *mask6p; |
|
2819 |
|
2820 val1 = ntohl(q->pkt.ad.val1); |
|
2821 TMSG3(ADMN, "received val2=%#x val3=%#x in %s", |
|
2822 q->pkt.ad.val2, q->pkt.ad.val3, op_id_ip(q)); |
|
2823 ++dccd_stats.admin; |
|
2824 |
|
2825 if (!ck_clnt_srvr_id(q)) |
|
2826 return; |
|
2827 |
|
2828 if (q->pkt_len != DCC_ADMN_REQ_MIN_SIZE |
|
2829 && (q->pkt_len != (DCC_ADMN_REQ_MIN_SIZE |
|
2830 + sizeof(DCC_AOP_CLIENTS_CIDR)) |
|
2831 || (q->pkt.ad.aop != DCC_AOP_CLIENTS |
|
2832 && q->pkt.ad.aop != DCC_AOP_CLIENTS_ID))) { |
|
2833 send_error(q, "%s size = %d", qop2str(q), q->pkt_len); |
|
2834 return; |
|
2835 } |
|
2836 |
|
2837 switch ((DCC_AOPS)q->pkt.ad.aop) { |
|
2838 case DCC_AOP_STOP: /* stop gracefully */ |
|
2839 if (!picky_admn(q, 0, 0)) |
|
2840 return; |
|
2841 if (ridc_get(q)) { |
|
2842 repeat_resp(q); |
|
2843 return; |
|
2844 } |
|
2845 if (!stopint) { |
|
2846 stopint = -1; |
|
2847 next_flods_ck = 0; |
|
2848 } |
|
2849 send_ok(q); |
|
2850 /* fsync() or let the database be wrong if asked */ |
|
2851 if (val1 != 0) |
|
2852 stop_mode = val1; |
|
2853 return; |
|
2854 |
|
2855 case DCC_AOP_DB_UNLOAD: |
|
2856 if (!picky_admn(q, 0, 0)) |
|
2857 return; |
|
2858 /* repeat previous answer to repeated question */ |
|
2859 if (ridc_get(q)) { |
|
2860 repeat_resp(q); |
|
2861 return; |
|
2862 } |
|
2863 /* unlike dbclean, dblist starts looking at the data |
|
2864 * immediately, so we cannot answer before flushing */ |
|
2865 if (val1 == 0) { |
|
2866 dcc_trace_msg("database flush started"); |
|
2867 rel_db_states(); |
|
2868 db_minimum_map = 1; |
|
2869 db_unload(0, 0); |
|
2870 dcc_trace_msg("database flushed; buffering off"); |
|
2871 } else { |
|
2872 db_minimum_map = 0; |
|
2873 dcc_trace_msg("database buffering on"); |
|
2874 } |
|
2875 send_ok(q); |
|
2876 return; |
|
2877 |
|
2878 case DCC_AOP_FLOD: /* control flooding */ |
|
2879 do_flod(q); |
|
2880 return; |
|
2881 |
|
2882 case DCC_AOP_DB_CLEAN: /* start switch to new database */ |
|
2883 if (!picky_admn(q, 0, 0)) |
|
2884 return; |
|
2885 /* repeat previous answer to repeated question */ |
|
2886 if (ridc_get(q)) { |
|
2887 repeat_resp(q); |
|
2888 return; |
|
2889 } |
|
2890 if (!flods_off || oflods.total != 0) { |
|
2891 send_error(q, "flooding not stopped before %s", |
|
2892 qop2str(q)); |
|
2893 return; |
|
2894 } |
|
2895 send_ok(q); /* asnwer now before we stall */ |
|
2896 dcc_trace_msg("database cleaning begun"); |
|
2897 next_flods_ck = 0; |
|
2898 /* don't start our own cleaning */ |
|
2899 del_dbclean_next = db_time.tv_sec + DEL_DBCLEAN_SECS; |
|
2900 dbclean_limit = db_time.tv_sec + dbclean_limit_secs; |
|
2901 /* Dbclean expects us to remove its separate hold on flooding |
|
2902 * so that it will not need to talk to us after telling us |
|
2903 * to close the old database. This because we might stall |
|
2904 * on some systems with lame mmap() support including BSD/OS, |
|
2905 * for minutes in close(). |
|
2906 * It might be nice to be able to turn off flooding before |
|
2907 * dbclean is run and have it remain off when dbclean |
|
2908 * finishes. However, the need for that that is very rare |
|
2909 * and there are mysterious cases where flooding gets |
|
2910 * turned off by dbclean and never restored. */ |
|
2911 flods_off = 0; |
|
2912 /* release and unmap buffers, possibly stalling */ |
|
2913 db_minimum_map = 1; |
|
2914 rel_db_states(); |
|
2915 db_unload(0, 0); |
|
2916 return; |
|
2917 |
|
2918 case DCC_AOP_DB_NEW: /* finish switch to new database */ |
|
2919 if (!picky_admn(q, 0, 0)) |
|
2920 return; |
|
2921 if (ridc_get(q)) { |
|
2922 repeat_resp(q); |
|
2923 return; |
|
2924 } |
|
2925 if (!db_minimum_map) { |
|
2926 send_error(q, "%s received before %s", |
|
2927 qop2str(q), |
|
2928 dcc_aop2str(0, 0, DCC_AOP_DB_CLEAN, 0)); |
|
2929 return; |
|
2930 } |
|
2931 /* send "ok" now because we may stall waiting to reopen */ |
|
2932 send_ok(q); |
|
2933 db_close(1); |
|
2934 dccd_stats.adds += db_stats.adds; |
|
2935 if (!dccd_db_open(DB_OPEN_LOCK_WAIT)) |
|
2936 dcc_logbad(dcc_ex_code, |
|
2937 "could not restart database %s: %s", |
|
2938 db_nm, dcc_emsg); |
|
2939 dcc_trace_msg(DCC_VERSION" database %s reopened with %s", |
|
2940 db_nm, db_window_size_str); |
|
2941 flods_off = 0; |
|
2942 flods_restart("database reopened", 0); |
|
2943 next_flods_ck = 0; /* possibly reap dbclean child */ |
|
2944 if (0 >= check_load_ids(2)) |
|
2945 dcc_error_msg("%s", dcc_emsg); |
|
2946 return; |
|
2947 |
|
2948 case DCC_AOP_STATS: /* return counters */ |
|
2949 /* we cannot just repeat ourselves for retransmissions, |
|
2950 * because the answer is too big to save */ |
|
2951 stats_send(q); |
|
2952 return; |
|
2953 |
|
2954 case DCC_AOP_STATS_CLEAR: /* return and then zero counters */ |
|
2955 if (!picky_admn(q, 0, 0)) |
|
2956 return; |
|
2957 /* we cannot just repeat ourselves for retransmissions, |
|
2958 * because the answer is too big to save */ |
|
2959 if (stats_send(q)) { |
|
2960 clients_clear(); |
|
2961 stats_clear(); |
|
2962 } |
|
2963 return; |
|
2964 |
|
2965 case DCC_AOP_TRACE_ON: |
|
2966 case DCC_AOP_TRACE_OFF: |
|
2967 if (!picky_admn(q, 0, 0)) |
|
2968 return; |
|
2969 /* it is idempotent, but suppress duplicate trace messages */ |
|
2970 if (ridc_get(q)) { |
|
2971 repeat_resp(q); |
|
2972 return; |
|
2973 } |
|
2974 /* log trace changes even when tracing is off */ |
|
2975 if (!(DCC_TRACE_ADMN_BIT & dccd_tracemask)) |
|
2976 dcc_trace_msg("received %s", op_id_ip(q)); |
|
2977 if ((val1 & ~DCC_TRACE_BITS) != 0 || val1 == 0) { |
|
2978 send_error(q, "invalid trace bits %#x", val1); |
|
2979 return; |
|
2980 } |
|
2981 if (q->pkt.ad.aop == DCC_AOP_TRACE_OFF) { |
|
2982 dccd_tracemask &= ~val1; |
|
2983 } else { |
|
2984 dccd_tracemask |= val1; |
|
2985 /* do not suppress the next duplicated flood message */ |
|
2986 if (val1 & DCC_TRACE_FLOD_BIT) |
|
2987 flod_trace_gen = db_time.tv_sec; |
|
2988 } |
|
2989 send_ok(q); |
|
2990 return; |
|
2991 |
|
2992 case DCC_AOP_CLIENTS: |
|
2993 case DCC_AOP_CLIENTS_ID: |
|
2994 if (!picky_admn(q, 1, 1)) |
|
2995 return; |
|
2996 /* we cannot just repeat ourselves for retransmissions, |
|
2997 * because the answer is too big to save */ |
|
2998 offset = (val1 >> 16) + (((u_int)q->pkt.ad.val4) << 16); |
|
2999 val1 &= 0xffff; |
|
3000 len = q->pkt.ad.val2; |
|
3001 if (q->pkt_len == (DCC_ADMN_REQ_MIN_SIZE |
|
3002 + sizeof(DCC_AOP_CLIENTS_CIDR))) { |
|
3003 memcpy(&addr6, &q->pkt.ad.val5[0], sizeof(addr6)); |
|
3004 dcc_bits2mask(&mask6, q->pkt.ad.val5[sizeof(addr6)]); |
|
3005 addr6p = &addr6; |
|
3006 mask6p = &mask6; |
|
3007 } else { |
|
3008 mask6p = 0; |
|
3009 addr6p = 0; |
|
3010 } |
|
3011 if (q->pkt.ad.aop == DCC_AOP_CLIENTS) |
|
3012 clients_get(&resp.val, &len, offset, |
|
3013 val1, q->pkt.ad.val3, addr6p, mask6p); |
|
3014 else |
|
3015 clients_get_id(&resp.val, &len, offset, |
|
3016 val1, q->pkt.ad.val3, addr6p, mask6p); |
|
3017 resp.hdr.len = len + sizeof(resp)-sizeof(resp.val); |
|
3018 resp.hdr.op = DCC_OP_ADMN; |
|
3019 send_resp(q, &resp.hdr, 0); |
|
3020 return; |
|
3021 |
|
3022 case DCC_AOP_ANON_DELAY: |
|
3023 /* get and set the anonymous client delay |
|
3024 * |
|
3025 * repeat answer to identical question */ |
|
3026 if (ridc_get(q)) { |
|
3027 repeat_resp(q); |
|
3028 return; |
|
3029 } |
|
3030 if (anon_off) |
|
3031 adelay_ms = DCC_ANON_DELAY_FOREVER; |
|
3032 else |
|
3033 adelay_ms = anon_delay_us/1000; |
|
3034 resp.val.anon_delay.delay[0] = adelay_ms>>8; |
|
3035 resp.val.anon_delay.delay[1] = adelay_ms; |
|
3036 if (anon_delay_inflate == DCC_ANON_INFLATE_OFF) { |
|
3037 resp.val.anon_delay.inflate[0] = 0; |
|
3038 resp.val.anon_delay.inflate[1] = 0; |
|
3039 resp.val.anon_delay.inflate[2] = 0; |
|
3040 resp.val.anon_delay.inflate[3] = 0; |
|
3041 } else { |
|
3042 resp.val.anon_delay.inflate[0] = anon_delay_inflate>>24; |
|
3043 resp.val.anon_delay.inflate[1] = anon_delay_inflate>>16; |
|
3044 resp.val.anon_delay.inflate[2] = anon_delay_inflate>>8; |
|
3045 resp.val.anon_delay.inflate[3] = anon_delay_inflate; |
|
3046 } |
|
3047 adelay_ms = (q->pkt.ad.val2<<8) + q->pkt.ad.val3; |
|
3048 if (adelay_ms != DCC_NO_ANON_DELAY |
|
3049 && picky_admn(q, 0, 0)) { |
|
3050 if (adelay_ms == DCC_ANON_DELAY_FOREVER) { |
|
3051 anon_off = 1; |
|
3052 } else { |
|
3053 anon_off = 0; |
|
3054 if (adelay_ms > DCC_ANON_DELAY_MAX/1000) |
|
3055 adelay_ms = DCC_ANON_DELAY_MAX/1000; |
|
3056 anon_delay_us = adelay_ms*1000; |
|
3057 if (val1 == 0) |
|
3058 val1 = DCC_ANON_INFLATE_OFF; |
|
3059 anon_delay_inflate = val1; |
|
3060 } |
|
3061 } |
|
3062 resp.hdr.len = (sizeof(resp)-sizeof(resp.val) |
|
3063 + sizeof(resp.val.anon_delay)); |
|
3064 resp.hdr.op = DCC_OP_ADMN; |
|
3065 send_resp(q, &resp.hdr, 0); |
|
3066 return; |
|
3067 |
|
3068 case DCC_AOP_CLOCK_CHECK: |
|
3069 timestamp_send(q); |
|
3070 return; |
|
3071 |
|
3072 case DCC_AOP_OK: |
|
3073 case DCC_AOP_unused1: |
|
3074 default: |
|
3075 break; |
|
3076 } |
|
3077 |
|
3078 send_error(q, "invalid %s", qop2str(q)); |
|
3079 } |