3 #include "autocvars.qh"
4 #include "command/banning.qh"
6 #include "../common/constants.qh"
7 #include "../common/util.qh"
10 * Protocol of online ban list:
13 * GET g_ban_sync_uri?action=ban&hostname=...&ip=xxx.xxx.xxx&duration=nnnn&reason=...................
14 * (IP 1, 2, 3, or 4 octets, 3 octets for example is a /24 mask)
16 * GET g_ban_sync_uri?action=unban&hostname=...&ip=xxx.xxx.xxx
17 * - Querying the ban list
18 * GET g_ban_sync_uri?action=list&hostname=...&servers=xxx.xxx.xxx.xxx;xxx.xxx.xxx.xxx;...
20 * shows the bans from the listed servers, and possibly others.
21 * Format of a ban is ASCII plain text, four lines per ban, delimited by
22 * newline ONLY (no carriage return):
24 * IP address (also 1, 2, 3, or 4 octets, delimited by dot)
25 * time left in seconds
27 * server IP that registered the ban
30 #define MAX_IPBAN_URIS (URI_GET_IPBAN_END - URI_GET_IPBAN + 1)
32 float Ban_Insert(string ip, float bantime, string reason, float dosync);
34 void OnlineBanList_SendBan(string ip, float bantime, string reason)
39 uri = strcat( "action=ban&hostname=", uri_escape(autocvar_hostname));
40 uri = strcat(uri, "&ip=", uri_escape(ip));
41 uri = strcat(uri, "&duration=", ftos(bantime));
42 uri = strcat(uri, "&reason=", uri_escape(reason));
44 n = tokenize_console(autocvar_g_ban_sync_uri);
45 if(n >= MAX_IPBAN_URIS)
47 for(i = 0; i < n; ++i)
49 if(strstrofs(argv(i), "?", 0) >= 0)
50 uri_get(strcat(argv(i), "&", uri), URI_GET_DISCARD); // 0 = "discard" callback target
52 uri_get(strcat(argv(i), "?", uri), URI_GET_DISCARD); // 0 = "discard" callback target
56 void OnlineBanList_SendUnban(string ip)
61 uri = strcat( "action=unban&hostname=", uri_escape(autocvar_hostname));
62 uri = strcat(uri, "&ip=", uri_escape(ip));
64 n = tokenize_console(autocvar_g_ban_sync_uri);
65 if(n >= MAX_IPBAN_URIS)
67 for(i = 0; i < n; ++i)
69 if(strstrofs(argv(i), "?", 0) >= 0)
70 uri_get(strcat(argv(i), "&", uri), URI_GET_DISCARD); // 0 = "discard" callback target
72 uri_get(strcat(argv(i), "?", uri), URI_GET_DISCARD); // 0 = "discard" callback target
76 string OnlineBanList_Servers;
77 float OnlineBanList_Timeout;
78 float OnlineBanList_RequestWaiting[MAX_IPBAN_URIS];
80 void OnlineBanList_URI_Get_Callback(float id, float status, string data)
92 if(id >= MAX_IPBAN_URIS)
94 LOG_INFO("Received ban list for invalid ID\n");
98 tokenize_console(autocvar_g_ban_sync_uri);
101 LOG_INFO("Received ban list from ", uri, ": ");
103 if(OnlineBanList_RequestWaiting[id] == 0)
105 LOG_INFO("rejected (unexpected)\n");
109 OnlineBanList_RequestWaiting[id] = 0;
111 if(time > OnlineBanList_Timeout)
113 LOG_INFO("rejected (too late)\n");
117 syncinterval = autocvar_g_ban_sync_interval;
118 if(syncinterval == 0)
120 LOG_INFO("rejected (syncing disabled)\n");
128 LOG_INFO("error: status is ", ftos(status), "\n");
132 if(substring(data, 0, 1) == "<")
134 LOG_INFO("error: received HTML instead of a ban list\n");
138 if(strstrofs(data, "\r", 0) != -1)
140 LOG_INFO("error: received carriage returns\n");
147 n = tokenizebyseparator(data, "\n");
151 LOG_INFO("error: received invalid item count: ", ftos(n), "\n");
155 LOG_INFO("OK, ", ftos(n / 4), " items\n");
157 for(i = 0; i < n; i += 4)
160 timeleft = stof(argv(i + 1));
161 reason = argv(i + 2);
162 serverip = argv(i + 3);
164 LOG_TRACE("received ban list item ", ftos(i / 4), ": ip=", ip);
165 LOG_TRACE(" timeleft=", ftos(timeleft), " reason=", reason);
166 LOG_TRACE(" serverip=", serverip);
168 timeleft -= 1.5 * autocvar_g_ban_sync_timeout;
173 if(l != 44) // length 44 is a cryptographic ID
175 for(j = 0; j < l; ++j)
176 if(strstrofs("0123456789.", substring(ip, j, 1), 0) == -1)
178 LOG_INFO("Invalid character ", substring(ip, j, 1), " in IP address ", ip, ". Skipping this ban.\n");
183 if(autocvar_g_ban_sync_trusted_servers_verify)
184 if((strstrofs(strcat(";", OnlineBanList_Servers, ";"), strcat(";", serverip, ";"), 0) == -1))
188 timeleft = min(syncinterval + (OnlineBanList_Timeout - time) + 5, timeleft);
189 // the ban will be prolonged on the next sync
190 // or expire 5 seconds after the next timeout
191 Ban_Insert(ip, timeleft, strcat("ban synced from ", serverip, " at ", uri), 0);
192 LOG_INFO("Ban list syncing: accepted ban of ", ip, " by ", serverip, " at ", uri, ": ");
193 LOG_INFO(reason, "\n");
199 void OnlineBanList_Think(entity this)
205 if(autocvar_g_ban_sync_uri == "")
207 if(autocvar_g_ban_sync_interval == 0) // < 0 is okay, it means "sync on level start only"
209 argc = tokenize_console(autocvar_g_ban_sync_trusted_servers);
213 if(OnlineBanList_Servers)
214 strunzone(OnlineBanList_Servers);
215 OnlineBanList_Servers = argv(0);
216 for(i = 1; i < argc; ++i)
217 OnlineBanList_Servers = strcat(OnlineBanList_Servers, ";", argv(i));
218 OnlineBanList_Servers = strzone(OnlineBanList_Servers);
220 uri = strcat( "action=list&hostname=", uri_escape(autocvar_hostname));
221 uri = strcat(uri, "&servers=", uri_escape(OnlineBanList_Servers));
223 OnlineBanList_Timeout = time + autocvar_g_ban_sync_timeout;
225 n = tokenize_console(autocvar_g_ban_sync_uri);
226 if(n >= MAX_IPBAN_URIS)
228 for(i = 0; i < n; ++i)
230 if(OnlineBanList_RequestWaiting[i])
232 OnlineBanList_RequestWaiting[i] = 1;
233 if(strstrofs(argv(i), "?", 0) >= 0)
234 uri_get(strcat(argv(i), "&", uri), URI_GET_IPBAN + i); // 1000 = "banlist" callback target
236 uri_get(strcat(argv(i), "?", uri), URI_GET_IPBAN + i); // 1000 = "banlist" callback target
239 if(autocvar_g_ban_sync_interval > 0)
240 this.nextthink = time + max(60, autocvar_g_ban_sync_interval * 60);
249 const float BAN_MAX = 256;
251 string ban_ip[BAN_MAX];
252 float ban_expire[BAN_MAX];
271 for(i = 0; i < ban_count; ++i)
273 if(time > ban_expire[i])
275 out = strcat(out, " ", ban_ip[i]);
276 out = strcat(out, " ", ftos(ban_expire[i] - time));
278 if(strlen(out) <= 1) // no real entries
279 cvar_set("g_banned_list", "");
281 cvar_set("g_banned_list", out);
284 float Ban_Delete(float i)
290 if(ban_expire[i] == 0)
292 if(ban_expire[i] > 0)
294 OnlineBanList_SendUnban(ban_ip[i]);
295 strunzone(ban_ip[i]);
306 for(i = 0; i < ban_count; ++i)
310 n = tokenize_console(autocvar_g_banned_list);
311 if(stof(argv(0)) == 1)
313 ban_count = (n - 1) / 2;
314 for(i = 0; i < ban_count; ++i)
316 ban_ip[i] = strzone(argv(2*i+1));
317 ban_expire[i] = time + stof(argv(2*i+2));
321 entity e = new(bansyncer);
322 setthink(e, OnlineBanList_Think);
323 e.nextthink = time + 1;
331 LOG_INFO("^2Listing all existing active bans:\n");
334 for(i = 0; i < ban_count; ++i)
336 if(time > ban_expire[i])
339 ++n; // total number of existing bans
341 msg = strcat("#", ftos(i), ": ");
342 msg = strcat(msg, ban_ip[i], " is still banned for ");
343 msg = strcat(msg, ftos(ban_expire[i] - time), " seconds");
345 LOG_INFO(" ", msg, "\n");
348 LOG_INFO("^2Done listing all active (", ftos(n), ") bans.\n");
351 float Ban_GetClientIP(entity client)
353 // we can't use tokenizing here, as this is called during ban list parsing
354 float i1, i2, i3, i4;
357 if(client.crypto_idfp_signed)
358 ban_idfp = client.crypto_idfp;
360 ban_idfp = string_null;
362 s = client.netaddress;
364 i1 = strstrofs(s, ".", 0);
367 i2 = strstrofs(s, ".", i1 + 1);
370 i3 = strstrofs(s, ".", i2 + 1);
373 i4 = strstrofs(s, ".", i3 + 1);
375 s = substring(s, 0, i4);
377 ban_ip1 = substring(s, 0, i1); // 8
378 ban_ip2 = substring(s, 0, i2); // 16
379 ban_ip3 = substring(s, 0, i3); // 24
380 ban_ip4 = strcat1(s); // 32
384 i1 = strstrofs(s, ":", 0);
387 i1 = strstrofs(s, ":", i1 + 1);
390 i2 = strstrofs(s, ":", i1 + 1);
393 i3 = strstrofs(s, ":", i2 + 1);
397 ban_ip1 = strcat(substring(s, 0, i1), "::/32"); // 32
398 ban_ip2 = strcat(substring(s, 0, i2), "::/48"); // 48
399 ban_ip4 = strcat(substring(s, 0, i3), "::/64"); // 64
401 if(i3 - i2 > 3) // means there is more than 2 digits and a : in the range
402 ban_ip3 = strcat(substring(s, 0, i2), ":", substring(s, i2 + 1, i3 - i2 - 3), "00::/56");
404 ban_ip3 = strcat(substring(s, 0, i2), ":0::/56");
409 float Ban_IsClientBanned(entity client, float idx)
411 float i, b, e, ipbanned;
414 if(!Ban_GetClientIP(client))
427 for(i = b; i < e; ++i)
430 if(time > ban_expire[i])
433 if(ban_ip1 == s) ipbanned = true;
434 if(ban_ip2 == s) ipbanned = true;
435 if(ban_ip3 == s) ipbanned = true;
436 if(ban_ip4 == s) ipbanned = true;
437 if(ban_idfp == s) return true;
441 if(!autocvar_g_banned_list_idmode)
449 bool Ban_MaybeEnforceBan(entity client)
451 if (Ban_IsClientBanned(client, -1))
453 string s = sprintf("^1NOTE:^7 banned client %s just tried to enter\n", client.netaddress);
462 bool Ban_MaybeEnforceBanOnce(entity client)
464 if (client.ban_checked) return false;
465 client.ban_checked = true;
466 return Ban_MaybeEnforceBan(client);
469 string Ban_Enforce(float j, string reason)
473 // Enforce our new ban
475 FOREACH_CLIENTSLOT(IS_REAL_CLIENT(it),
477 if(Ban_IsClientBanned(it, j))
482 reason = strcat(reason, ": affects ");
484 reason = strcat(reason, ", ");
485 reason = strcat(reason, it.netname);
487 s = strcat(s, "^1NOTE:^7 banned client ", it.netaddress, "^7 has to go\n");
496 float Ban_Insert(string ip, float bantime, string reason, float dosync)
503 for(i = 0; i < ban_count; ++i)
507 if(time + bantime > ban_expire[i])
509 ban_expire[i] = time + bantime;
510 LOG_TRACE(ip, "'s ban has been prolonged to ", ftos(bantime), " seconds from now");
513 LOG_TRACE(ip, "'s ban is still active until ", ftos(ban_expire[i] - time), " seconds from now");
516 reason = Ban_Enforce(i, reason);
521 if(substring(reason, 0, 1) != "~") // like IRC: unauthenticated banner
522 OnlineBanList_SendBan(ip, bantime, reason);
527 // do we have a free slot?
528 for(i = 0; i < ban_count; ++i)
529 if(time > ban_expire[i])
531 // no free slot? Then look for the one who would get unbanned next
535 bestscore = ban_expire[i];
536 for(j = 1; j < ban_count; ++j)
538 if(ban_expire[j] < bestscore)
541 bestscore = ban_expire[i];
545 // if we replace someone, will we be banned longer than him (so long-term
546 // bans never get overridden by short-term bans)
548 if(ban_expire[i] > time + bantime)
550 LOG_INFO(ip, " could not get banned due to no free ban slot\n");
553 // okay, insert our new victim as i
555 LOG_TRACE(ip, " has been banned for ", ftos(bantime), " seconds");
556 ban_expire[i] = time + bantime;
557 ban_ip[i] = strzone(ip);
558 ban_count = max(ban_count, i + 1);
562 reason = Ban_Enforce(i, reason);
567 if(substring(reason, 0, 1) != "~") // like IRC: unauthenticated banner
568 OnlineBanList_SendBan(ip, bantime, reason);
573 void Ban_KickBanClient(entity client, float bantime, float masksize, string reason)
576 if(!Ban_GetClientIP(client))
578 sprint(client, strcat("Kickbanned: ", reason, "\n"));
587 ip = strcat1(ban_ip1);
590 ip = strcat1(ban_ip2);
593 ip = strcat1(ban_ip3);
597 ip = strcat1(ban_ip4);
601 id = strcat1(ban_idfp);
605 Ban_Insert(ip, bantime, reason, 1);
607 Ban_Insert(id, bantime, reason, 1);
609 * not needed, as we enforce the ban in Ban_Insert anyway
611 sprint(client, strcat("Kickbanned: ", reason, "\n"));