/***************************************************************************** * * Purpose ...............: MBSE BBS Internet Library * ***************************************************************************** * Copyright (C) 1997-2011 * * Michiel Broek FIDO: 2:280/2802 * Beekmansbos 10 * 1971 BV IJmuiden * the Netherlands * * This file is part of MBSE BBS. * * This BBS is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2, or (at your option) any * later version. * * MBSE BBS is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public License * along with MBSE BBS; see the file COPYING. If not, write to the Free * Software Foundation, 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. *****************************************************************************/ #include "../config.h" #include "mbselib.h" #include "mbinet.h" static int nntpsock = -1; /* TCP/IP socket */ int nntp_connect(void) { char *q, *ipver = NULL, ipstr[INET6_ADDRSTRLEN], servport[10]; struct addrinfo hints, *res = NULL, *p; int rc; if (nntpsock != -1) return nntpsock; if (!strlen(CFG.nntpnode)) { WriteError("NNTP: host not configured"); return -1; } snprintf(servport, 9, "%d", CFG.nntpport); Syslog('+', "NNTP: connecting host: %s port %s", CFG.nntpnode, servport); memset(&hints, 0, sizeof(hints)); hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_STREAM; if ((rc = getaddrinfo(CFG.nntpnode, servport, &hints, &res)) != 0) { WriteError("getaddrinfo %s:%s %s\n", CFG.nntpnode, servport, gai_strerror(rc)); return -1; } for (p = res; p != NULL; p = p->ai_next) { void *addr; if (p->ai_family == AF_INET) { struct sockaddr_in *ipv4 = (struct sockaddr_in *)p->ai_addr; addr = &(ipv4->sin_addr); ipver = (char *)"IPv4"; } else { struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)p->ai_addr; addr = &(ipv6->sin6_addr); ipver = (char *)"IPv6"; } inet_ntop(p->ai_family, addr, ipstr, sizeof ipstr); Syslog('+', "Trying %s %s port %s", ipver, ipstr, servport); if ((nntpsock = socket(p->ai_family, p->ai_socktype, p->ai_protocol)) == -1) { WriteError("$socket()"); return -1; } else { if (connect(nntpsock, p->ai_addr, p->ai_addrlen) == -1) { WriteError("$connect %s port %s", ipstr, servport); close(nntpsock); } else { break; } } } if (p == NULL) { return -1; /* Not connected */ } q = nntp_receive(); if (strlen(q) == 0) { WriteError("NNTP: no response"); nntp_close(); return -1; } Syslog('+', "NNTP: %s", q); if ((strncmp(q, "480", 3) == 0) || CFG.nntpforceauth) { /* * Must login with username and password */ if (nntp_auth() == FALSE) { WriteError("Authorisation failure"); nntp_close(); return -1; } } else if (strncmp(q, "200", 3)) { WriteError("NNTP: bad response: %s", q); // nntp_close(); FIXME: Don't close, the other end might have done that already // If we do also, this program hangs. Must be fixed! return -1; } if (CFG.modereader) { Syslog('+', "NNTP: setting mode reader"); nntp_send((char *)"MODE READER\r\n"); q = nntp_receive(); Syslog('+', "NNTP: %s", q); if (strncmp(q, "480", 3) == 0) { /* * Must login with username and password */ Syslog('+', "NNTP: %s", q); if (nntp_auth() == FALSE) { WriteError("NNTP: authorisation failure"); nntp_close(); return -1; } } else if (strncmp(q, "200", 3)) { WriteError("NNTP: bad response: %s", q); nntp_close(); return -1; } } return nntpsock; } int nntp_send(char *buf) { if (nntpsock == -1) return -1; if (send(nntpsock, buf, strlen(buf), 0) != strlen(buf)) { WriteError("$NNTP: socket send failed"); if (errno == ENOTCONN || errno == EPIPE) { WriteError("NNTP: closing local side"); nntpsock = -1; } return -1; } return 0; } /* * Return empty buffer if something went wrong, else the complete * dataline is returned */ char *nntp_receive(void) { static char buf[SS_BUFSIZE]; int i = 0, j; if (nntpsock == -1) return NULL; memset((char *)&buf, 0, SS_BUFSIZE); while (TRUE) { j = recv(nntpsock, &buf[i], 1, 0); if (j == -1) { WriteError("$NNTP: error reading socket"); memset((char *)&buf, 0, SS_BUFSIZE); if (errno == ENOTCONN || errno == EPIPE) { WriteError("NNTP: closing local side"); nntpsock = -1; } return buf; } if (buf[i] == '\n') break; i += j; } for (i = 0; i < strlen(buf); i++) { if (buf[i] == '\n') buf[i] = '\0'; if (buf[i] == '\r') buf[i] = '\0'; } return buf; } int nntp_close(void) { if (nntpsock == -1) return 0; nntp_cmd((char *)"QUIT\r\n", 205); if (shutdown(nntpsock, 1) == -1) { WriteError("$NNTP: can't close socket"); return -1; } nntpsock = -1; Syslog('+', "NNTP: closed"); return 0; } /* * Send NNTP command, check response code. * If the code doesn't match, the value is returned, else zero. */ int nntp_cmd(char *cmd, int resp) { char *p, rsp[6]; if (nntp_send(cmd) == -1) return -1; snprintf(rsp, 6, "%d", resp); p = nntp_receive(); if (strncmp(p, "480", 3) == 0) { /* * Must login with username and password */ Syslog('+', "NNTP: %s", p); if (nntp_auth() == FALSE) { WriteError("Authorisation failure"); nntp_close(); return -1; } /* * Now send command again, we are now authorized. */ if (nntp_send(cmd) == -1) return -1; p = nntp_receive(); } if (strncmp(p, rsp, strlen(rsp))) { WriteError("NNTP> %s", cmd); WriteError("NNTP< %s", p); memset(rsp, 0, sizeof(rsp)); strncpy(rsp, p, 3); return atoi(rsp); } return 0; } int nntp_auth(void) { char *cmd; if (!(strlen(CFG.nntpuser) && strlen(CFG.nntppass))) { WriteError("NNTP: password required but not configured"); return FALSE; } cmd = calloc(128, sizeof(char)); snprintf(cmd, 128, "AUTHINFO USER %s\r\n", CFG.nntpuser); if (nntp_cmd(cmd, 381)) return FALSE; snprintf(cmd, 128, "AUTHINFO PASS %s\r\n", CFG.nntppass); if (nntp_cmd(cmd, 281) == 0) { free(cmd); Syslog('+', "NNTP: logged in"); return TRUE; } else { free(cmd); return FALSE; } }