This repository has been archived on 2024-04-08. You can view files and clone it, but cannot push or open issues or pull requests.
deb-mbse/mbsebbs-code-361e3323ef16e6d9c51e83748a5843a3b34b7f64/lib/nntp.c
vbcoen 6a6a253885 Updated mbmon.c & mbsetup.c
Added doc dir. and manual as .pdf
restored deleted files - yep I screwed the pooch.
2015-11-03 20:41:11 +00:00

293 lines
6.9 KiB
C

/*****************************************************************************
*
* Purpose ...............: MBSE BBS Internet Library
*
*****************************************************************************
* Copyright (C) 1997-2011
*
* Michiel Broek FIDO: 2:280/2802
* Beekmansbos 10
* 1971 BV IJmuiden
* the Netherlands
*
* This file is part of MBSE BBS.
*
* This BBS is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2, or (at your option) any
* later version.
*
* MBSE BBS is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with MBSE BBS; see the file COPYING. If not, write to the Free
* Software Foundation, 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.
*****************************************************************************/
#include "../config.h"
#include "mbselib.h"
#include "mbinet.h"
static int nntpsock = -1; /* TCP/IP socket */
int nntp_connect(void)
{
char *q, *ipver = NULL, ipstr[INET6_ADDRSTRLEN], servport[10];
struct addrinfo hints, *res = NULL, *p;
int rc;
if (nntpsock != -1)
return nntpsock;
if (!strlen(CFG.nntpnode)) {
WriteError("NNTP: host not configured");
return -1;
}
snprintf(servport, 9, "%d", CFG.nntpport);
Syslog('+', "NNTP: connecting host: %s port %s", CFG.nntpnode, servport);
memset(&hints, 0, sizeof(hints));
hints.ai_family = AF_UNSPEC;
hints.ai_socktype = SOCK_STREAM;
if ((rc = getaddrinfo(CFG.nntpnode, servport, &hints, &res)) != 0) {
WriteError("getaddrinfo %s:%s %s\n", CFG.nntpnode, servport, gai_strerror(rc));
return -1;
}
for (p = res; p != NULL; p = p->ai_next) {
void *addr;
if (p->ai_family == AF_INET) {
struct sockaddr_in *ipv4 = (struct sockaddr_in *)p->ai_addr;
addr = &(ipv4->sin_addr);
ipver = (char *)"IPv4";
} else {
struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)p->ai_addr;
addr = &(ipv6->sin6_addr);
ipver = (char *)"IPv6";
}
inet_ntop(p->ai_family, addr, ipstr, sizeof ipstr);
Syslog('+', "Trying %s %s port %s", ipver, ipstr, servport);
if ((nntpsock = socket(p->ai_family, p->ai_socktype, p->ai_protocol)) == -1) {
WriteError("$socket()");
return -1;
} else {
if (connect(nntpsock, p->ai_addr, p->ai_addrlen) == -1) {
WriteError("$connect %s port %s", ipstr, servport);
close(nntpsock);
} else {
break;
}
}
}
if (p == NULL) {
return -1; /* Not connected */
}
q = nntp_receive();
if (strlen(q) == 0) {
WriteError("NNTP: no response");
nntp_close();
return -1;
}
Syslog('+', "NNTP: %s", q);
if ((strncmp(q, "480", 3) == 0) || CFG.nntpforceauth) {
/*
* Must login with username and password
*/
if (nntp_auth() == FALSE) {
WriteError("Authorisation failure");
nntp_close();
return -1;
}
} else if (strncmp(q, "200", 3)) {
WriteError("NNTP: bad response: %s", q);
// nntp_close(); FIXME: Don't close, the other end might have done that already
// If we do also, this program hangs. Must be fixed!
return -1;
}
if (CFG.modereader) {
Syslog('+', "NNTP: setting mode reader");
nntp_send((char *)"MODE READER\r\n");
q = nntp_receive();
Syslog('+', "NNTP: %s", q);
if (strncmp(q, "480", 3) == 0) {
/*
* Must login with username and password
*/
Syslog('+', "NNTP: %s", q);
if (nntp_auth() == FALSE) {
WriteError("NNTP: authorisation failure");
nntp_close();
return -1;
}
} else if (strncmp(q, "200", 3)) {
WriteError("NNTP: bad response: %s", q);
nntp_close();
return -1;
}
}
return nntpsock;
}
int nntp_send(char *buf)
{
if (nntpsock == -1)
return -1;
if (send(nntpsock, buf, strlen(buf), 0) != strlen(buf)) {
WriteError("$NNTP: socket send failed");
if (errno == ENOTCONN || errno == EPIPE) {
WriteError("NNTP: closing local side");
nntpsock = -1;
}
return -1;
}
return 0;
}
/*
* Return empty buffer if something went wrong, else the complete
* dataline is returned
*/
char *nntp_receive(void)
{
static char buf[SS_BUFSIZE];
int i = 0, j;
if (nntpsock == -1)
return NULL;
memset((char *)&buf, 0, SS_BUFSIZE);
while (TRUE) {
j = recv(nntpsock, &buf[i], 1, 0);
if (j == -1) {
WriteError("$NNTP: error reading socket");
memset((char *)&buf, 0, SS_BUFSIZE);
if (errno == ENOTCONN || errno == EPIPE) {
WriteError("NNTP: closing local side");
nntpsock = -1;
}
return buf;
}
if (buf[i] == '\n')
break;
i += j;
}
for (i = 0; i < strlen(buf); i++) {
if (buf[i] == '\n')
buf[i] = '\0';
if (buf[i] == '\r')
buf[i] = '\0';
}
return buf;
}
int nntp_close(void)
{
if (nntpsock == -1)
return 0;
nntp_cmd((char *)"QUIT\r\n", 205);
if (shutdown(nntpsock, 1) == -1) {
WriteError("$NNTP: can't close socket");
return -1;
}
nntpsock = -1;
Syslog('+', "NNTP: closed");
return 0;
}
/*
* Send NNTP command, check response code.
* If the code doesn't match, the value is returned, else zero.
*/
int nntp_cmd(char *cmd, int resp)
{
char *p, rsp[6];
if (nntp_send(cmd) == -1)
return -1;
snprintf(rsp, 6, "%d", resp);
p = nntp_receive();
if (strncmp(p, "480", 3) == 0) {
/*
* Must login with username and password
*/
Syslog('+', "NNTP: %s", p);
if (nntp_auth() == FALSE) {
WriteError("Authorisation failure");
nntp_close();
return -1;
}
/*
* Now send command again, we are now authorized.
*/
if (nntp_send(cmd) == -1)
return -1;
p = nntp_receive();
}
if (strncmp(p, rsp, strlen(rsp))) {
WriteError("NNTP> %s", cmd);
WriteError("NNTP< %s", p);
memset(rsp, 0, sizeof(rsp));
strncpy(rsp, p, 3);
return atoi(rsp);
}
return 0;
}
int nntp_auth(void)
{
char *cmd;
if (!(strlen(CFG.nntpuser) && strlen(CFG.nntppass))) {
WriteError("NNTP: password required but not configured");
return FALSE;
}
cmd = calloc(128, sizeof(char));
snprintf(cmd, 128, "AUTHINFO USER %s\r\n", CFG.nntpuser);
if (nntp_cmd(cmd, 381))
return FALSE;
snprintf(cmd, 128, "AUTHINFO PASS %s\r\n", CFG.nntppass);
if (nntp_cmd(cmd, 281) == 0) {
free(cmd);
Syslog('+', "NNTP: logged in");
return TRUE;
} else {
free(cmd);
return FALSE;
}
}