2 * NNTP server module FIXME THIS IS NOT FINISHED
4 * Copyright (c) 2014 by the citadel.org team
6 * This program is open source software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 3.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
24 #include <sys/types.h>
27 #if TIME_WITH_SYS_TIME
28 # include <sys/time.h>
32 # include <sys/time.h>
42 #include <sys/socket.h>
43 #include <netinet/in.h>
44 #include <arpa/inet.h>
45 #include <libcitadel.h>
48 #include "citserver.h"
56 #include "internet_addressing.h"
59 #include "clientsocket.h"
60 #include "locate_host.h"
61 #include "citadel_dirs.h"
62 #include "ctdl_module.h"
65 * Here's where our NNTP session begins its happy day.
67 void nntp_greeting(void)
69 strcpy(CC->cs_clientname, "NNTP session");
70 CC->cs_flags |= CS_STEALTH;
72 /* CC->session_specific_data = malloc(sizeof(citnntp));
73 memset(NNTP, 0, sizeof(citnntp));
77 cprintf("451 Too many connections are already open; please try again later.\r\n");
78 CC->kill_me = KILLME_MAX_SESSIONS_EXCEEDED;
82 /* Note: the FQDN *must* appear as the first thing after the 220 code.
83 * Some clients (including citmail.c) depend on it being there.
85 cprintf("200 %s NNTP Citadel server is not finished yet\r\n", config.c_fqdn);
90 * NNTPS is just like NNTP, except it goes crypto right away.
92 void nntps_greeting(void) {
93 CtdlModuleStartCryptoMsgs(NULL, NULL, NULL);
95 if (!CC->redirect_ssl) CC->kill_me = KILLME_NO_CRYPTO; /* kill session if no crypto */
103 * implements the STARTTLS command
105 void nntp_starttls(void)
107 char ok_response[SIZ];
108 char nosup_response[SIZ];
109 char error_response[SIZ];
111 sprintf(ok_response, "382 Begin TLS negotiation now\r\n");
112 sprintf(nosup_response, "502 Can not initiate TLS negotiation\r\n");
113 sprintf(error_response, "580 Internal error\r\n");
114 CtdlModuleStartCryptoMsgs(ok_response, nosup_response, error_response);
120 cprintf("250 NOOP\r\n");
124 void nntp_capabilities(void)
126 cprintf("101 Capability list:\r\n");
128 cprintf("STARTTLS\r\n");
130 if (!CC->logged_in) {
131 cprintf("AUTHINFO USER\r\n");
139 cprintf("221 Goodbye...\r\n");
140 CC->kill_me = KILLME_CLIENT_LOGGED_OUT;
144 void nntp_cleanup(void)
146 /* nothing here yet */
152 * Implements the AUTHINFO USER command (RFC 4643)
154 void nntp_authinfo_user(const char *username)
156 int a = CtdlLoginExistingUser(NULL, username);
158 case login_already_logged_in:
159 cprintf("482 Already logged in\r\n");
161 case login_too_many_users:
162 cprintf("481 Too many users are already online (maximum is %d)\r\n", config.c_maxsessions);
165 cprintf("381 Password required for %s\r\n", CC->curr_user);
167 case login_not_found:
168 cprintf("481 %s not found\r\n", username);
171 cprintf("502 Internal error\r\n");
177 * Implements the AUTHINFO PASS command (RFC 4643)
179 void nntp_authinfo_pass(const char *buf)
183 a = CtdlTryPassword(buf, strlen(buf));
186 case pass_already_logged_in:
187 cprintf("482 Already logged in\r\n");
190 cprintf("482 Authentication commands issued out of sequence\r\n");
192 case pass_wrong_password:
193 cprintf("481 Authentication failed\r\n");
196 cprintf("281 Authentication accepted\r\n");
204 * Implements the AUTHINFO extension (RFC 4643) in USER/PASS mode
206 void nntp_authinfo(const char *cmd) {
208 if (!strncasecmp(cmd, "authinfo user ", 14)) {
209 nntp_authinfo_user(&cmd[14]);
212 else if (!strncasecmp(cmd, "authinfo pass ", 14)) {
213 nntp_authinfo_pass(&cmd[14]);
217 cprintf("502 command unavailable\r\n");
224 * Main command loop for NNTP server sessions.
226 void nntp_command_loop(void)
228 StrBuf *Cmd = NewStrBuf();
232 if (CtdlClientGetLine(Cmd) < 1) {
233 syslog(LOG_CRIT, "NNTP: client disconnected: ending session.\n");
234 CC->kill_me = KILLME_CLIENT_DISCONNECTED;
238 syslog(LOG_DEBUG, "NNTP server: %s\n", ChrPtr(Cmd));
239 extract_token(cmdname, ChrPtr(Cmd), 0, ' ', sizeof cmdname);
242 * Rumpelstiltskin lookups are awesome
245 if (!strcasecmp(cmdname, "quit")) {
249 else if (!strcasecmp(cmdname, "capabilities")) {
253 else if (!strcasecmp(cmdname, "starttls")) {
257 else if (!strcasecmp(cmdname, "noop")) {
261 else if (!strcasecmp(cmdname, "authinfo")) {
262 nntp_authinfo(ChrPtr(Cmd));
266 cprintf("500 I'm afraid I can't do that.\r\n");
273 /*****************************************************************************/
274 /* MODULE INITIALIZATION STUFF */
275 /*****************************************************************************/
279 * This cleanup function blows away the temporary memory used by
282 void nntp_cleanup_function(void)
284 /* Don't do this stuff if this is not an NNTP session! */
285 if (CC->h_command_function != nntp_command_loop) return;
287 syslog(LOG_DEBUG, "Performing NNTP cleanup hook\n");
290 const char *CitadelServiceNNTP="NNTP";
292 CTDL_MODULE_INIT(nntp)
296 CtdlRegisterServiceHook(119, // FIXME config.c_nntp_port,
304 CtdlRegisterServiceHook(563, // FIXME config.c_nntps_port,
312 CtdlRegisterCleanupHook(nntp_cleanup);
313 CtdlRegisterSessionHook(nntp_cleanup_function, EVT_STOP, PRIO_STOP + 250);
316 /* return our module name for the log */