Skip to content
Snippets Groups Projects
answer.cpp 24 KiB
Newer Older
/* Synchronet answer "caller" function */

/****************************************************************************
 * @format.tab-size 4		(Plain Text/Source Code File Header)			*
 * @format.use-tabs true	(see http://www.synchro.net/ptsc_hdr.html)		*
 *																			*
 * Copyright Rob Swindell - http://www.synchro.net/copyright.html			*
 *																			*
 * This program is free software; you can redistribute it and/or			*
 * modify it under the terms of the GNU General Public License				*
 * as published by the Free Software Foundation; either version 2			*
 * of the License, or (at your option) any later version.					*
 * See the GNU General Public License for more details: gpl.txt or			*
 * http://www.fsf.org/copyleft/gpl.html										*
 *																			*
 * For Synchronet coding style and modification guidelines, see				*
 * http://www.synchro.net/source.html										*
 *																			*
 * Note: If this box doesn't appear square, then you need to fix your tabs.	*
 ****************************************************************************/

Deucе's avatar
Deucе committed
#include <stddef.h> // size_t for base64.h
#include "base64.h"
#include "sbbs.h"
#include "telnet.h"
extern "C" void client_on(SOCKET sock, client_t* client, BOOL update);

bool
sbbs_t::set_authresponse(bool activate_ssh)
{
	int status;

	lprintf(LOG_DEBUG, "%04d SSH Setting attribute: SESSINFO_AUTHRESPONSE", client_socket);
	status = cryptSetAttribute(ssh_session, CRYPT_SESSINFO_AUTHRESPONSE, activate_ssh);
	if(cryptStatusError(status)) {
		log_crypt_error_status_sock(status, "setting auth response");
		return false;
	}
	return true;
}

Deucе's avatar
Deucе committed
static bool
check_pubkey(scfg_t *cfg, ushort unum, char *pkey, size_t pksz)
{
	// 2048 is enough bytes for anyone!
	// I would absolutely prefer a getline() here. :(
	char path[MAX_PATH + 1];
	char keyline[2048 + 1];
	FILE *sshkeys;
	char *brkb;
	char *tok;

	// Obviously not valid...
	if (pksz < 16)
		return false;
	SAFEPRINTF2(path, "%suser/%04d.sshkeys", cfg->data_dir, unum);
	sshkeys = fopen(path, "rb");
	if (sshkeys != NULL) {
		while (fgets(keyline, sizeof(keyline), sshkeys) != NULL) {
			size_t len = strlen(keyline);

			if (keyline[len - 1] != '\n') {
				// Ignore the rest of the line...
				while (keyline[len - 1] != '\n') {
					lprintf(LOG_ERR, "keyline not large enough for key in %s (or missing newline)\n", path);
					if (fgets(keyline, sizeof(keyline), sshkeys) == NULL)
						break;
					len = strlen(keyline);
				}
			}
			else {
				tok = strtok_r(keyline, " \t", &brkb);
				if (tok) {
					tok = strtok_r(NULL, " \t", &brkb);
					if (tok) {
						char pk[2048];
						int pklen;
						pklen = b64_decode(pk, sizeof(pk), tok, 0);
						if (pklen > 0) {
							if ((pksz - 4) == (unsigned)pklen) {
								if (memcmp(&pkey[4], pk, pklen) == 0) {
Deucе's avatar
Deucе committed
									fclose(sshkeys);
									return true;
								}
							}
						}
					}
				}
			}
		}
		fclose(sshkeys);
	}
	return false;
}

bool sbbs_t::answer()
{
	char	str[MAX_PATH+1],str2[MAX_PATH+1],c;
	char 	*pubkey{nullptr};
Deucе's avatar
Deucе committed
	size_t  pubkeysz;
Deucе's avatar
Deucе committed
	bool term_output_disabled{};
	max_socket_inactivity = startup->max_login_inactivity;
	answertime=logontime=starttime=now=time(NULL);
	/* Caller ID string is client IP address, by default (may be overridden later) */
deuce's avatar
deuce committed
	SAFECOPY(cid,client_ipaddr);

	memset(&tm,0,sizeof(tm));
    localtime_r(&now,&tm); 
	safe_snprintf(str,sizeof(str),"%s  %s %s %02d %u            Node %3u"
		,hhmmtostr(&cfg,&tm,str2)
		,wday[tm.tm_wday]
        ,mon[tm.tm_mon],tm.tm_mday,tm.tm_year+1900,cfg.node_num);
	logline("@ ",str);

rswindell's avatar
rswindell committed
	safe_snprintf(str,sizeof(str),"%s  %s [%s]", connection, client_name, client_ipaddr);
	logline("@+:",str);

	if(client_ident[0]) {
		safe_snprintf(str,sizeof(str),"Identity: %s",client_ident);
		logline("@*",str);
	}
	if(sys_status&SS_RLOGIN) {
		if(incom(1000)==0) {
rswindell's avatar
rswindell committed
			for(i=0;i<(int)sizeof(str)-1;i++) {
				in=incom(1000);
				if(in==0 || in==NOINP)
					break;
				str[i]=in;
			}
			str[i]=0;
rswindell's avatar
rswindell committed
			for(i=0;i<(int)sizeof(str2)-1;i++) {
				in=incom(1000);
				if(in==0 || in==NOINP)
					break;
				str2[i]=in;
			}
			str2[i]=0;
			for(i=0;i<(int)sizeof(terminal)-1;i++) {
				in=incom(1000);
				if(in==0 || in==NOINP)
					break;
				terminal[i]=in;
			}
			terminal[i]=0;
			lprintf(LOG_DEBUG,"RLogin: '%.*s' / '%.*s' / '%s'"
rswindell's avatar
rswindell committed
				,LEN_ALIAS*2,str
				,LEN_ALIAS*2,str2
				,terminal);
			SAFECOPY(rlogin_term, terminal);
			SAFECOPY(rlogin_name, parse_login(str2));
			SAFECOPY(rlogin_pass, str);
			/* Truncate terminal speed (e.g. "/57600") from terminal-type string 
			   (but keep full terminal type/speed string in rlogin_term): */
			truncstr(terminal,"/");
			useron.number = 0;
			if(rlogin_name[0])
				useron.number = find_login_id(&cfg, rlogin_name);
deuce's avatar
deuce committed
			if(useron.number) {
				SAFEPRINTF(path,"%srlogin.cfg",cfg.ctrl_dir);
				if(!findstr(client.addr,path)) {
					SAFECOPY(tmp, rlogin_pass);
deuce's avatar
deuce committed
						if(stricmp(tmp,useron.pass)) {
							if(cfg.sys_misc&SM_ECHO_PW)
								safe_snprintf(str,sizeof(str),"(%04u)  %-25s  FAILED Password attempt: '%s'"
deuce's avatar
deuce committed
							else
								safe_snprintf(str,sizeof(str),"(%04u)  %-25s  FAILED Password attempt"
							badlogin(useron.alias, tmp);
							rioctl(IOFI);       /* flush input buffer */
							bputs(text[InvalidLogon]);
							bputs(text[PasswordPrompt]);
deuce's avatar
deuce committed
							console|=CON_R_ECHOX;
							getstr(tmp,LEN_PASS*2,K_UPPER|K_LOWPRIO|K_TAB);
							console&=~(CON_R_ECHOX|CON_L_ECHOX);
						}
						else {
							if(REALSYSOP && (cfg.sys_misc&SM_SYSPASSLOGIN) && (cfg.sys_misc&SM_R_SYSOP)) {
deuce's avatar
deuce committed
								rioctl(IOFI);       /* flush input buffer */
								if(!chksyspass())
									bputs(text[InvalidLogon]);
								else {
									i=0;
									break;
								}
							}
deuce's avatar
deuce committed
								break;
deuce's avatar
deuce committed
						}
					}
					if(i) {
						if(stricmp(tmp,useron.pass)) {
							if(cfg.sys_misc&SM_ECHO_PW)
								safe_snprintf(str,sizeof(str),"(%04u)  %-25s  FAILED Password attempt: '%s'"
deuce's avatar
deuce committed
							else
								safe_snprintf(str,sizeof(str),"(%04u)  %-25s  FAILED Password attempt"
							badlogin(useron.alias, tmp);
							bputs(text[InvalidLogon]);
						lprintf(LOG_DEBUG,"!CLIENT IP (%s) NOT LISTED in %s", client.addr, path);
deuce's avatar
deuce committed
						useron.number=0;
deuce's avatar
deuce committed
						hangup();
deuce's avatar
deuce committed
					}
				}
			}
					lprintf(LOG_NOTICE, "RLogin !UNKNOWN USER: '%s' (password: %s)", rlogin_name, rlogin_pass);
					lprintf(LOG_NOTICE, "RLogin !UNKNOWN USER: '%s'",rlogin_name);
rswindell's avatar
rswindell committed
		}
		if(rlogin_name[0]==0) {
			lprintf(LOG_NOTICE,"!RLogin: No user name received");
rswindell's avatar
rswindell committed
			sys_status&=~SS_RLOGIN;
	if(online && !(telnet_mode&TELNET_MODE_OFF)) {
		request_telnet_opt(TELNET_WILL,TELNET_ECHO);
		/* Will suppress Go Ahead */
		request_telnet_opt(TELNET_WILL,TELNET_SUP_GA);
		/* Retrieve terminal type and speed from telnet client --RS */
		request_telnet_opt(TELNET_DO,TELNET_TERM_TYPE);
		request_telnet_opt(TELNET_DO,TELNET_TERM_SPEED);
		request_telnet_opt(TELNET_DO,TELNET_SEND_LOCATION);
		request_telnet_opt(TELNET_DO,TELNET_NEGOTIATE_WINDOW_SIZE);
		request_telnet_opt(TELNET_DO,TELNET_NEW_ENVIRON);
#ifdef USE_CRYPTLIB
	if(sys_status&SS_SSH) {
		int  ssh_failed=0;
		bool activate_ssh = false;

		pthread_mutex_lock(&ssh_mutex);
Deucе's avatar
Deucе committed

		if (startup->options & BBS_OPT_SSH_ANYAUTH) {
			lprintf(LOG_DEBUG, "%04d SSH Setting attribute: SESSINFO_ACTIVE", client_socket);
			if(cryptStatusError(i=cryptSetAttribute(ssh_session, CRYPT_SESSINFO_ACTIVE, 1))) {
				log_crypt_error_status_sock(i, "setting session active");
				activate_ssh = false;
				// TODO: Add private key here...
Deucе's avatar
Deucе committed
				if(i == CRYPT_ENVELOPE_RESOURCE) {
					activate_ssh = set_authresponse(true);
					lprintf(LOG_DEBUG, "%04d SSH Setting attribute: SESSINFO_ACTIVE", client_socket);
					i = cryptSetAttribute(ssh_session, CRYPT_SESSINFO_ACTIVE, 1);
					if (cryptStatusError(i)) {
						log_crypt_error_status_sock(i, "setting session active");
						activate_ssh = false;
					}
					else {
						SetEvent(ssh_active);
					}
			else {
				activate_ssh = true;
				SetEvent(ssh_active);
			}
Deucе's avatar
Deucе committed
		}
		else {
			for(ssh_failed=0; ssh_failed < 3; ssh_failed++) {
				lprintf(LOG_DEBUG, "%04d SSH Setting attribute: SESSINFO_ACTIVE", client_socket);
				if(cryptStatusError(i=cryptSetAttribute(ssh_session, CRYPT_SESSINFO_ACTIVE, 1))) {
					log_crypt_error_status_sock(i, "setting session active");
					activate_ssh = false;
					// TODO: Add private key here...
					if(i != CRYPT_ENVELOPE_RESOURCE) {
						break;
					}
				}
				else {
					SetEvent(ssh_active);
					break;
				}
				free_crypt_attrstr(pubkey);
				pubkey = nullptr;
				pubkeysz = 0;
				ctmp = get_crypt_attribute(ssh_session, CRYPT_SESSINFO_USERNAME);
				if (ctmp) {
Deucе's avatar
Deucе committed
					SAFECOPY(rlogin_name, parse_login(ctmp));
					free_crypt_attrstr(ctmp);
Deucе's avatar
Deucе committed
					ctmp = get_crypt_attribute(ssh_session, CRYPT_SESSINFO_PASSWORD);
					if (ctmp) {
						SAFECOPY(tmp, ctmp);
						free_crypt_attrstr(ctmp);
					}
					else {
						free_crypt_attrstr(pubkey);
						pubkey = get_binary_crypt_attribute(ssh_session, CRYPT_SESSINFO_PUBLICKEY, &pubkeysz);
					}
					lprintf(LOG_DEBUG,"SSH login: '%s'", rlogin_name);
Deucе's avatar
Deucе committed
				else {
Deucе's avatar
Deucе committed
					rlogin_name[0] = 0;
					continue;
Deucе's avatar
Deucе committed
				}
Deucе's avatar
Deucе committed
				useron.number = find_login_id(&cfg, rlogin_name);
				if(useron.number) {
					if (getuserdat(&cfg,&useron) == 0) {
						if (pubkey) {
							if (check_pubkey(&cfg, useron.number, pubkey, pubkeysz)) {
								SAFECOPY(rlogin_pass, tmp);
								activate_ssh = set_authresponse(true);
							}
						}
						else {
							if (stricmp(tmp, useron.pass) == 0) {
								SAFECOPY(rlogin_pass, tmp);
								activate_ssh = set_authresponse(true);
							}
							else if(ssh_failed) {
								if(cfg.sys_misc&SM_ECHO_PW)
									safe_snprintf(str,sizeof(str),"(%04u)  %-25s  FAILED Password attempt: '%s'"
										,useron.number,useron.alias,tmp);
								else
									safe_snprintf(str,sizeof(str),"(%04u)  %-25s  FAILED Password attempt"
										,useron.number,useron.alias);
								logline(LOG_NOTICE,"+!",str);
								badlogin(useron.alias, tmp);
								useron.number=0;
							}
Deucе's avatar
Deucе committed
						}
					}
					else {
Deucе's avatar
Deucе committed
						lprintf(LOG_NOTICE, "SSH failed to read user data for %s", rlogin_name);
Deucе's avatar
Deucе committed
					}
Deucе's avatar
Deucе committed
				else {
Deucе's avatar
Deucе committed
					if(cfg.sys_misc&SM_ECHO_PW)
						lprintf(LOG_NOTICE, "SSH !UNKNOWN USER: '%s' (password: %s)", rlogin_name, truncsp(tmp));
					else
						lprintf(LOG_NOTICE, "SSH !UNKNOWN USER: '%s'", rlogin_name);
					badlogin(rlogin_name, tmp);
					// Enable SSH so we can create a new user...
					activate_ssh = set_authresponse(true);
Deucе's avatar
Deucе committed
				if (pubkey) {
					free_crypt_attrstr(pubkey);
					pubkey = nullptr;
				}
				if (!activate_ssh)
					set_authresponse(false);
		}
		if (activate_ssh) {
			int cid;
			char tname[1024];
			int tnamelen;

			ssh_failed=0;
			// Check the channel ID and name...
			if (cryptStatusOK(i=cryptGetAttribute(ssh_session, CRYPT_SESSINFO_SSH_CHANNEL, &cid))) {
Deucе's avatar
Deucе committed
				unsigned waits = 0;
				term_output_disabled = true;
				do {
					tnamelen = 0;
Deucе's avatar
Deucе committed
					i=cryptSetAttribute(ssh_session, CRYPT_SESSINFO_SSH_CHANNEL, cid);
					log_crypt_error_status_sock(i, "setting channel id");
Deucе's avatar
Deucе committed
					if (cryptStatusOK(i)) {
						i=cryptGetAttributeString(ssh_session, CRYPT_SESSINFO_SSH_CHANNEL_TYPE, tname, &tnamelen);
						log_crypt_error_status_sock(i, "getting channel type");
					}
					if (cryptStatusError(i)) {
						activate_ssh = false;
Deucе's avatar
Deucе committed
					if (tnamelen == 7 && strnicmp(tname, "session", 7) == 0) {
						pthread_mutex_unlock(&ssh_mutex);
						/* TODO: If there's some sort of answer timeout setting,
						 *       it would make sense to use it here... other places
						 *       appear to use arbitrary inter-character timeouts
						 *       I'll just use a five second interpacket gap for now.
						 */
						if (waits == 0)
							lprintf(LOG_DEBUG, "%04d SSH [%s] waiting for channel type.", client_socket, client_ipaddr);
Deucе's avatar
Deucе committed
						waits++;
						SLEEP(10);
						waits++;
						if (waits > 500) {
							lprintf(LOG_INFO, "%04d SSH [%s] TIMEOUT waiting for channel type.", client_socket, client_ipaddr);
							activate_ssh = false;
							break;
						}
						pthread_mutex_lock(&ssh_mutex);
						continue;
					}
					else if (tnamelen == 5 && strnicmp(tname, "shell", 5) == 0) {
Deucе's avatar
Deucе committed
						term_output_disabled = false;
						session_channel = cid;
Deucе's avatar
Deucе committed
					}
					else if (tnamelen == 9 && strncmp(tname, "subsystem", 9) == 0) {
						i=cryptGetAttributeString(ssh_session, CRYPT_SESSINFO_SSH_CHANNEL_ARG1, tname, &tnamelen);
						log_crypt_error_status_sock(i, "getting subsystem argument");
						if (cryptStatusError(i)) {
							activate_ssh = false;
							break;
						}
Deucе's avatar
Deucе committed
						if (((startup->options & (BBS_OPT_ALLOW_SFTP | BBS_OPT_SSH_ANYAUTH)) == BBS_OPT_ALLOW_SFTP) && tnamelen == 4 && strncmp(tname, "sftp", 4) == 0) {
Deucе's avatar
Deucе committed
							if (useron.number) {
								activate_ssh = init_sftp(cid);
								cols = 0;
								rows = 0;
								SAFECOPY(terminal, "sftp");
								mouse_mode = MOUSE_MODE_OFF;
								autoterm = 0;
								sys_status |= SS_USERON;
							}
							else {
								lprintf(LOG_NOTICE, "%04d Trying to create new user over sftp, disconnecting.", client_socket);
								badlogin(rlogin_name, rlogin_pass, "SSH", &client_addr, /* delay: */false);
								activate_ssh = false;
							}
						}
						else {
							lprintf(LOG_NOTICE, "%04d SSH [%s] active channel subsystem '%.*s' is not 'sftp', disconnecting.", client_socket, client_ipaddr, tnamelen, tname);
							badlogin(rlogin_name, rlogin_pass, "SSH", &client_addr, /* delay: */false);
							// Fail because there's no session.
							activate_ssh = false;
						}
					}
					else {
						lprintf(LOG_NOTICE, "%04d SSH [%s] active channel '%.*s' is not 'session' or 'subsystem', disconnecting.", client_socket, client_ipaddr, tnamelen, tname);
						badlogin(rlogin_name, rlogin_pass, "SSH", &client_addr, /* delay: */false);
						// Fail because there's no session.
						activate_ssh = false;
					}
					break;
				} while(1);
			}
			else {
				log_crypt_error_status_sock(i, "getting channel id");
				if (i == CRYPT_ERROR_PERMISSION)
					lprintf(LOG_CRIT, "!Your cryptlib build is obsolete, please update");
Deucе's avatar
Deucе committed
				activate_ssh = false;
		if (activate_ssh) {
			if(cryptStatusError(i=cryptSetAttribute(ssh_session, CRYPT_PROPERTY_OWNER, CRYPT_UNUSED))) {
				log_crypt_error_status_sock(i, "clearing owner");
				activate_ssh = false;
			}
		}
		if(!activate_ssh) {
			int status;
			lprintf(LOG_NOTICE, "%04d SSH [%s] session establishment failed", client_socket, client_ipaddr);
			if (cryptStatusError(status = cryptDestroySession(ssh_session))) {
				lprintf(LOG_ERR, "%04d SSH ERROR %d destroying Cryptlib Session %d from %s line %d"
					, client_socket, status, ssh_session, __FILE__, __LINE__);
			}
			ssh_mode = false;
			pthread_mutex_unlock(&ssh_mutex);
			useron.number = 0;
			return false;
		if (cryptStatusOK(cryptGetAttribute(ssh_session, CRYPT_SESSINFO_SSH_CHANNEL_WIDTH, &l)) && l > 0) {
			cols = l;
			lprintf(LOG_DEBUG, "%04d SSH [%s] height %d", client_socket, client.addr, cols);
		}
		if (cryptStatusOK(cryptGetAttribute(ssh_session, CRYPT_SESSINFO_SSH_CHANNEL_HEIGHT, &l)) && l > 0) {
			rows = l;
			lprintf(LOG_DEBUG, "%04d SSH [%s] height %d", client_socket, client.addr, rows);
		}
		l = 0;
		if (cryptStatusOK(cryptGetAttributeString(ssh_session, CRYPT_SESSINFO_SSH_CHANNEL_TERMINAL, terminal, &l)) && l > 0) {
			if (l < (int)sizeof(terminal))
				terminal[l] = 0;
			else
				terminal[sizeof(terminal)-1] = 0;
			lprintf(LOG_DEBUG, "%04d SSH [%s] term: %s", client_socket, client.addr, terminal);
		}
		pthread_mutex_unlock(&ssh_mutex);
Deucе's avatar
Deucе committed
		/*
		 * Just wait here until there's a session... this seems fine.
		 */

		if (!term_output_disabled) {
			if(REALSYSOP && (cfg.sys_misc&SM_SYSPASSLOGIN) && (cfg.sys_misc&SM_R_SYSOP)) {
				rioctl(IOFI);       /* flush input buffer */
				if(!chksyspass()) {
					bputs(text[InvalidLogon]);
					hangup();
					useron.number=0;
					return(false);
				}
	/* Detect terminal type */
Deucе's avatar
Deucе committed
	if (!term_output_disabled) {
		mswait(200);	// Allow some time for Telnet negotiation
		rioctl(IOFI);		/* flush input buffer */
		safe_snprintf(str, sizeof(str), "%s  %s", VERSION_NOTICE, COPYRIGHT_NOTICE);
		if(autoterm&PETSCII) {
			SAFECOPY(terminal, "PETSCII");
			outchar(FF);
			center(str);
		} else {	/* ANSI+ terminal detection */
			putcom( "\r\n"		/* locate cursor at column 1 */
					"\x1b[s"	/* save cursor position (necessary for HyperTerm auto-ANSI) */
					"\x1b[0c"	/* Request CTerm version */
				"\x1b[255B"	/* locate cursor as far down as possible */
					"\x1b[255C"	/* locate cursor as far right as possible */
					"\b_"		/* need a printable char at this location to actually move cursor */
					"\x1b[6n"	/* Get cursor position */
					"\x1b[u"	/* restore cursor position */
					"\x1b[!_"	/* RIP? */
		#ifdef SUPPORT_ZUULTERM
					"\x1b[30;40m\xc2\x9f""Zuul.connection.write('\\x1b""Are you the gatekeeper?')\xc2\x9c"	/* ZuulTerm? */
		#endif
					"\r"		/* Move cursor left */
					"\xef\xbb\xbf"	// UTF-8 Zero-width non-breaking space
					"\x1b[6n"	/* Get cursor position (again) */
					"\x1b[0m_"	/* "Normal" colors */
					"\x1b[2J"	/* clear screen */
					"\x1b[H"	/* home cursor */
					"\xC"		/* clear screen (in case not ANSI) */
					"\r"		/* Move cursor left (in case previous char printed) */
					);
			i=l=0;
			row=0;
			lncntr=0;
			center(str);

			while(i++<50 && l<(int)sizeof(str)-1) { 	/* wait up to 5 seconds for response */
				c=incom(100)&0x7f;
				if(c==0)
					continue;
				i=0;
				if(l==0 && c!=ESC)	// response must begin with escape char
					continue;
				str[l++]=c;
				if(c=='R') {   /* break immediately if ANSI response */
					mswait(500);
					break; 
				}
rswindell's avatar
rswindell committed
			}
Deucе's avatar
Deucе committed
			while((c=(incom(100)&0x7f))!=0 && l<(int)sizeof(str)-1)
				str[l++]=c;
			str[l]=0;
Deucе's avatar
Deucе committed
			if(l) {
				truncsp(str);
				c_escape_str(str,tmp,sizeof(tmp)-1,TRUE);
				lprintf(LOG_DEBUG,"received terminal auto-detection response: '%s'", tmp);
Deucе's avatar
Deucе committed
				if(strstr(str,"RIPSCRIP")) {
					if(terminal[0]==0)
						SAFECOPY(terminal,"RIP");
					logline("@R",strstr(str,"RIPSCRIP"));
					autoterm|=(RIP|COLOR|ANSI); 
				}
		#ifdef SUPPORT_ZUULTERM
				else if(strstr(str,"Are you the gatekeeper?"))  {
					if(terminal[0]==0)
						SAFECOPY(terminal,"HTML");
					logline("@H",strstr(str,"Are you the gatekeeper?"));
					autoterm|=HTML;
				} 
		#endif

				char* tokenizer = NULL;
				char* p = strtok_r(str, "\x1b", &tokenizer);
				unsigned cursor_pos_report = 0;
				while(p != NULL) {
					int	x,y;

					if(terminal[0]==0)
						SAFECOPY(terminal,"ANSI");
					autoterm|=(ANSI|COLOR);
					if(sscanf(p, "[%u;%uR", &y, &x) == 2) {
						cursor_pos_report++;
						lprintf(LOG_DEBUG,"received ANSI cursor position report [%u]: %ux%u"
							,cursor_pos_report, x, y);
						if(cursor_pos_report == 1) {
							/* Sanity check the coordinates in the response: */
							if(x >= TERM_COLS_MIN && x <= TERM_COLS_MAX) cols=x; 
							if(y >= TERM_ROWS_MIN && y <= TERM_ROWS_MAX) rows=y;
						} else {	// second report
Rob Swindell's avatar
Rob Swindell committed
						if(x < 3) {	// ZWNBSP didn't move cursor (more than one column)
Deucе's avatar
Deucе committed
								autoterm |= UTF8;
Rob Swindell's avatar
Rob Swindell committed
							unicode_zerowidth = x - 1;
						}
Deucе's avatar
Deucе committed
						}
					} else if(sscanf(p, "[=67;84;101;114;109;%u;%u", &x, &y) == 2 && *lastchar(p) == 'c') {
						lprintf(LOG_INFO,"received CTerm version report: %u.%u", x, y);
						cterm_version = (x*1000) + y;
Deucе's avatar
Deucе committed
					p = strtok_r(NULL, "\x1b", &tokenizer);
rswindell's avatar
rswindell committed
				}
Deucе's avatar
Deucе committed
			rioctl(IOFI); /* flush left-over or late response chars */
Deucе's avatar
Deucе committed
			if(!autoterm) {
				autoterm |= NO_EXASCII;
				if(str[0]) {
					c_escape_str(str,tmp,sizeof(tmp)-1,TRUE);
					lprintf(LOG_NOTICE,"terminal auto-detection failed, response: '%s'", tmp);
				}
Deucе's avatar
Deucе committed
			if(terminal[0])
				lprintf(LOG_DEBUG, "auto-detected terminal type: %ux%u %s", cols, rows, terminal);
			else
				SAFECOPY(terminal,"DUMB");
rswindell's avatar
rswindell committed
		}
Deucе's avatar
Deucе committed
		/* AutoLogon via IP or Caller ID here */
		if(!useron.number && !(sys_status&SS_RLOGIN)
			&& (startup->options&BBS_OPT_AUTO_LOGON) && client_ipaddr[0]) {
			useron.number = finduserstr(0, USER_IPADDR, client_ipaddr);
			if(useron.number) {
				getuserdat(&cfg, &useron);
				if(!(useron.misc&AUTOLOGON) || !(useron.exempt&FLAG('V')))
					useron.number=0;
			}
Deucе's avatar
Deucе committed
		if(!online) {
			useron.number=0;
			return(false); 
		}
Deucе's avatar
Deucе committed
		if(!(telnet_mode&TELNET_MODE_OFF)) {
			/* Stop the input thread from writing to the telnet_* vars */
			pthread_mutex_lock(&input_thread_mutex);

			if(telnet_cmds_received) {
				if(stricmp(telnet_terminal,"sexpots")==0) {	/* dial-up connection (via SexPOTS) */
					SAFEPRINTF2(str,"%s connection detected at %u bps", terminal, cur_rate);
					logline("@S",str);
					node_connection = (ushort)cur_rate;
					SAFEPRINTF(connection,"%u",cur_rate);
					SAFECOPY(cid,"Unknown");
					SAFECOPY(client_name,"Unknown");
					if(telnet_location[0]) {			/* Caller-ID info provided */
						SAFEPRINTF(str, "CID: %s", telnet_location);
						logline("@*",str);
						SAFECOPY(cid,telnet_location);
						truncstr(cid," ");				/* Only include phone number in CID */
						char* p=telnet_location;
						FIND_WHITESPACE(p);
						SKIP_WHITESPACE(p);
						if(*p) {
							SAFECOPY(client_name,p);	/* CID name, if provided (maybe 'P' or 'O' if private or out-of-area) */
						}
Deucе's avatar
Deucе committed
					SAFECOPY(client.addr,cid);
					SAFECOPY(client.host,client_name);
					client_on(client_socket,&client,TRUE /* update */);
				} else {
					if(telnet_location[0]) {			/* Telnet Location info provided */
						lprintf(LOG_INFO, "Telnet Location: %s", telnet_location);
						if(trashcan(telnet_location, "ip-silent")) {
							hangup();
							return false;
						}
						if(trashcan(telnet_location, "ip")) {
							lprintf(LOG_NOTICE, "%04d %s !TELNET LOCATION BLOCKED in ip.can: %s"
								,client_socket, client.protocol, telnet_location);
							hangup();
							return false;
						}
						SAFECOPY(cid, telnet_location);
rswindell's avatar
rswindell committed
				}
Deucе's avatar
Deucе committed
				if(telnet_speed) {
					lprintf(LOG_INFO, "Telnet Speed: %u bps", telnet_speed);
					cur_rate = telnet_speed;
					cur_cps = telnet_speed/10;
				}
				if(telnet_terminal[0])
					SAFECOPY(terminal, telnet_terminal);
				if(telnet_cols >= TERM_COLS_MIN && telnet_cols <= TERM_COLS_MAX)
					cols = telnet_cols;
				if(telnet_rows >= TERM_ROWS_MIN && telnet_rows <= TERM_ROWS_MAX)
					rows = telnet_rows;
			} else {
				lprintf(LOG_NOTICE, "no Telnet commands received, reverting to Raw TCP mode");
				telnet_mode |= TELNET_MODE_OFF;
				client.protocol = "Raw";
				client_on(client_socket, &client,/* update: */true);
				SAFECOPY(connection, client.protocol);
				node_connection = NODE_CONNECTION_RAW;
rswindell's avatar
rswindell committed
			}
Deucе's avatar
Deucе committed
			pthread_mutex_unlock(&input_thread_mutex);
	lprintf(LOG_INFO, "terminal type: %ux%u %s %s", cols, rows, term_charset(autoterm), terminal);
Deucе's avatar
Deucе committed
		SAFECOPY(client_ipaddr, cid);	/* Over-ride IP address with Caller-ID info */
		SAFECOPY(useron.comp,client_name);
	}
Deucе's avatar
Deucе committed
	if (!term_output_disabled) {
		if(!useron.number 
			&& rlogin_name[0]!=0 
			&& !(cfg.sys_misc&SM_CLOSED) 
			&& !find_login_id(&cfg, rlogin_name)
			&& !::trashcan(&cfg, rlogin_name, "name")) {
			lprintf(LOG_INFO, "%s !UNKNOWN specified username: '%s', starting new user sign-up", client.protocol,rlogin_name);
			bprintf("%s: %s\r\n", text[UNKNOWN_USER], rlogin_name);
			newuser();
		}
Deucе's avatar
Deucе committed
		if(!useron.number) {	/* manual/regular logon */

			/* Display ANSWER screen */
			rioctl(IOSM|PAUSE);
			sys_status|=SS_PAUSEON;
			menu("../answer");	// Should use P_NOABORT ?
			sys_status&=~SS_PAUSEON;
			exec_bin(cfg.login_mod,&main_csi);
		} else	/* auto logon here */
			if(logon()==false)
				return(false);
	}

	if(!useron.number)
		hangup();

	if(!(sys_status&SS_USERON)) {
		errormsg(WHERE,ERR_CHK,"User not logged on",sys_status);
	if(useron.pass[0])
		loginSuccess(startup->login_attempt_list, &client_addr);

	max_socket_inactivity = startup->max_session_inactivity;