1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
|
/***************************************************************************
* Copyright (C) 2005 by Joris Guisson *
* [email protected] *
* *
* This program is free software; you can redistribute it and/or modify *
* it under the terms of the GNU General Public License as published by *
* the Free Software Foundation; either version 2 of the License, or *
* (at your option) any later version. *
* *
* This program is distributed in the hope that it will be useful, *
* but WITHOUT ANY WARRANTY; without even the implied warranty of *
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the *
* GNU General Public License for more details. *
* *
* You should have received a copy of the GNU General Public License *
* along with this program; if not, write to the *
* Free Software Foundation, Inc., *
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. *
***************************************************************************/
#include <mse/streamsocket.h>
#include <util/sha1hash.h>
#include <util/log.h>
#include <util/log.h>
#include "globals.h"
#include "server.h"
#include "peermanager.h"
#include "serverauthenticate.h"
#include "peerid.h"
#include "torrent.h"
#include "ipblocklist.h"
namespace bt
{
bool ServerAuthenticate::s_firewalled = true;
ServerAuthenticate::ServerAuthenticate(mse::StreamSocket* sock,Server* server)
: AuthenticateBase(sock),server(server)
{
}
ServerAuthenticate::~ServerAuthenticate()
{
}
void ServerAuthenticate::onFinish(bool succes)
{
Out(SYS_CON|LOG_NOTICE) << "Authentication(S) to " << sock->getRemoteIPAddress()
<< " : " << (succes ? "ok" : "failure") << endl;
finished = true;
setFirewalled(false);
if (!succes)
{
sock->deleteLater();
sock = 0;
}
timer.stop();
}
void ServerAuthenticate::handshakeRecieved(bool full)
{
Uint8* hs = handshake;
IPBlocklist& ipfilter = IPBlocklist::instance();
QString IP = sock->getRemoteIPAddress();
if (ipfilter.isBlocked( IP ))
{
onFinish(false);
return;
}
// try to find a PeerManager which has te right info hash
SHA1Hash rh(hs+28);
PeerManager* pman = server->findPeerManager(rh);
if (!pman)
{
Out(SYS_GEN|LOG_DEBUG) << "Cannot find PeerManager for hash : " << rh.toString() << endl;
onFinish(false);
return;
}
if (full)
{
// check if we aren't connecting to ourself
char tmp[21];
tmp[20] = '\0';
memcpy(tmp,hs+48,20);
PeerID peer_id = PeerID(tmp);
if (pman->getTorrent().getPeerID() == peer_id)
{
Out(SYS_CON|LOG_NOTICE) << "Lets not connect to our self" << endl;
onFinish(false);
return;
}
// check if we aren't already connected to the client
if (pman->connectedTo(peer_id))
{
Out(SYS_CON|LOG_NOTICE) << "Already connected to " << peer_id.toString() << endl;
onFinish(false);
return;
}
// send handshake and finish off
sendHandshake(rh,pman->getTorrent().getPeerID());
onFinish(true);
// hand over connection
pman->newConnection(sock,peer_id,supportedExtensions());
sock = 0;
}
else
{
// if the handshake wasn't fully received just send our handshake
sendHandshake(rh,pman->getTorrent().getPeerID());
}
}
}
#include "serverauthenticate.moc"
|