# sentinel.tcl v2.70 (15 April 2002)
# Copyright 1998-2002 by slennox
# slennox's eggdrop page - http://www.egghelp.org/
# Flood protection system for eggdrop, with integrated BitchX CTCP
# simulation. This script is designed to provide strong protection for your
# bot and channels against large floodnets and proxy floods.
#
# Note that this script was developed on the eggdrop 1.3, 1.4, and 1.6
# series and may not work properly on other versions.
#
# v2.00 - New standalone release. Contains refinements and features from
# the netbots.tcl version of sentinel.tcl.
# v2.50 - Locktimes of less than 30 were erroneously allowed.
# putquick -next is now supported (eggdrop 1.5+) for faster channel
# lock.
# - Ban mechanism now checks if flooders are coming from the same
# domain or ident and performs wildcard bans instead of banning
# each IP/host individually.
# - Added tsunami detection to the avalanche flood detection system.
# - Variables are now cleared after removing a channel.
# - Removed unnecessary botonchan checks throughout components where
# botisop already checks for that.
# - Removed all unnecessary use of parentheses.
# v2.60 - Modified putquick compatibility proc.
# - Added sl_wideban option to make domain/ident bans optional.
# - Fixed typos in various ban-related functions.
# - Unused procs are now unloaded.
# - Wildcard bans covering domains/idents were not doing proper
# checks on join-part flooders.
# v2.70 - Fixed "allbans" error which could occur when sl_wideban is
# disabled.
# - Added sl_masktype option, currently offering three different
# ban/ignore mask types.
# - Merged unsets in sl_unsetarray.
# - Changed use of "split" in timers to the less ugly "list".
#
# sentinel.tcl is centered around its channel lock mechanism. It sets the
# channel +mi (moderated and invite-only) whenever a substantial flood on
# the channel is detected. This ensures channel stability when flooded,
# allowing the bots to deal with the flood as smoothly as possible.
# sentinel.tcl detects the following types of floods:
#
# * Channel CTCP floods. This is the most common type of flood, and will
# often make users quit from the channel with 'Excess Flood'. A quick
# channel lock can prevent this.
# * Channel join-part floods. A common type of channel flood in which many
# floodbots cycle the channel.
# * Channel nick floods. Nick floods are unique in that they can occur even
# after a channel is locked. sentinel has special mechanisms to deal with
# this as effectively as possible.
# * Channel avalanche/tsunami floods. While the avalanche flood is quite
# uncommon these days, tsunami floods are often used to seriously lag
# mIRC and other clients using control codes (colour, bold, underline,
# etc.)
# * Channel text floods. Not small text floods - but when hundreds of
# messages are sent to the channel within a short period. Detected to
# stop really aggressive text floods and reduce the possibility of the
# bot crashing or consuming excessive CPU.
#
# sentinel also has additional protection features for the bot and channel:
#
# * Bogus username detection. Users with annoying bogus characters in their
# ident are banned. A channel lock is applied if multiple join in a short
# period.
# * Full ban list detection. During a serious flood, the ban list may
# become full. If this happens, the bots may start kick flooding since
# they cannot ban. If the ban list is full, the channel will be set +i.
# * Bot CTCP flood protection. Protects the bot if it is CTCP flooded.
# * Bot MSG flood protection. Protects the bot if it's flooded with MSGs or
# MSG commands.
# * Automatic bans and ignores. During a flood, sentinel will compile a
# list of the flooders, then kick-ban them after the channel has been
# locked.
# * BitchX simulation. This has been built-in mainly because you cannot use
# a third-party BitchX simulator with sentinel (only one script at a time
# can have control of CTCPs). sentinel provides accurate simulation of
# BitchX 75p1+ and 75p3+ CTCP replies and AWAY mode.
# * Public commands (lc and uc) and DCC commands (.lock and .unlock) for
# locking/unlocking channels.
# * DCC command .sentinel displays current settings.
#
# Important Notes:
# - Make sure no bots are enforcing channel mode -i and/or -m.
# - Bans are added to the bot's internal ban list, and expire after 24
# hours by default. If you have +dynamicbans set, the bans may be removed
# from the channel much sooner than this, but the ban will remain in the
# bot's internal ban list until it expires.
# - For greater protection against large channel floods, I recommend you
# also use a channel limiter script, such as chanlimit.tcl.
# - There is a trade-off between convenience and security. The more
# automation you enable, the more stress the bot will be under during a
# flood and the more stuff it will be sending to the server.
# - Where security is paramount, have one or two bots that aren't running
# sentinel.tcl. Since sentinel.tcl is a complex script with many
# automated and convenience features, there is a potential for
# vulnerabilities.
# The following flood settings are in number:seconds format, 0:0 to
# disable.
# Bot CTCP flood.
set sl_bcflood 5:30
# Bot MSG flood.
set sl_bmflood 6:20
# Channel CTCP flood.
set sl_ccflood 5:20
# Channel avalanche/tsunami flood.
set sl_avflood 6:20
# Channel text flood.
set sl_txflood 80:30
# Channel bogus username join flood.
set sl_boflood 4:20
# Channel join-part flood.
set sl_jflood 6:20
# Channel nick flood.
set sl_nkflood 6:20
# Flood setting notes:
# - Don't fiddle too much with the seconds field in the flood settings, as
# it can reduce the effectiveness of the script. The seconds field should
# set in the 20-60 seconds range.
# - Avalanche/tsunmami flood detection may be CPU intensive on a busy
# channel, although I don't think it's a big deal on most systems. If
# you're concerned about CPU usage you may wish to disable it, perhaps
# leaving it enabled on one bot. Disabling text flood protection can
# further reduce CPU usage.
# - On bots with avalanche/tsunami flood detection enabled, it's
# recommended that you also enable text flood detection to cap CPU usage
# during a flood.
# - If you enable nick flood detection, it's strongly recommended that it
# be enabled on all bots that have sentinel.tcl loaded. This is required
# for effective nick flood handling.
# Specify the number of control characters that must be in a line before
# it's counted by the tsunami flood detector. For efficiency reasons,
# tsunami detection is implemented with avalanche detection, so sl_avflood
# must be enabled for tsunami detection to be active. Setting this to 0
# will disable tsunami detection.
set sl_tsunami 10
# Valid settings: 0 to disable, otherwise 1 or higher.
# Length of time in minutes to ban channel flooders. This makes the bot
# perform kicks and bans on flooders after the channel lock. Because of the
# reactive nature of automatic bans, you should disable this on at least
# one bot for the most effective protection.
set sl_ban 1440
# Valid settings: 0 to disable, otherwise 1 or higher.
# Length of time in minutes of on-join bans for bogus usernames. For the
# most effective protection, you should disable this on at least one bot.
set sl_boban 1440
# Valid settings: 0 to disable, otherwise 1 or higher.
# Set global bans on channel flooders and bogus usernames?
set sl_globalban 0
# Valid settings: 1 for global bans, 0 for channel-specific bans.
# When processing a list of flooders, sentinel.tcl compares the hosts to
# see if multiple flooders are coming from a particular domain/IP or using
# the same ident (e.g. different vhosts on a single user account). If
# multiple flooders come from the same domain/IP, or if multiple flooders
# have the same ident, then the whole domain/IP (i.e. *!*@*.domain.com or
# *!*@555.555.555.*) or ident (i.e. *!*username@*) is banned. If you
# disable this option, all bans will be in *!*@machine.domain.com and
# *!*@555.555.555.555 format.
set sl_wideban 1
# Valid settings: 1 to enable, 0 to disable.
# Maximum number of bans allowed in the bot's ban list before sentinel will
# stop adding new bans. This prevents the bot from adding hundreds of bans
# on really large floods. Note that this has nothing to do with the channel
# ban list.
set sl_banmax 100
# Valid settings: 1 or higher.
# Length of time in minutes to ignore bot flooders. On bots with sl_ban
# active, channel flooders are also added to the ignore list.
set sl_igtime 240
# Valid settings: 1 or higher.
# Select the type of hostmask to use when banning and/or ignoring flooders.
# There are three to choose from:
# 0 - *!*@machine.domain.com / *!*@555.555.555.555
# 1 - *!*ident@machine.domain.com / *!*ident@555.555.555.555
# 2 - *!*ident@*.domain.com / *!*ident@555.555.555.*
# The default option, 0, is strongly recommended for most situations, and
# provides the best level of protection. The other two options are provided
# mainly for special cases.
set sl_masktype 0
# Valid settings: 0, 1, or 2, depending on the hostmask type you wish to use.
# Length of time in seconds to set channel +i if flooded. If set to 0, +i
# will not be removed automatically.
set sl_ilocktime 120
# Valid settings: 0 to prevent +i being removed automatically, otherwise 30
# or higher.
# Length of time in seconds to set channel +m if flooded. If set to 0, +m
# will not be removed automatically.
set sl_mlocktime 60
# Valid settings: 0 to prevent +m being removed automatically, otherwise 30
# or higher.
# On small floods (two flooders or less), remove the +mi shortly after bans
# have been set, instead of waiting for the locktimes to expire? This
# prevents unnecessary extended locks on small floods. This setting is only
# used by bots with sl_ban enabled.
set sl_shortlock 0
# Valid settings: 0 to disable, 1 to enable.
# Number of bans to allow in the channel ban list before setting the
# channel +i. If enabled, this should preferably be set to just below the
# maximum number of bans allowed.
set sl_bfmaxbans 19
# Valid settings: 0 to disable +i on full ban list, otherwise 1 or higher.
# List of users to send a note to when channel is flooded, bot is flooded,
# or ban list becomes full.
set sl_note "YourNick"
# Valid settings: one user like "Tom", a list of users like
# "Tom Dick Harry", or "" to specify that no notes are sent.
# Notice to send to channel when locked due to flood.
set sl_cfnotice "Channel locked temporarily due to flood, sorry for any inconvenience this may cause :-)"
# Valid settings: a text string, or set it to "" to disable.
# Notice to send to channel when locked due to full ban list.
set sl_bfnotice "Channel locked temporarily due to full ban list, sorry for any inconvenience this may cause :-)"
# Valid settings: a text string, or set it to "" to disable.
# Enable 'lc' and 'uc' public commands for locking/unlocking channel?
set sl_lockcmds 2
# Valid settings: 0 to disable, 1 to enable, 2 to require user to be opped
# on the channel to use the command.
# Users with these flags are allowed to use lc/uc public commands, and
# .lock/.unlock DCC commands.
set sl_lockflags "o"
# Valid settings: one flag like "n", or a list of flags like "fo" (means
# 'f OR o').
# Enable BitchX CTCP and AWAY simulation?
set sl_bxsimul 0
# Valid settings: 1 to enable, 0 to disable.
# Don't edit below unless you know what you're doing.
if {$numversion < 1032400} {
proc botonchan {chan} {
global botnick
if {![validchan $chan]} {
error "illegal channel: $chan"
} elseif {![onchan $botnick $chan]} {
return 0
}
return 1
}
proc putquick {text args} {
putserv $text
}
}
proc sl_ctcp {nick uhost hand dest key arg} {
global botnet-nick botnick realname sl_ban sl_bflooded sl_bcflood sl_bcqueue sl_bxjointime sl_bxmachine sl_bxonestack sl_bxsimul sl_bxsystem sl_bxversion sl_bxwhoami sl_ccbanhost sl_ccbannick sl_ccflood sl_ccqueue sl_flooded sl_locked sl_note
set chan [string tolower $dest]
if {[lsearch -exact $sl_ccflood 0] == -1 && [validchan $chan] && ![isop $nick $chan]} {
if {$nick == $botnick} {return 0}
if {$sl_ban && !$sl_locked($chan) && ![matchattr $hand f|f $chan]} {
lappend sl_ccbannick($chan) $nick ; lappend sl_ccbanhost($chan) [string tolower $uhost]
utimer [lindex $sl_ccflood 1] [list sl_ccbanqueue $chan]
}
if {$sl_flooded($chan)} {return 1}
incr sl_ccqueue($chan)
utimer [lindex $sl_ccflood 1] [list sl_ccqueuereset $chan]
if {$sl_ccqueue($chan) >= [lindex $sl_ccflood 0]} {
sl_lock $chan "CTCP flood" ${botnet-nick} ; return 1
}
if {$sl_bflooded} {return 1}
} elseif {[lindex $sl_bcflood 0] && $dest == $botnick} {
if {$sl_bflooded} {
sl_ignore [string tolower $uhost] $hand "CTCP flooder" ; return 1
}
incr sl_bcqueue
utimer [lindex $sl_bcflood 1] {incr sl_bcqueue -1}
if {$sl_bcqueue >= [lindex $sl_bcflood 0]} {
putlog "sentinel: CTCP flood detected on me! Stopped answering CTCPs temporarily."
set sl_bflooded 1
utimer [lindex $sl_bcflood 1] {set sl_bflooded 0}
if {[info commands sendnote] != ""} {
foreach recipient $sl_note {
if {[validuser $recipient]} {
sendnote SENTINEL $recipient "Bot was CTCP flooded."
}
}
}
return 1
}
}
if {!$sl_bxsimul} {return 0}
if {$sl_bxonestack} {return 1}
set sl_bxonestack 1 ; utimer 2 {set sl_bxonestack 0}
switch -exact -- $key {
"CLIENTINFO" {
set bxcmd [string toupper $arg]
switch -exact -- $bxcmd {
"" {putserv "NOTICE $nick :\001CLIENTINFO SED UTC ACTION DCC CDCC BDCC XDCC VERSION CLIENTINFO USERINFO ERRMSG FINGER TIME PING ECHO INVITE WHOAMI OP OPS UNBAN IDENT XLINK UPTIME :Use CLIENTINFO <COMMAND> to get more specific information\001"}
"SED" {putserv "NOTICE $nick :\001CLIENTINFO SED contains simple_encrypted_data\001"}
"UTC" {putserv "NOTICE $nick :\001CLIENTINFO UTC substitutes the local timezone\001"}
"ACTION" {putserv "NOTICE $nick :\001CLIENTINFO ACTION contains action descriptions for atmosphere\001"}
"DCC" {putserv "NOTICE $nick :\001CLIENTINFO DCC requests a direct_client_connection\001"}
"CDCC" {putserv "NOTICE $nick :\001CLIENTINFO CDCC checks cdcc info for you\001"}
"BDCC" {putserv "NOTICE $nick :\001CLIENTINFO BDCC checks cdcc info for you\001"}
"XDCC" {putserv "NOTICE $nick :\001CLIENTINFO XDCC checks cdcc info for you\001"}
"VERSION" {putserv "NOTICE $nick :\001CLIENTINFO VERSION shows client type, version and environment\001"}
"CLIENTINFO" {putserv "NOTICE $nick :\001CLIENTINFO CLIENTINFO gives information about available CTCP commands\001"}
"USERINFO" {putserv "NOTICE $nick :\001CLIENTINFO USERINFO returns user settable information\001"}
"ERRMSG" {putserv "NOTICE $nick :\001CLIENTINFO ERRMSG returns error messages\001"}
"FINGER" {putserv "NOTICE $nick :\001CLIENTINFO FINGER shows real name, login name and idle time of user\001"}
"TIME" {putserv "NOTICE $nick :\001CLIENTINFO TIME tells you the time on the user's host\001"}
"PING" {putserv "NOTICE $nick :\001CLIENTINFO PING returns the arguments it receives\001"}
"ECHO" {putserv "NOTICE $nick :\001CLIENTINFO ECHO returns the arguments it receives\001"}
"INVITE" {putserv "NOTICE $nick :\001CLIENTINFO INVITE invite to channel specified\001"}
"WHOAMI" {putserv "NOTICE $nick :\001CLIENTINFO WHOAMI user list information\001"}
"OP" {putserv "NOTICE $nick :\001CLIENTINFO OP ops the person if on userlist\001"}
"OPS" {putserv "NOTICE $nick :\001CLIENTINFO OPS ops the person if on userlist\001"}
"UNBAN" {putserv "NOTICE $nick :\001CLIENTINFO UNBAN unbans the person from channel\001"}
"IDENT" {putserv "NOTICE $nick :\001CLIENTINFO IDENT change userhost of userlist\001"}
"XLINK" {putserv "NOTICE $nick :\001CLIENTINFO XLINK x-filez rule\001"}
"UPTIME" {putserv "NOTICE $nick :\001CLIENTINFO UPTIME my uptime\001"}
"default" {putserv "NOTICE $nick :\001ERRMSG CLIENTINFO: $arg is not a valid function\001"}
}
return 1
}
"VERSION" {
putserv "NOTICE $nick :\001VERSION \002BitchX-$sl_bxversion\002 by panasync \002-\002 $sl_bxsystem :\002 Keep it to yourself!\002\001"
return 1
}
"USERINFO" {
putserv "NOTICE $nick :\001USERINFO \001"
return 1
}
"FINGER" {
putserv "NOTICE $nick :\001FINGER $realname ($sl_bxwhoami@$sl_bxmachine) Idle [expr [unixtime] - $sl_bxjointime] seconds\001"
return 1
}
"PING" {
putserv "NOTICE $nick :\001PING $arg\001"
return 1
}
"ECHO" {
if {[validchan $chan]} {return 1}
putserv "NOTICE $nick :\001ECHO [string range $arg 0 59]\001"
return 1
}
"ERRMSG" {
if {[validchan $chan]} {return 1}
putserv "NOTICE $nick :\001ERRMSG [string range $arg 0 59]\001"
return 1
}
"INVITE" {
if {$arg == "" || [validchan $chan]} {return 1}
set chanarg [lindex [split $arg] 0]
if {((($sl_bxversion == "75p1+") && ([string trim [string index $chanarg 0] "#+&"] == "")) || (($sl_bxversion == "75p3+") && ([string trim [string index $chanarg 0] "#+&!"] == "")))} {
if {[validchan $chanarg]} {
putserv "NOTICE $nick :\002BitchX\002: Access Denied"
} else {
putserv "NOTICE $nick :\002BitchX\002: I'm not on that channel"
}
}
return 1
}
"WHOAMI" {
if {[validchan $chan]} {return 1}
putserv "NOTICE $nick :\002BitchX\002: Access Denied"
return 1
}
"OP" -
"OPS" {
if {$arg == "" || [validchan $chan]} {return 1}
putserv "NOTICE $nick :\002BitchX\002: I'm not on [lindex [split $arg] 0], or I'm not opped"
return 1
}
"UNBAN" {
if {$arg == "" || [validchan $chan]} {return 1}
if {[validchan [lindex [split $arg] 0]]} {
putserv "NOTICE $nick :\002BitchX\002: Access Denied"
} else {
putserv "NOTICE $nick :\002BitchX\002: I'm not on that channel"
}
return 1
}
}
return 0
}
proc sl_bmflood {nick uhost hand text} {
global sl_bmflood sl_bflooded sl_bmqueue sl_note
if {[matchattr $hand b] && [string tolower [lindex [split $text] 0]] == "go"} {return 0}
if {$sl_bflooded} {
sl_ignore [string tolower $uhost] $hand "MSG flooder" ; return 0
}
incr sl_bmqueue
utimer [lindex $sl_bmflood 1] {incr sl_bmqueue -1}
if {$sl_bmqueue >= [lindex $sl_bmflood 0]} {
putlog "sentinel: MSG flood detected on me! Stopped answering MSGs temporarily."
set sl_bflooded 1
utimer [lindex $sl_bmflood 1] {set sl_bflooded 0}
if {[info commands sendnote] != ""} {
foreach recipient $sl_note {
if {[validuser $recipient]} {
sendnote SENTINEL $recipient "Bot was MSG flooded."
}
}
}
}
return 0
}
proc sl_avflood {from keyword arg} {
global botnet-nick botnick sl_ban sl_avbanhost sl_avbannick sl_avflood sl_avqueue sl_flooded sl_locked sl_txflood sl_txqueue
set arg [split $arg]
set chan [string tolower [lindex $arg 0]]
if {![validchan $chan]} {return 0}
set nick [lindex [split $from !] 0]
if {$nick == $botnick || $nick == "" || [string match *.* $nick]} {return 0}
if {![onchan $nick $chan] || [isop $nick $chan]} {return 0}
if {!$sl_flooded($chan) && [lsearch -exact $sl_txflood 0] == -1} {
incr sl_txqueue($chan)
if {$sl_txqueue($chan) >= [lindex $sl_txflood 0]} {
sl_lock $chan "TEXT flood" ${botnet-nick}
}
}
set text [join [lrange $arg 1 end]]
if {[sl_checkaval $text] && [lsearch -exact $sl_avflood 0] == -1} {
set uhost [string trimleft [getchanhost $nick $chan] "~+-^="]
set hand [nick2hand $nick $chan]
if {$sl_ban && !$sl_locked($chan) && $nick != $botnick && ![matchattr $hand f|f $chan]} {
lappend sl_avbannick($chan) $nick ; lappend sl_avbanhost($chan) [string tolower $uhost]
utimer [lindex $sl_avflood 1] [list sl_avbanqueue $chan]
}
if {$sl_flooded($chan)} {return 0}
incr sl_avqueue($chan)
utimer [lindex $sl_avflood 1] [list sl_avqueuereset $chan]
if {$sl_avqueue($chan) >= [lindex $sl_avflood 0]} {
sl_lock $chan "AVALANCHE/TSUNAMI flood" ${botnet-nick}
}
}
return 0
}
proc sl_checkaval {text} {
global sl_tsunami
if {[regsub -all -- "\001|\007" $text "" temp] >= 3} {return 1}
if {$sl_tsunami && [regsub -all -- "\002|\003|\017|\026|\037" $text "" temp] >= $sl_tsunami} {return 1}
return 0
}
proc sl_nkflood {nick uhost hand chan newnick} {
global botnet-nick botnick sl_ban sl_banmax sl_flooded sl_globalban sl_locked sl_nickkick sl_nkbanhost sl_nkflood sl_nkflooding sl_nkqueue
set chan [string tolower $chan]
if {[isop $newnick $chan]} {return 0}
if {$sl_ban && !$sl_locked($chan) && $nick != $botnick && ![matchattr $hand f|f $chan]} {
lappend sl_nkbanhost($chan) [string tolower $uhost]
utimer [lindex $sl_nkflood 1] [list sl_nkbanqueue $chan]
}
if {!$sl_nickkick && $sl_flooded($chan) && $sl_locked($chan)} {
putserv "KICK $chan $newnick :NICK flooder"
set sl_nickkick 1 ; set sl_nkflooding($chan) [unixtime]
if {$sl_ban} {
set bhost [string tolower [sl_masktype $uhost]]
if {$sl_globalban} {
if {[llength [banlist]] < $sl_banmax && ![isban $bhost] && ![matchban $bhost]} {
newban $bhost sentinel "NICK flooder" $sl_ban
}
} else {
if {[llength [banlist $chan]] < $sl_banmax && ![isban $bhost $chan] && ![matchban $bhost $chan]} {
newchanban $chan $bhost sentinel "NICK flooder" $sl_ban
}
}
}
utimer [expr [rand 2] + 3] {set sl_nickkick 0}
return 0
}
if {$sl_flooded($chan)} {return 0}
incr sl_nkqueue($chan)
utimer [lindex $sl_nkflood 1] [list sl_nkqueuereset $chan]
if {$sl_nkqueue($chan) >= [lindex $sl_nkflood 0]} {
sl_lock $chan "NICK flood" ${botnet-nick}
}
return 0
}
proc sl_jflood {nick uhost hand chan} {
global botnet-nick botnick sl_ban sl_banmax sl_boban sl_bobanhost sl_bobannick sl_boflood sl_boqueue sl_flooded sl_globalban sl_jbanhost sl_jbannick sl_jflood sl_jqueue sl_locked sl_pqueue
if {$nick == $botnick} {
sl_setarray $chan
} else {
set ihost [string tolower [sl_masktype $uhost]]
if {[isignore $ihost]} {
killignore $ihost
}
set chan [string tolower $chan]
if {[lsearch -exact $sl_boflood 0] == -1 && [sl_checkbogus [lindex [split $uhost @] 0]]} {
if {!$sl_locked($chan) && ![matchattr $hand f|f $chan]} {
set bhost [string tolower [sl_masktype $uhost]]
if {$sl_boban && [botisop $chan] && !$sl_flooded($chan)} {
putserv "KICK $chan $nick :BOGUS username"
if {$sl_globalban} {
if {[llength [banlist]] < $sl_banmax && ![isban $bhost] && ![matchban $bhost]} {
newban $bhost sentinel "BOGUS username" $sl_boban
}
} else {
if {[llength [banlist $chan]] < $sl_banmax && ![isban $bhost $chan] && ![matchban $bhost $chan]} {
newchanban $chan $bhost sentinel "BOGUS username" $sl_boban
}
}
}
if {$sl_ban} {
lappend sl_bobannick($chan) $nick ; lappend sl_bobanhost($chan) [string tolower $uhost]
utimer [lindex $sl_boflood 1] [list sl_bobanqueue $chan]
}
}
if {!$sl_flooded($chan)} {
incr sl_boqueue($chan)
utimer [lindex $sl_boflood 1] [list sl_boqueuereset $chan]
if {$sl_boqueue($chan) >= [lindex $sl_boflood 0]} {
sl_lock $chan "BOGUS joins" ${botnet-nick}
}
}
}
if {[lsearch -exact $sl_jflood 0] == -1} {
if {$sl_ban && !$sl_locked($chan) && ![matchattr $hand f|f $chan]} {
lappend sl_jbannick($chan) $nick ; lappend sl_jbanhost($chan) [string tolower $uhost]
utimer [lindex $sl_jflood 1] [list sl_jbanqueue $chan]
}
if {$sl_flooded($chan)} {return 0}
incr sl_jqueue($chan)
utimer [lindex $sl_jflood 1] [list sl_jqueuereset $chan]
if {$sl_jqueue($chan) >= [lindex $sl_jflood 0] && $sl_pqueue($chan) >= [lindex $sl_jflood 0]} {
sl_lock $chan "JOIN-PART flood" ${botnet-nick}
}
}
}
return 0
}
proc sl_checkbogus {ident} {
if {[regsub -all -- "\[^\041-\176\]" $ident "" temp] >= 1} {return 1}
return 0
}
proc sl_pflood {nick uhost hand chan {msg ""}} {
global botnick sl_ban sl_flooded sl_jflood sl_locked sl_pbanhost sl_pbannick sl_pqueue
if {[lsearch -exact $sl_jflood 0] != -1} {return 0}
if {$nick == $botnick} {
if {![validchan $chan]} {
timer 5 [list sl_unsetarray $chan]
}
return 0
}
set chan [string tolower $chan]
if {$sl_ban && !$sl_locked($chan) && ![matchattr $hand f|f $chan]} {
lappend sl_pbannick($chan) $nick ; lappend sl_pbanhost($chan) [string tolower $uhost]
utimer [lindex $sl_jflood 1] [list sl_pbanqueue $chan]
}
if {$sl_flooded($chan)} {return 0}
incr sl_pqueue($chan)
utimer [lindex $sl_jflood 1] [list sl_pqueuereset $chan]
return 0
}
proc sl_pfloodk {nick uhost hand chan kicked reason} {
global botnick sl_flooded sl_jflood sl_pqueue
if {[lsearch -exact $sl_jflood 0] != -1} {return 0}
if {$kicked == $botnick} {return 0}
set chan [string tolower $chan]
if {$sl_flooded($chan)} {return 0}
incr sl_pqueue($chan)
utimer [lindex $sl_jflood 1] [list sl_pqueuereset $chan]
return 0
}
proc sl_lock {chan flood detected} {
global botnet-nick sl_bflooded sl_cfnotice sl_flooded sl_ilocktime sl_mlocktime sl_note
if {[string tolower $detected] == [string tolower ${botnet-nick}]} {
set sl_flooded($chan) 1 ; set sl_bflooded 1
if {[botisop $chan]} {
sl_quicklock $chan
sl_killutimer "sl_unlock $chan *"
sl_killutimer "set sl_bflooded 0"
if {$sl_mlocktime} {
utimer $sl_mlocktime [list sl_unlock $chan m]
}
if {$sl_ilocktime} {
utimer $sl_ilocktime [list sl_unlock $chan i]
}
utimer 120 {set sl_bflooded 0}
putlog "sentinel: $flood detected on $chan! Channel locked temporarily."
if {$sl_cfnotice != ""} {
puthelp "NOTICE $chan :$sl_cfnotice"
}
} else {
putlog "sentinel: $flood detected on $chan! Cannot lock channel because I'm not opped."
utimer 120 {set sl_bflooded 0}
}
} else {
putlog "sentinel: $flood detected by $detected on $chan!"
}
if {[info commands sendnote] != ""} {
foreach recipient $sl_note {
if {[validuser $recipient]} {
if {[string tolower $detected] == [string tolower ${botnet-nick}]} {
sendnote SENTINEL $recipient "$flood detected on $chan."
} else {
sendnote SENTINEL $recipient "$flood detected by $detected on $chan."
}
}
}
}
return 0
}
proc sl_unlock {chan umode} {
global sl_bflooded sl_bfmaxbans sl_flooded sl_ilocktime sl_mlocktime sl_nkflooding
if {[expr [unixtime] - $sl_nkflooding($chan)] < 12} {
putlog "sentinel: nick flooding still in progress on $chan - not removing +mi yet.."
set sl_flooded($chan) 1 ; set sl_bflooded 1
sl_killutimer "sl_unlock $chan *"
sl_killutimer "set sl_bflooded 0"
utimer $sl_mlocktime [list sl_unlock $chan m] ; utimer $sl_ilocktime [list sl_unlock $chan i]
utimer 120 {set sl_bflooded 0}
} else {
set sl_flooded($chan) 0
if {![botisop $chan]} {return 0}
if {$umode == "mi"} {
putlog "sentinel: flood was small, performing early unlock.."
}
if {[string match *i* $umode] && [string match *i* [lindex [split [getchanmode $chan]] 0]]} {
if {$sl_bfmaxbans && [llength [chanbans $chan]] >= $sl_bfmaxbans} {
putlog "sentinel: not removing +i on $chan due to full ban list."
} else {
pushmode $chan -i
putlog "sentinel: removed +i on $chan"
}
}
if {[string match *m* $umode] && [string match *m* [lindex [split [getchanmode $chan]] 0]]} {
pushmode $chan -m
putlog "sentinel: removed +m on $chan"
}
}
return 0
}
proc sl_mode {nick uhost hand chan mode victim} {
global botnick sl_ban sl_bfmaxbans sl_bfnotice sl_bfull sl_flooded sl_locked sl_note sl_unlocked
set chan [string tolower $chan]
if {$mode == "+b" && $sl_bfmaxbans && !$sl_bfull($chan) && ![string match *i* [lindex [split [getchanmode $chan]] 0]] && [botisop $chan] && [llength [chanbans $chan]] >= $sl_bfmaxbans} {
putserv "MODE $chan +i"
set sl_bfull($chan) 1
utimer 5 [list set sl_bfull($chan) 0]
putlog "sentinel: locked $chan due to full ban list!"
if {$sl_bfnotice != ""} {
puthelp "NOTICE $chan :$sl_bfnotice"
}
if {[info commands sendnote] != ""} {
foreach recipient $sl_note {
if {[validuser $recipient]} {
sendnote SENTINEL $recipient "Locked $chan due to full ban list."
}
}
}
} elseif {$mode == "+i" && $sl_flooded($chan)} {
set sl_locked($chan) 1
if {$sl_ban} {
sl_killutimer "sl_*banqueue $chan"
utimer 7 [list sl_dokicks $chan] ; utimer 16 [list sl_setbans $chan]
}
} elseif {$mode == "-i" || $mode == "-m"} {
set sl_locked($chan) 0
set sl_unlocked($chan) [unixtime]
if {$sl_flooded($chan)} {
set sl_flooded($chan) 0
if {$mode == "-i"} {
sl_killutimer "sl_unlock $chan i"
} else {
sl_killutimer "sl_unlock $chan m"
}
sl_killutimer "sl_unlock $chan mi"
if {$nick != $botnick} {
putlog "sentinel: $chan unlocked by $nick"
}
}
}
return 0
}
proc sl_dokicks {chan} {
global sl_avbannick sl_bobannick sl_ccbannick sl_kflooders sl_jbannick sl_pbannick
if {![botisop $chan]} {return 0}
set sl_kflooders 0
sl_kick $chan $sl_ccbannick($chan) "CTCP flooder" ; set sl_ccbannick($chan) ""
sl_kick $chan $sl_avbannick($chan) "AVALANCHE/TSUNAMI flooder" ; set sl_avbannick($chan) ""
sl_kick $chan $sl_bobannick($chan) "BOGUS username" ; set sl_bobannick($chan) ""
set jklist $sl_jbannick($chan) ; set pklist $sl_pbannick($chan)
if {$jklist != "" && $pklist != ""} {
set klist ""
foreach nick $jklist {
if {[lsearch -exact $pklist $nick] != -1} {
lappend klist $nick
}
}
sl_kick $chan $klist "JOIN-PART flooder"
}
set sl_jbannick($chan) "" ; set sl_pbannick($chan) ""
return 0
}
proc sl_kick {chan klist reason} {
global sl_kflooders sl_kicks
if {$klist != ""} {
set kicklist ""
foreach nick $klist {
if {[lsearch -exact $kicklist $nick] == -1} {
lappend kicklist $nick
}
}
unset nick
incr sl_kflooders [llength $kicklist]
foreach nick $kicklist {
if {[onchan $nick $chan] && ![onchansplit $nick $chan]} {
lappend ksend $nick
if {[llength $ksend] >= $sl_kicks} {
putserv "KICK $chan [join $ksend ,] :$reason"
unset ksend
}
}
}
if {[info exists ksend]} {
putserv "KICK $chan [join $ksend ,] :$reason"
}
}
return 0
}
proc sl_setbans {chan} {
global sl_avbanhost sl_bobanhost sl_ccbanhost sl_kflooders sl_jbanhost sl_nkbanhost sl_pbanhost sl_shortlock sl_unlocked sl_wideban
if {![botonchan $chan]} {return 0}
set sl_ccbanhost($chan) [sl_dfilter $sl_ccbanhost($chan)]
set sl_avbanhost($chan) [sl_dfilter $sl_avbanhost($chan)]
set sl_nkbanhost($chan) [sl_dfilter $sl_nkbanhost($chan)]
set sl_bobanhost($chan) [sl_dfilter $sl_bobanhost($chan)]
set sl_jbanhost($chan) [sl_dfilter $sl_jbanhost($chan)]
set sl_pbanhost($chan) [sl_dfilter $sl_pbanhost($chan)]
set blist ""
if {$sl_jbanhost($chan) != "" && $sl_pbanhost($chan) != ""} {
foreach bhost $sl_jbanhost($chan) {
if {[lsearch -exact $sl_pbanhost($chan) $bhost] != -1} {
lappend blist $bhost
}
}
}
set allbans [sl_dfilter [concat $sl_ccbanhost($chan) $sl_avbanhost($chan) $sl_nkbanhost($chan) $sl_bobanhost($chan) $blist]]
if {$sl_wideban} {
sl_ban $chan [sl_dcheck $allbans] "MULTIPLE IDENT/HOST flooders"
}
sl_ban $chan $sl_ccbanhost($chan) "CTCP flooder" ; set sl_ccbanhost($chan) ""
sl_ban $chan $sl_avbanhost($chan) "AVALANCHE/TSUNAMI flooder" ; set sl_avbanhost($chan) ""
sl_ban $chan $sl_nkbanhost($chan) "NICK flooder" ; set sl_nkbanhost($chan) ""
sl_ban $chan $sl_bobanhost($chan) "BOGUS username" ; set sl_bobanhost($chan) ""
sl_ban $chan $blist "JOIN-PART flooder"
set sl_jbanhost($chan) "" ; set sl_pbanhost($chan) ""
if {$sl_shortlock && $sl_kflooders <= 2 && [llength $allbans] <= 2 && [expr [unixtime] - $sl_unlocked($chan)] > 120} {
sl_killutimer "sl_unlock $chan *"
utimer 10 [list sl_unlock $chan mi]
}
return 0
}
proc sl_dfilter {list} {
set newlist ""
foreach item $list {
if {[lsearch -exact $newlist $item] == -1} {
lappend newlist $item
}
}
return $newlist
}
proc sl_dcheck {bhosts} {
set blist ""
foreach bhost $bhosts {
set baddr [lindex [split [maskhost $bhost] "@"] 1]
set bident [string trimleft [lindex [split $bhost "@"] 0] "~"]
if {![info exists baddrs($baddr)]} {
set baddrs($baddr) 1
} else {
incr baddrs($baddr)
}
if {![info exists bidents($bident)]} {
set bidents($bident) 1
} else {
incr bidents($bident)
}
}
foreach baddr [array names baddrs] {
if {$baddrs($baddr) >= 2} {
lappend blist *!*@$baddr
}
}
foreach bident [array names bidents] {
if {$bidents($bident) >= 2} {
lappend blist *!*$bident@*
}
}
return $blist
}
proc sl_ban {chan blist reason} {
global sl_ban sl_banmax sl_globalban
if {$blist != ""} {
if {$sl_globalban} {
foreach bhost $blist {
if {![string match *!* $bhost]} {
if {[matchban *!$bhost]} {continue}
set bhost [sl_masktype $bhost]
if {[isban $bhost]} {continue}
} else {
if {[isban $bhost]} {continue}
foreach ban [banlist] {
if {[lindex $ban 5] == "sentinel" && [string match $bhost [string tolower [lindex $ban 0]]]} {
killban $ban
}
}
}
if {[llength [banlist]] >= $sl_banmax} {continue}
newban $bhost sentinel $reason $sl_ban
putlog "sentinel: banned $bhost ($reason)"
sl_ignore $bhost * $reason
}
} else {
foreach bhost $blist {
if {![string match *!* $bhost]} {
if {[matchban *!$bhost $chan]} {continue}
set bhost [sl_masktype $bhost]
if {[isban $bhost $chan]} {continue}
} else {
if {[isban $bhost $chan]} {continue}
foreach ban [banlist $chan] {
if {[lindex $ban 5] == "sentinel" && [string match $bhost [string tolower [lindex $ban 0]]]} {
killchanban $chan $ban
}
}
}
if {[llength [banlist $chan]] >= $sl_banmax} {continue}
newchanban $chan $bhost sentinel $reason $sl_ban
putlog "sentinel: banned $bhost on $chan ($reason)"
sl_ignore $bhost * $reason
}
}
}
return 0
}
proc sl_ignore {ihost hand flood} {
global sl_igtime
if {$hand != "*"} {
foreach chan [channels] {
if {[matchattr $hand f|f $chan]} {return 0}
}
}
if {![string match *!* $ihost]} {
foreach ignore [ignorelist] {
if {[string match [string tolower [lindex $ignore 0]] $ihost]} {
return 0
}
}
set ihost [sl_masktype $ihost]
if {[isignore $ihost]} {return 0}
} else {
if {[isignore $ihost]} {return 0}
foreach ignore [ignorelist] {
if {[lindex $ignore 4] == "sentinel" && [string match $ihost [string tolower [lindex $ignore 0]]]} {
killignore $ignore
}
}
}
newignore $ihost sentinel $flood $sl_igtime
putlog "sentinel: added $ihost to ignore list ($flood)"
return 1
}
# queuereset procs allow all queue timers to be killed easily
proc sl_ccqueuereset {chan} {
global sl_ccqueue
incr sl_ccqueue($chan) -1
return 0
}
proc sl_bcqueuereset {} {
global sl_bcqueue
incr sl_bcqueue -1
return 0
}
proc sl_bmqueuereset {} {
global sl_bmqueue
incr sl_bmqueue -1
return 0
}
proc sl_avqueuereset {chan} {
global sl_avqueue
incr sl_avqueue($chan) -1
return 0
}
proc sl_txqueuereset {} {
global sl_txqueue sl_txflood
foreach chan [string tolower [channels]] {
if {[info exists sl_txqueue($chan)]} {
set sl_txqueue($chan) 0
}
}
utimer [lindex $sl_txflood 1] sl_txqueuereset
return 0
}
proc sl_nkqueuereset {chan} {
global sl_nkqueue
incr sl_nkqueue($chan) -1
return 0
}
proc sl_boqueuereset {chan} {
global sl_boqueue
incr sl_boqueue($chan) -1
return 0
}
proc sl_jqueuereset {chan} {
global sl_jqueue
incr sl_jqueue($chan) -1
return 0
}
proc sl_pqueuereset {chan} {
global sl_pqueue
incr sl_pqueue($chan) -1
return 0
}
proc sl_ccbanqueue {chan} {
global sl_ccbanhost sl_ccbannick
set sl_ccbannick($chan) [lrange sl_ccbannick($chan) 1 end] ; set sl_ccbanhost($chan) [lrange sl_ccbanhost($chan) 1 end]
return 0
}
proc sl_avbanqueue {chan} {
global sl_avbanhost sl_avbannick
set sl_avbannick($chan) [lrange sl_avbannick($chan) 1 end] ; set sl_avbanhost($chan) [lrange sl_avbanhost($chan) 1 end]
return 0
}
proc sl_nkbanqueue {chan} {
global sl_nkbanhost
set sl_nkbanhost($chan) [lrange sl_nkbanhost($chan) 1 end]
return 0
}
proc sl_bobanqueue {chan} {
global sl_bobanhost sl_bobannick
set sl_bobannick($chan) [lrange sl_bobannick($chan) 1 end] ; set sl_bobanhost($chan) [lrange sl_bobanhost($chan) 1 end]
return 0
}
proc sl_jbanqueue {chan} {
global sl_jbanhost sl_jbannick
set sl_jbannick($chan) [lrange sl_jbannick($chan) 1 end] ; set sl_jbanhost($chan) [lrange sl_jbanhost($chan) 1 end]
return 0
}
proc sl_pbanqueue {chan} {
global sl_pbanhost sl_pbannick
set sl_pbannick($chan) [lrange sl_pbannick($chan) 1 end] ; set sl_pbanhost($chan) [lrange sl_pbanhost($chan) 1 end]
return 0
}
proc sl_flud {nick uhost hand type chan} {
global sl_flooded
set chan [string tolower $chan]
if {[validchan $chan] && $sl_flooded($chan)} {return 1}
return 0
}
proc sl_lc {nick uhost hand chan arg} {
global sl_lockcmds
set chan [string tolower $chan]
if {![botisop $chan]} {return 0}
if {$sl_lockcmds == 2 && ![isop $nick $chan]} {return 0}
sl_quicklock $chan
putlog "sentinel: channel lock requested by $hand on $chan"
return 0
}
proc sl_uc {nick uhost hand chan arg} {
global sl_lockcmds
set chan [string tolower $chan]
if {![botisop $chan]} {return 0}
if {$sl_lockcmds == 2 && ![isop $nick $chan]} {return 0}
putserv "MODE $chan -mi"
putlog "sentinel: channel unlock requested by $hand on $chan"
return 0
}
proc sl_dcclc {hand idx arg} {
global sl_lockflags
putcmdlog "#$hand# lock $arg"
set chan [lindex [split $arg] 0]
if {$chan == "-all"} {
if {![matchattr $hand $sl_lockflags]} {
putidx $idx "You're not global +$sl_lockflags." ; return 0
}
set locklist ""
foreach chan [channels] {
if {[botisop $chan]} {
sl_quicklock $chan
lappend locklist $chan
}
}
putidx $idx "Locked [join $locklist ", "]"
} else {
if {$chan == ""} {
set chan [lindex [console $idx] 0]
}
if {![validchan $chan]} {
putidx $idx "No such channel." ; return 0
} elseif {![matchattr $hand $sl_lockflags|$sl_lockflags $chan]} {
putidx $idx "You're not +$sl_lockflags on $chan." ; return 0
} elseif {![botonchan $chan]} {
putidx $idx "I'm not on $chan" ; return 0
} elseif {![botisop $chan]} {
putidx $idx "I'm not opped on $chan" ; return 0
}
sl_quicklock $chan
putidx $idx "Locked $chan"
}
return 0
}
proc sl_dccuc {hand idx arg} {
global sl_lockflags
putcmdlog "#$hand# unlock $arg"
set chan [lindex [split $arg] 0]
if {$chan == "-all"} {
if {![matchattr $hand $sl_lockflags]} {
putidx $idx "You're not global +$sl_lockflags." ; return 0
}
set locklist ""
foreach chan [channels] {
if {[botisop $chan]} {
putserv "MODE $chan -mi"
lappend locklist $chan
}
}
putidx $idx "Unlocked [join $locklist ", "]"
} else {
if {$chan == ""} {
set chan [lindex [console $idx] 0]
}
if {![validchan $chan]} {
putidx $idx "No such channel." ; return 0
} elseif {![matchattr $hand $sl_lockflags|$sl_lockflags $chan]} {
putidx $idx "You're not +$sl_lockflags on $chan." ; return 0
} elseif {![botonchan $chan]} {
putidx $idx "I'm not on $chan" ; return 0
} elseif {![botisop $chan]} {
putidx $idx "I'm not opped on $chan" ; return 0
}
putserv "MODE $chan -mi"
putidx $idx "Unlocked $chan"
}
return 0
}
proc sl_quicklock {chan} {
global numversion
if {$numversion < 1050000} {
putquick "MODE $chan +mi"
} else {
putquick "MODE $chan +mi" -next
}
}
proc sl_dcc {hand idx arg} {
global sl_avflood sl_ban sl_banmax sl_bcflood sl_boban sl_boflood sl_bmflood sl_bxsimul sl_bfmaxbans sl_ccflood sl_detectquits sl_globalban sl_igtime sl_jflood sl_kicks sl_lockcmds sl_lockflags sl_ilocktime sl_mlocktime sl_nkflood sl_note sl_shortlock sl_tsunami sl_txflood
putcmdlog "#$hand# sentinel $arg"
putidx $idx "This bot is protected by sentinel.tcl by slennox"
putidx $idx "Current settings"
if {[lsearch -exact $sl_bcflood 0] != -1} {
putidx $idx "- Bot CTCP flood: Off"
} else {
putidx $idx "- Bot CTCP flood: [lindex $sl_bcflood 0] in [lindex $sl_bcflood 1] secs"
}
if {[lsearch -exact $sl_bmflood 0] != -1} {
putidx $idx "- Bot MSG flood: Off"
} else {
putidx $idx "- Bot MSG flood: [lindex $sl_bmflood 0] in [lindex $sl_bmflood 1] secs"
}
if {[lsearch -exact $sl_ccflood 0] != -1} {
putidx $idx "- Channel CTCP flood: Off"
} else {
putidx $idx "- Channel CTCP flood: [lindex $sl_ccflood 0] in [lindex $sl_ccflood 1] secs"
}
if {[lsearch -exact $sl_avflood 0] != -1} {
putidx $idx "- Channel AVALANCHE flood: Off"
} else {
putidx $idx "- Channel AVALANCHE flood: [lindex $sl_avflood 0] in [lindex $sl_avflood 1] secs"
}
if {[lsearch -exact $sl_avflood 0] != -1 || !$sl_tsunami} {
putidx $idx "- Channel TSUNAMI flood: Off"
} else {
putidx $idx "- Channel TSUNAMI flood: [lindex $sl_avflood 0] in [lindex $sl_avflood 1] secs ($sl_tsunami ctrl codes / line)"
}
if {[lsearch -exact $sl_txflood 0] != -1} {
putidx $idx "- Channel TEXT flood: Off"
} else {
putidx $idx "- Channel TEXT flood: [lindex $sl_txflood 0] in [lindex $sl_txflood 1] secs"
}
if {[lsearch -exact $sl_boflood 0] != -1} {
putidx $idx "- Channel BOGUS flood: Off"
} else {
putidx $idx "- Channel BOGUS flood: [lindex $sl_boflood 0] in [lindex $sl_boflood 1] secs"
}
if {$sl_detectquits} {
set detectquits "quit detection ON"
} else {
set detectquits "quit detection OFF"
}
if {[lsearch -exact $sl_jflood 0] != -1} {
putidx $idx "- Channel JOIN-PART flood: Off"
} else {
putidx $idx "- Channel JOIN-PART flood: [lindex $sl_jflood 0] in [lindex $sl_jflood 1] secs ($detectquits)"
}
if {[lsearch -exact $sl_nkflood 0] != -1} {
putidx $idx "- Channel NICK flood: Off"
} else {
putidx $idx "- Channel NICK flood: [lindex $sl_nkflood 0] in [lindex $sl_nkflood 1] secs"
}
if {!$sl_ilocktime} {
putidx $idx "- Channel +i locktime: Indefinite"
} else {
putidx $idx "- Channel +i locktime: $sl_ilocktime secs"
}
if {!$sl_mlocktime} {
putidx $idx "- Channel +m locktime: Indefinite"
} else {
putidx $idx "- Channel +m locktime: $sl_mlocktime secs"
}
if {$sl_shortlock && $sl_ban} {
putidx $idx "- Small flood short lock: Active"
} else {
putidx $idx "- Small flood short lock: Inactive"
}
if {$sl_ban && $sl_ban < 120} {
putidx $idx "- Channel flood bans: $sl_ban mins"
} elseif {$sl_ban >= 120} {
putidx $idx "- Channel flood bans: [expr $sl_ban / 60] hrs"
} else {
putidx $idx "- Channel flood bans: Disabled"
}
if {!$sl_boban || [lsearch -exact $sl_boflood 0] != -1} {
putidx $idx "- Bogus username bans: Disabled"
} elseif {$sl_boban > 0 && $sl_boban < 120} {
putidx $idx "- Bogus username bans: $sl_boban mins"
} elseif {$sl_boban >= 120} {
putidx $idx "- Bogus username bans: [expr $sl_boban / 60] hrs"
}
if {$sl_ban || [lsearch -exact $sl_boflood 0] == -1} {
if {$sl_globalban} {
putidx $idx "- Ban type: Global [sl_masktype nick@host.domain]"
} else {
putidx $idx "- Ban type: Channel-specific [sl_masktype nick@host.domain]"
}
}
if {$sl_ban || [lsearch -exact $sl_boflood 0] == -1} {
putidx $idx "- Maximum bans: $sl_banmax"
}
if {$sl_igtime > 0 && $sl_igtime < 120} {
putidx $idx "- Flooder ignores: $sl_igtime mins"
} elseif {$sl_igtime >= 120} {
putidx $idx "- Flooder ignores: [expr $sl_igtime / 60] hrs"
} else {
putidx $idx "- Flooder ignores: Permanent"
}
if {$sl_ban} {
putidx $idx "- Kicks per line: $sl_kicks"
}
if {!$sl_bfmaxbans} {
putidx $idx "- Maximum channel bans: Disabled"
} else {
putidx $idx "- Maximum channel bans: $sl_bfmaxbans"
}
if {$sl_note != ""} {
putidx $idx "- Flood notification: Notifying [join $sl_note ", "]"
} else {
putidx $idx "- Flood notification: Off"
}
if {!$sl_lockcmds} {
putidx $idx "- Public lc/uc commands: Disabled"
} elseif {$sl_lockcmds == 1} {
putidx $idx "- Public lc/uc commands: Enabled (+$sl_lockflags users, ops not required)"
} elseif {$sl_lockcmds == 2} {
putidx $idx "- Public lc/uc commands: Enabled (+$sl_lockflags users, ops required)"
}
if {$sl_bxsimul} {
putidx $idx "- BitchX simulation: On"
} elseif {!$sl_bxsimul} {
putidx $idx "- BitchX simulation: Off"
}
return 0
}
if {$sl_bxsimul} {
bind raw - 001 sl_bxserverjoin
if {![info exists sl_bxonestack]} {
set sl_bxonestack 0
}
if {![info exists sl_bxversion]} {
set sl_bxversion [lindex {75p1+ 75p3+} [rand 2]]
}
set sl_bxsystem "*IX" ; set sl_bxwhoami $username ; set sl_bxmachine ""
catch {set sl_bxsystem [exec uname -s -r]}
catch {set sl_bxwhoami [exec id -un]}
catch {set sl_bxmachine [exec uname -n]}
set sl_bxjointime [unixtime]
proc sl_bxserverjoin {from keyword arg} {
global sl_bxjointime sl_bxisaway
set sl_bxjointime [unixtime] ; set sl_bxisaway 0
return 0
}
proc sl_bxaway {} {
global sl_bxjointime sl_bxisaway
if {!$sl_bxisaway} {
puthelp "AWAY :is away: (Auto-Away after 10 mins) \[\002BX\002-MsgLog [lindex {On Off} [rand 2]]\]"
set sl_bxisaway 1
} else {
puthelp "AWAY"
set sl_bxisaway 0 ; set sl_bxjointime [unixtime]
}
if {![string match *sl_bxaway* [timers]]} {
timer [expr [rand 300] + 10] sl_bxaway
}
return 0
}
if {![info exists sl_bxisaway]} {
set sl_bxisaway 0
}
if {![string match *sl_bxaway* [timers]]} {
timer [expr [rand 300] + 10] sl_bxaway
}
}
proc sl_setarray {chan} {
global sl_avbanhost sl_avbannick sl_avqueue sl_bfull sl_bobanhost sl_bobannick sl_boqueue sl_ccbanhost sl_ccbannick sl_ccqueue sl_flooded sl_jbanhost sl_jbannick sl_jqueue sl_locked sl_nkbanhost sl_nkflooding sl_nkqueue sl_pbanhost sl_pbannick sl_pqueue sl_txqueue sl_unlocked
set chan [string tolower $chan]
sl_killutimer "incr sl_*queue($chan) -1"
sl_killutimer "sl_*banqueue $chan"
sl_killutimer "sl_*queuereset $chan"
set sl_flooded($chan) 0 ; set sl_locked($chan) 0 ; set sl_unlocked($chan) [unixtime]
set sl_nkflooding($chan) [unixtime]
set sl_ccqueue($chan) 0 ; set sl_ccbanhost($chan) "" ; set sl_ccbannick($chan) ""
set sl_avqueue($chan) 0 ; set sl_avbanhost($chan) "" ; set sl_avbannick($chan) ""
set sl_txqueue($chan) 0
set sl_nkqueue($chan) 0 ; set sl_nkbanhost($chan) ""
set sl_boqueue($chan) 0 ; set sl_bobanhost($chan) "" ; set sl_bobannick($chan) ""
set sl_jqueue($chan) 0 ; set sl_jbanhost($chan) "" ; set sl_jbannick($chan) ""
set sl_pqueue($chan) 0 ; set sl_pbanhost($chan) "" ; set sl_pbannick($chan) ""
set sl_bfull($chan) 0
return 0
}
proc sl_unsetarray {chan} {
global sl_avbanhost sl_avbannick sl_avqueue sl_bfull sl_bobanhost sl_bobannick sl_boqueue sl_ccbanhost sl_ccbannick sl_ccqueue sl_flooded sl_jbanhost sl_jbannick sl_jqueue sl_locked sl_nkbanhost sl_nkflooding sl_nkqueue sl_pbanhost sl_pbannick sl_pqueue sl_txqueue sl_unlocked
set chan [string tolower $chan]
if {![validchan $chan] && [info exists sl_flooded($chan)]} {
unset sl_flooded($chan) sl_locked($chan) sl_unlocked($chan) sl_nkflooding($chan) sl_ccqueue($chan) sl_ccbanhost($chan) sl_ccbannick($chan) sl_avqueue($chan) sl_avbanhost($chan) sl_avbannick($chan) sl_txqueue($chan) sl_nkqueue($chan) sl_nkbanhost($chan) sl_boqueue($chan) sl_bobanhost($chan) sl_bobannick($chan) sl_jqueue($chan) sl_jbanhost($chan) sl_jbannick($chan) sl_pqueue($chan) sl_pbanhost($chan) sl_pbannick($chan) sl_bfull($chan)
}
return 0
}
proc sl_settimer {} {
foreach chan [channels] {
sl_setarray $chan
}
return 0
}
proc sl_killutimer {cmd} {
set n 0
regsub -all -- {\[} $cmd {\[} cmd ; regsub -all -- {\]} $cmd {\]} cmd
foreach tmr [utimers] {
if {[string match $cmd [join [lindex $tmr 1]]]} {
killutimer [lindex $tmr 2]
incr n
}
}
return $n
}
proc sl_masktype {uhost} {
global sl_masktype
switch -exact -- $sl_masktype {
0 {return *!*[string range $uhost [string first @ $uhost] end]}
1 {return *!*$uhost}
2 {return *!*[lindex [split [maskhost $uhost] "!"] 1]}
}
return
}
if {![info exists sl_unlocked] && ![string match *sl_settimer* [utimers]]} {
utimer 3 sl_settimer
}
if {![info exists sl_bflooded]} {
set sl_bflooded 0
}
if {![info exists sl_bcqueue]} {
set sl_bcqueue 0
}
if {![info exists sl_bmqueue]} {
set sl_bmqueue 0
}
if {![info exists sl_nickkick]} {
set sl_nickkick 0
}
set sl_bcflood [split $sl_bcflood :] ; set sl_bmflood [split $sl_bmflood :]
set sl_ccflood [split $sl_ccflood :] ; set sl_avflood [split $sl_avflood :]
set sl_txflood [split $sl_txflood :] ; set sl_boflood [split $sl_boflood :]
set sl_jflood [split $sl_jflood :] ; set sl_nkflood [split $sl_nkflood :]
set sl_note [split $sl_note]
if {$sl_ilocktime > 0 && $sl_ilocktime < 30} {
set sl_ilocktime 30
}
if {$sl_mlocktime > 0 && $sl_mlocktime < 30} {
set sl_mlocktime 30
}
set trigger-on-ignore 0
if {!${kick-method}} {
set sl_kicks 8
} else {
set sl_kicks ${kick-method}
}
if {$numversion <= 1040400} {
if {$numversion >= 1032100} {
set kick-bogus 0
}
if {$numversion >= 1032400} {
set ban-bogus 0
}
}
if {$numversion >= 1032400} {
set kick-fun 0 ; set ban-fun 0
}
if {$numversion >= 1032500} {
set ctcp-mode 0
}
if {![string match *sl_txqueuereset* [utimers]] && [lsearch -exact $sl_txflood 0] == -1} {
utimer [lindex $sl_txflood 1] sl_txqueuereset
}
bind pub $sl_lockflags|$sl_lockflags lc sl_lc
bind pub $sl_lockflags|$sl_lockflags uc sl_uc
bind dcc $sl_lockflags|$sl_lockflags lock sl_dcclc
bind dcc $sl_lockflags|$sl_lockflags unlock sl_dccuc
if {!$sl_lockcmds} {
unbind pub $sl_lockflags|$sl_lockflags lc sl_lc
unbind pub $sl_lockflags|$sl_lockflags uc sl_uc
rename sl_lc ""
rename sl_uc ""
}
bind dcc m|m sentinel sl_dcc
bind raw - NOTICE sl_avflood
bind raw - PRIVMSG sl_avflood
if {[lsearch -exact $sl_avflood 0] != -1 && [lsearch -exact $sl_txflood 0] != -1} {
unbind raw - NOTICE sl_avflood
unbind raw - PRIVMSG sl_avflood
rename sl_avflood ""
}
bind ctcp - CLIENTINFO sl_ctcp
bind ctcp - USERINFO sl_ctcp
bind ctcp - VERSION sl_ctcp
bind ctcp - FINGER sl_ctcp
bind ctcp - ERRMSG sl_ctcp
bind ctcp - ECHO sl_ctcp
bind ctcp - INVITE sl_ctcp
bind ctcp - WHOAMI sl_ctcp
bind ctcp - OP sl_ctcp
bind ctcp - OPS sl_ctcp
bind ctcp - UNBAN sl_ctcp
bind ctcp - PING sl_ctcp
bind ctcp - TIME sl_ctcp
bind msgm - * sl_bmflood
if {[lsearch -exact $sl_bmflood 0] != -1} {
unbind msgm - * sl_bmflood
rename sl_bmflood ""
}
bind nick - * sl_nkflood
if {[lsearch -exact $sl_nkflood 0] != -1} {
unbind nick - * sl_nkflood
rename sl_nkflood ""
}
bind join - * sl_jflood
bind part - * sl_pflood
bind sign - * sl_pflood
if {![info exists sl_detectquits]} {
set sl_detectquits 0
}
if {!$sl_detectquits} {
unbind sign - * sl_pflood
}
bind kick - * sl_pfloodk
bind flud - * sl_flud
bind mode - * sl_mode
putlog "Loaded sentinel.tcl v2.70 by slennox"
return