more typo fixes
This commit is contained in:
parent
9702b1c7fe
commit
3377df5ff5
4 changed files with 15 additions and 15 deletions
|
@ -33,7 +33,7 @@ Open Proxy Scanning Bot Module for NeoStats Changelog.
|
|||
|
||||
* Version 1.0Beta2 * 2/8/2002 * Fish
|
||||
- Added GPL headers and credit to BOPM authors
|
||||
- A few fixes in a attempt to find this socket/checklist bug
|
||||
- A few fixes in an attempt to find this socket/checklist bug
|
||||
- Stopped setting Glines multiple times if we find a multiple open proxies, or host is listed in OPM
|
||||
- Think I finally fixed the socket/checklist bug
|
||||
- Fixed a few mem leaks I believe
|
||||
|
|
12
opsb.c
12
opsb.c
|
@ -64,7 +64,7 @@ int online;
|
|||
|
||||
Module_Info my_info[] = { {
|
||||
"OPSB",
|
||||
"A Open Proxy Scanning Bot",
|
||||
"An Open Proxy Scanning Bot",
|
||||
"1.0"
|
||||
} };
|
||||
|
||||
|
@ -137,7 +137,7 @@ int __Bot_Message(char *origin, char **argv, int argc)
|
|||
} else if (!strcasecmp(argv[1], "status")) {
|
||||
if (UserLevel(u) < 40) {
|
||||
prefmsg(u->nick, s_opsb, "Access Denied");
|
||||
chanalert(s_opsb, "%s tried to view status, but is not a operator", u->nick);
|
||||
chanalert(s_opsb, "%s tried to view status, but is not an operator", u->nick);
|
||||
return 1;
|
||||
}
|
||||
send_status(u);
|
||||
|
@ -145,7 +145,7 @@ int __Bot_Message(char *origin, char **argv, int argc)
|
|||
} else if (!strcasecmp(argv[1], "lookup")) {
|
||||
if (UserLevel(u) < 40) {
|
||||
prefmsg(u->nick, s_opsb, "Access Denied");
|
||||
chanalert(s_opsb, "%s tried to use lookup, but is not a operator", u->nick);
|
||||
chanalert(s_opsb, "%s tried to use lookup, but is not an operator", u->nick);
|
||||
return 1;
|
||||
}
|
||||
if (argc < 3) {
|
||||
|
@ -203,7 +203,7 @@ int __Bot_Message(char *origin, char **argv, int argc)
|
|||
return 0;
|
||||
}
|
||||
srakill_cmd(argv[2], "*");
|
||||
chanalert(s_opsb, "%s attempted to remove a akill for *@%s", u->nick, argv[2]);
|
||||
chanalert(s_opsb, "%s attempted to remove an akill for *@%s", u->nick, argv[2]);
|
||||
return 1;
|
||||
} else if (!strcasecmp(argv[1], "check")) {
|
||||
if (UserLevel(u) < 40) {
|
||||
|
@ -262,7 +262,7 @@ int __Bot_Message(char *origin, char **argv, int argc)
|
|||
} else if (!strcasecmp(argv[1], "EXCLUDE")) {
|
||||
if (UserLevel(u) < 50) {
|
||||
prefmsg(u->nick, s_opsb, "Access Denied");
|
||||
chanalert(s_opsb, "%s tried to use exclude, but is not a operator", u->nick);
|
||||
chanalert(s_opsb, "%s tried to use exclude, but is not an operator", u->nick);
|
||||
return 1;
|
||||
}
|
||||
if (argc < 3) {
|
||||
|
@ -1106,7 +1106,7 @@ void reportdns(char *data, adns_answer *a) {
|
|||
prefmsg(data, s_opsb, "%s Does not resolve", dnsinfo->lookup);
|
||||
}
|
||||
} else {
|
||||
prefmsg(data, s_opsb, "A unknown error occured");
|
||||
prefmsg(data, s_opsb, "An unknown error occured");
|
||||
}
|
||||
|
||||
list_delete(opsbl, dnslookup);
|
||||
|
|
|
@ -96,8 +96,8 @@ const char *opsb_help_check[] = {
|
|||
"",
|
||||
"This option will scan either a user connected to your",
|
||||
"network, an IP address, or Hostname for Insecure proxies,",
|
||||
"and report the status to you. If a Insecure proxy is found,",
|
||||
"the host will be banned from the network",
|
||||
"and report the status to you. If an Insecure proxy is",
|
||||
"found, the host will be banned from the network",
|
||||
NULL
|
||||
};
|
||||
|
||||
|
@ -118,7 +118,7 @@ const char *opsb_help_set[] = {
|
|||
"The Options are:",
|
||||
" \2TARGETIP\2 - Change the IP address we try to",
|
||||
" make the proxies connect to",
|
||||
" This should be set to a IP address",
|
||||
" This should be set to an IP address",
|
||||
" of one of your IRC Servers.",
|
||||
" \2TARGETPORT\2 - Change the Port number we try to",
|
||||
" make proxies connect to. This must",
|
||||
|
@ -137,7 +137,7 @@ const char *opsb_help_set[] = {
|
|||
" from a proxy before disconnecting",
|
||||
" \2TIMEOUT\2 - Time we wait for a proxy to respond",
|
||||
" to our servers before disconnecting,",
|
||||
" and assuming its not a open Proxy",
|
||||
" and assuming its not an open Proxy",
|
||||
" \2OPENSTRING\2 - The string we expect to see if",
|
||||
" there is an Open Proxy",
|
||||
" \2SPLITTIME\2 - This is used to determine if users",
|
||||
|
|
8
proxy.c
8
proxy.c
|
@ -102,7 +102,7 @@ void do_ban(scaninfo *scandata) {
|
|||
chanalert(s_opsb, "Banning %s (%s) as its listed in %s", scandata->who, inet_ntoa(scandata->ipaddr), opsb.opmdomain);
|
||||
globops(s_opsb, "Banning %s (%s) as its listed in %s", scandata->who, inet_ntoa(scandata->ipaddr), opsb.opmdomain);
|
||||
if (scandata->u) prefmsg(scandata->u->nick, s_opsb, "Banning %s (%s) as its listed in %s", scandata->who, inet_ntoa(scandata->ipaddr), opsb.opmdomain);
|
||||
sakill_cmd(inet_ntoa(scandata->ipaddr), "*", s_opsb, opsb.bantime, "Your host is listed as a Open Proxy. Please visit the following website for more info: www.blitzed.org/proxy?ip=%s", inet_ntoa(scandata->ipaddr));
|
||||
sakill_cmd(inet_ntoa(scandata->ipaddr), "*", s_opsb, opsb.bantime, "Your host is listed as an Open Proxy. Please visit the following website for more info: www.blitzed.org/proxy?ip=%s", inet_ntoa(scandata->ipaddr));
|
||||
}
|
||||
|
||||
}
|
||||
|
@ -163,7 +163,7 @@ void cleanlist() {
|
|||
while (socknode) {
|
||||
|
||||
sockdata = lnode_get(socknode);
|
||||
/* if it was a open proxy, don't save the cache */
|
||||
/* if it was an open proxy, don't save the cache */
|
||||
if (sockdata->flags == OPENPROXY) savescan = 0;
|
||||
|
||||
/* if this still has sockets connected, set finished flaged to 0 to not delete scans */
|
||||
|
@ -264,7 +264,7 @@ void send_status(User *u) {
|
|||
prefmsg(u->nick, s_opsb, "Scanning for Open Proxies");
|
||||
break;
|
||||
case GOTOPENPROXY:
|
||||
prefmsg(u->nick, s_opsb, "Contains a Open Proxy");
|
||||
prefmsg(u->nick, s_opsb, "Contains an Open Proxy");
|
||||
break;
|
||||
default:
|
||||
prefmsg(u->nick, s_opsb, "Unknown State (Scan)");
|
||||
|
@ -487,7 +487,7 @@ int proxy_read(int socknum, char *sockname) {
|
|||
/* copy the received data onto the buf, but don't overwrite the buffer */
|
||||
strncat(sockdata->buf, buf, 2047 - strlen(sockdata->buf));
|
||||
|
||||
/* this is a ok HTTP server */
|
||||
/* this is an ok HTTP server */
|
||||
if (strstr(sockdata->buf, "Method Not Allowed")) {
|
||||
nlog(LOG_DEBUG1, LOG_MOD, "closing socket %d due to ok HTTP server", socknum);
|
||||
if (scandata->u) prefmsg(scandata->u->nick, s_opsb, "No Open %s Proxy Server on port %d", proxy_list[sockdata->type].type, proxy_list[sockdata->type].port);
|
||||
|
|
Reference in a new issue