more typo fixes

This commit is contained in:
Mark 2003-10-07 14:00:31 +00:00
parent 9702b1c7fe
commit 3377df5ff5
4 changed files with 15 additions and 15 deletions

View file

@ -33,7 +33,7 @@ Open Proxy Scanning Bot Module for NeoStats Changelog.
* Version 1.0Beta2 * 2/8/2002 * Fish
- Added GPL headers and credit to BOPM authors
- A few fixes in a attempt to find this socket/checklist bug
- A few fixes in an attempt to find this socket/checklist bug
- Stopped setting Glines multiple times if we find a multiple open proxies, or host is listed in OPM
- Think I finally fixed the socket/checklist bug
- Fixed a few mem leaks I believe

12
opsb.c
View file

@ -64,7 +64,7 @@ int online;
Module_Info my_info[] = { {
"OPSB",
"A Open Proxy Scanning Bot",
"An Open Proxy Scanning Bot",
"1.0"
} };
@ -137,7 +137,7 @@ int __Bot_Message(char *origin, char **argv, int argc)
} else if (!strcasecmp(argv[1], "status")) {
if (UserLevel(u) < 40) {
prefmsg(u->nick, s_opsb, "Access Denied");
chanalert(s_opsb, "%s tried to view status, but is not a operator", u->nick);
chanalert(s_opsb, "%s tried to view status, but is not an operator", u->nick);
return 1;
}
send_status(u);
@ -145,7 +145,7 @@ int __Bot_Message(char *origin, char **argv, int argc)
} else if (!strcasecmp(argv[1], "lookup")) {
if (UserLevel(u) < 40) {
prefmsg(u->nick, s_opsb, "Access Denied");
chanalert(s_opsb, "%s tried to use lookup, but is not a operator", u->nick);
chanalert(s_opsb, "%s tried to use lookup, but is not an operator", u->nick);
return 1;
}
if (argc < 3) {
@ -203,7 +203,7 @@ int __Bot_Message(char *origin, char **argv, int argc)
return 0;
}
srakill_cmd(argv[2], "*");
chanalert(s_opsb, "%s attempted to remove a akill for *@%s", u->nick, argv[2]);
chanalert(s_opsb, "%s attempted to remove an akill for *@%s", u->nick, argv[2]);
return 1;
} else if (!strcasecmp(argv[1], "check")) {
if (UserLevel(u) < 40) {
@ -262,7 +262,7 @@ int __Bot_Message(char *origin, char **argv, int argc)
} else if (!strcasecmp(argv[1], "EXCLUDE")) {
if (UserLevel(u) < 50) {
prefmsg(u->nick, s_opsb, "Access Denied");
chanalert(s_opsb, "%s tried to use exclude, but is not a operator", u->nick);
chanalert(s_opsb, "%s tried to use exclude, but is not an operator", u->nick);
return 1;
}
if (argc < 3) {
@ -1106,7 +1106,7 @@ void reportdns(char *data, adns_answer *a) {
prefmsg(data, s_opsb, "%s Does not resolve", dnsinfo->lookup);
}
} else {
prefmsg(data, s_opsb, "A unknown error occured");
prefmsg(data, s_opsb, "An unknown error occured");
}
list_delete(opsbl, dnslookup);

View file

@ -96,8 +96,8 @@ const char *opsb_help_check[] = {
"",
"This option will scan either a user connected to your",
"network, an IP address, or Hostname for Insecure proxies,",
"and report the status to you. If a Insecure proxy is found,",
"the host will be banned from the network",
"and report the status to you. If an Insecure proxy is",
"found, the host will be banned from the network",
NULL
};
@ -118,7 +118,7 @@ const char *opsb_help_set[] = {
"The Options are:",
" \2TARGETIP\2 - Change the IP address we try to",
" make the proxies connect to",
" This should be set to a IP address",
" This should be set to an IP address",
" of one of your IRC Servers.",
" \2TARGETPORT\2 - Change the Port number we try to",
" make proxies connect to. This must",
@ -137,7 +137,7 @@ const char *opsb_help_set[] = {
" from a proxy before disconnecting",
" \2TIMEOUT\2 - Time we wait for a proxy to respond",
" to our servers before disconnecting,",
" and assuming its not a open Proxy",
" and assuming its not an open Proxy",
" \2OPENSTRING\2 - The string we expect to see if",
" there is an Open Proxy",
" \2SPLITTIME\2 - This is used to determine if users",

View file

@ -102,7 +102,7 @@ void do_ban(scaninfo *scandata) {
chanalert(s_opsb, "Banning %s (%s) as its listed in %s", scandata->who, inet_ntoa(scandata->ipaddr), opsb.opmdomain);
globops(s_opsb, "Banning %s (%s) as its listed in %s", scandata->who, inet_ntoa(scandata->ipaddr), opsb.opmdomain);
if (scandata->u) prefmsg(scandata->u->nick, s_opsb, "Banning %s (%s) as its listed in %s", scandata->who, inet_ntoa(scandata->ipaddr), opsb.opmdomain);
sakill_cmd(inet_ntoa(scandata->ipaddr), "*", s_opsb, opsb.bantime, "Your host is listed as a Open Proxy. Please visit the following website for more info: www.blitzed.org/proxy?ip=%s", inet_ntoa(scandata->ipaddr));
sakill_cmd(inet_ntoa(scandata->ipaddr), "*", s_opsb, opsb.bantime, "Your host is listed as an Open Proxy. Please visit the following website for more info: www.blitzed.org/proxy?ip=%s", inet_ntoa(scandata->ipaddr));
}
}
@ -163,7 +163,7 @@ void cleanlist() {
while (socknode) {
sockdata = lnode_get(socknode);
/* if it was a open proxy, don't save the cache */
/* if it was an open proxy, don't save the cache */
if (sockdata->flags == OPENPROXY) savescan = 0;
/* if this still has sockets connected, set finished flaged to 0 to not delete scans */
@ -264,7 +264,7 @@ void send_status(User *u) {
prefmsg(u->nick, s_opsb, "Scanning for Open Proxies");
break;
case GOTOPENPROXY:
prefmsg(u->nick, s_opsb, "Contains a Open Proxy");
prefmsg(u->nick, s_opsb, "Contains an Open Proxy");
break;
default:
prefmsg(u->nick, s_opsb, "Unknown State (Scan)");
@ -487,7 +487,7 @@ int proxy_read(int socknum, char *sockname) {
/* copy the received data onto the buf, but don't overwrite the buffer */
strncat(sockdata->buf, buf, 2047 - strlen(sockdata->buf));
/* this is a ok HTTP server */
/* this is an ok HTTP server */
if (strstr(sockdata->buf, "Method Not Allowed")) {
nlog(LOG_DEBUG1, LOG_MOD, "closing socket %d due to ok HTTP server", socknum);
if (scandata->u) prefmsg(scandata->u->nick, s_opsb, "No Open %s Proxy Server on port %d", proxy_list[sockdata->type].type, proxy_list[sockdata->type].port);