2021-12-05 17:54:36 +00:00
# include "AuthPackets.h"
# include "PacketUtils.h"
# include "dNetCommon.h"
# include "dServer.h"
# include "dLogger.h"
# include "Database.h"
# include "ZoneInstanceManager.h"
# include "MD5.h"
# include "SHA512.h"
# ifdef _WIN32
# include <bcrypt/BCrypt.hpp>
# else
# include <bcrypt.h>
# endif
# include <BitStream.h>
# include <future>
# include "Game.h"
# include "dConfig.h"
2023-02-19 12:29:14 +00:00
# include "eServerDisconnectIdentifiers.h"
2023-05-02 22:39:21 +00:00
# include "eLoginResponse.h"
2023-05-03 21:38:32 +00:00
# include "eConnectionType.h"
# include "eServerMessageType.h"
# include "eMasterMessageType.h"
2021-12-05 17:54:36 +00:00
void AuthPackets : : HandleHandshake ( dServer * server , Packet * packet ) {
RakNet : : BitStream inStream ( packet - > data , packet - > length , false ) ;
uint64_t header = inStream . Read ( header ) ;
uint32_t clientVersion = 0 ;
inStream . Read ( clientVersion ) ;
2022-07-25 02:26:51 +00:00
server - > GetLogger ( ) - > Log ( " AuthPackets " , " Received client version: %i " , clientVersion ) ;
2022-11-07 09:27:48 +00:00
SendHandshake ( server , packet - > systemAddress , server - > GetIP ( ) , server - > GetPort ( ) , server - > GetServerType ( ) ) ;
2021-12-05 17:54:36 +00:00
}
2022-11-07 09:27:48 +00:00
void AuthPackets : : SendHandshake ( dServer * server , const SystemAddress & sysAddr , const std : : string & nextServerIP , uint16_t nextServerPort , const ServerType serverType ) {
2021-12-05 17:54:36 +00:00
RakNet : : BitStream bitStream ;
2023-05-03 21:38:32 +00:00
PacketUtils : : WriteHeader ( bitStream , eConnectionType : : SERVER , eServerMessageType : : VERSION_CONFIRM ) ;
2022-07-25 02:26:51 +00:00
bitStream . Write < unsigned int > ( NET_VERSION ) ;
2021-12-05 17:54:36 +00:00
bitStream . Write ( uint32_t ( 0x93 ) ) ;
2022-07-25 02:26:51 +00:00
2022-11-07 09:27:48 +00:00
if ( serverType = = ServerType : : Auth ) bitStream . Write ( uint32_t ( 1 ) ) ; //Conn: auth
2021-12-05 17:54:36 +00:00
else bitStream . Write ( uint32_t ( 4 ) ) ; //Conn: world
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
bitStream . Write ( uint32_t ( 0 ) ) ; //Server process ID
bitStream . Write ( nextServerPort ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
server - > Send ( & bitStream , sysAddr , false ) ;
}
void AuthPackets : : HandleLoginRequest ( dServer * server , Packet * packet ) {
std : : string username = PacketUtils : : ReadString ( 8 , packet , true ) ;
std : : string password = PacketUtils : : ReadString ( 0x4A , packet , true ) ;
const char * szUsername = username . c_str ( ) ;
// Fetch account details
sql : : PreparedStatement * stmt = Database : : CreatePreppedStmt ( " SELECT password, banned, locked, play_key_id, gm_level FROM accounts WHERE name=? LIMIT 1; " ) ;
stmt - > setString ( 1 , szUsername ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
sql : : ResultSet * res = stmt - > executeQuery ( ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
if ( res - > rowsCount ( ) = = 0 ) {
2022-07-25 02:26:51 +00:00
server - > GetLogger ( ) - > Log ( " AuthPackets " , " No user found! " ) ;
2023-05-02 22:39:21 +00:00
AuthPackets : : SendLoginResponse ( server , packet - > systemAddress , eLoginResponse : : INVALID_USER , " " , " " , 2001 , username ) ;
2021-12-05 17:54:36 +00:00
return ;
}
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
std : : string sqlPass = " " ;
bool sqlBanned = false ;
bool sqlLocked = false ;
uint32_t sqlPlayKey = 0 ;
uint32_t sqlGmLevel = 0 ;
while ( res - > next ( ) ) {
sqlPass = res - > getString ( 1 ) . c_str ( ) ;
sqlBanned = res - > getBoolean ( 2 ) ;
sqlLocked = res - > getBoolean ( 3 ) ;
sqlPlayKey = res - > getInt ( 4 ) ;
sqlGmLevel = res - > getInt ( 5 ) ;
}
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
delete stmt ;
delete res ;
//If we aren't running in live mode, then only GMs are allowed to enter:
const auto & closedToNonDevs = Game : : config - > GetValue ( " closed_to_non_devs " ) ;
if ( closedToNonDevs . size ( ) > 0 & & bool ( std : : stoi ( closedToNonDevs ) ) & & sqlGmLevel = = 0 ) {
2023-05-02 22:39:21 +00:00
AuthPackets : : SendLoginResponse ( server , packet - > systemAddress , eLoginResponse : : PERMISSIONS_NOT_HIGH_ENOUGH , " The server is currently only open to developers. " , " " , 2001 , username ) ;
2021-12-05 17:54:36 +00:00
return ;
}
if ( Game : : config - > GetValue ( " dont_use_keys " ) ! = " 1 " ) {
//Check to see if we have a play key:
if ( sqlPlayKey = = 0 & & sqlGmLevel = = 0 ) {
2023-05-02 22:39:21 +00:00
AuthPackets : : SendLoginResponse ( server , packet - > systemAddress , eLoginResponse : : PERMISSIONS_NOT_HIGH_ENOUGH , " Your account doesn't have a play key associated with it! " , " " , 2001 , username ) ;
2022-07-25 02:26:51 +00:00
server - > GetLogger ( ) - > Log ( " AuthPackets " , " User %s tried to log in, but they don't have a play key. " , username . c_str ( ) ) ;
2021-12-05 17:54:36 +00:00
return ;
}
//Check if the play key is _valid_:
auto keyCheckStmt = Database : : CreatePreppedStmt ( " SELECT active FROM `play_keys` WHERE id=? " ) ;
keyCheckStmt - > setInt ( 1 , sqlPlayKey ) ;
auto keyRes = keyCheckStmt - > executeQuery ( ) ;
bool isKeyActive = false ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
if ( keyRes - > rowsCount ( ) = = 0 & & sqlGmLevel = = 0 ) {
2023-05-02 22:39:21 +00:00
AuthPackets : : SendLoginResponse ( server , packet - > systemAddress , eLoginResponse : : PERMISSIONS_NOT_HIGH_ENOUGH , " Your account doesn't have a play key associated with it! " , " " , 2001 , username ) ;
2021-12-05 17:54:36 +00:00
return ;
}
while ( keyRes - > next ( ) ) {
isKeyActive = ( bool ) keyRes - > getInt ( 1 ) ;
}
if ( ! isKeyActive & & sqlGmLevel = = 0 ) {
2023-05-02 22:39:21 +00:00
AuthPackets : : SendLoginResponse ( server , packet - > systemAddress , eLoginResponse : : PERMISSIONS_NOT_HIGH_ENOUGH , " Your play key has been disabled. " , " " , 2001 , username ) ;
2022-07-25 02:26:51 +00:00
server - > GetLogger ( ) - > Log ( " AuthPackets " , " User %s tried to log in, but their play key was disabled " , username . c_str ( ) ) ;
2021-12-05 17:54:36 +00:00
return ;
}
}
2022-07-25 02:26:51 +00:00
if ( sqlBanned ) {
2023-05-02 22:39:21 +00:00
AuthPackets : : SendLoginResponse ( server , packet - > systemAddress , eLoginResponse : : BANNED , " " , " " , 2001 , username ) ; return ;
2021-12-05 17:54:36 +00:00
}
if ( sqlLocked ) {
2023-05-02 22:39:21 +00:00
AuthPackets : : SendLoginResponse ( server , packet - > systemAddress , eLoginResponse : : ACCOUNT_LOCKED , " " , " " , 2001 , username ) ; return ;
2021-12-05 17:54:36 +00:00
}
/*
* Updated hashing method :
* First attempt bcrypt .
* If that fails , fallback to old method and setup bcrypt for new login .
*/
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
bool loginSuccess = true ;
int32_t bcryptState = : : bcrypt_checkpw ( password . c_str ( ) , sqlPass . c_str ( ) ) ;
if ( bcryptState ! = 0 ) {
// Fallback on old method
std : : string oldPassword = sha512 ( password + username ) ;
if ( sqlPass ! = oldPassword ) {
loginSuccess = false ;
} else {
// Generate new hash for bcrypt
char salt [ BCRYPT_HASHSIZE ] ;
char hash [ BCRYPT_HASHSIZE ] ;
bcryptState = : : bcrypt_gensalt ( 12 , salt ) ;
assert ( bcryptState = = 0 ) ;
bcryptState = : : bcrypt_hashpw ( password . c_str ( ) , salt , hash ) ;
assert ( bcryptState = = 0 ) ;
sql : : PreparedStatement * accountUpdate = Database : : CreatePreppedStmt ( " UPDATE accounts SET password = ? WHERE name = ? LIMIT 1; " ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
accountUpdate - > setString ( 1 , std : : string ( hash , BCRYPT_HASHSIZE ) . c_str ( ) ) ;
accountUpdate - > setString ( 2 , szUsername ) ;
accountUpdate - > executeUpdate ( ) ;
}
} else {
// Login success with bcrypt
}
if ( ! loginSuccess ) {
2023-05-02 22:39:21 +00:00
AuthPackets : : SendLoginResponse ( server , packet - > systemAddress , eLoginResponse : : WRONG_PASS , " " , " " , 2001 , username ) ;
2022-07-25 02:26:51 +00:00
server - > GetLogger ( ) - > Log ( " AuthPackets " , " Wrong password used " ) ;
2021-12-05 17:54:36 +00:00
} else {
SystemAddress system = packet - > systemAddress ; //Copy the sysAddr before the Packet gets destroyed from main
if ( ! server - > GetIsConnectedToMaster ( ) ) {
2023-05-02 22:39:21 +00:00
AuthPackets : : SendLoginResponse ( server , system , eLoginResponse : : GENERAL_FAILED , " " , " " , 0 , username ) ;
2021-12-05 17:54:36 +00:00
return ;
}
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
ZoneInstanceManager : : Instance ( ) - > RequestZoneTransfer ( server , 0 , 0 , false , [ system , server , username ] ( bool mythranShift , uint32_t zoneID , uint32_t zoneInstance , uint32_t zoneClone , std : : string zoneIP , uint16_t zonePort ) {
2023-05-02 22:39:21 +00:00
AuthPackets : : SendLoginResponse ( server , system , eLoginResponse : : SUCCESS , " " , zoneIP , zonePort , username ) ;
2021-12-05 17:54:36 +00:00
} ) ;
}
}
void AuthPackets : : SendLoginResponse ( dServer * server , const SystemAddress & sysAddr , eLoginResponse responseCode , const std : : string & errorMsg , const std : : string & wServerIP , uint16_t wServerPort , std : : string username ) {
RakNet : : BitStream packet ;
2023-05-03 21:38:32 +00:00
PacketUtils : : WriteHeader ( packet , eConnectionType : : CLIENT , eClientMessageType : : LOGIN_RESPONSE ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
packet . Write ( static_cast < uint8_t > ( responseCode ) ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
PacketUtils : : WritePacketString ( " Talk_Like_A_Pirate " , 33 , & packet ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
// 7 unknown strings - perhaps other IP addresses?
PacketUtils : : WritePacketString ( " " , 33 , & packet ) ;
PacketUtils : : WritePacketString ( " " , 33 , & packet ) ;
PacketUtils : : WritePacketString ( " " , 33 , & packet ) ;
PacketUtils : : WritePacketString ( " " , 33 , & packet ) ;
PacketUtils : : WritePacketString ( " " , 33 , & packet ) ;
PacketUtils : : WritePacketString ( " " , 33 , & packet ) ;
PacketUtils : : WritePacketString ( " " , 33 , & packet ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
packet . Write ( static_cast < uint16_t > ( 1 ) ) ; // Version Major
packet . Write ( static_cast < uint16_t > ( 10 ) ) ; // Version Current
packet . Write ( static_cast < uint16_t > ( 64 ) ) ; // Version Minor
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
// Writes the user key
uint32_t sessionKey = rand ( ) ; // not mt but whatever
std : : string userHash = std : : to_string ( sessionKey ) ;
userHash = md5 ( userHash ) ;
PacketUtils : : WritePacketWString ( userHash , 33 , & packet ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
// Write the Character and Chat IPs
PacketUtils : : WritePacketString ( wServerIP , 33 , & packet ) ;
PacketUtils : : WritePacketString ( " " , 33 , & packet ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
// Write the Character and Chat Ports
packet . Write ( static_cast < uint16_t > ( wServerPort ) ) ;
packet . Write ( static_cast < uint16_t > ( 0 ) ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
// Write another IP
PacketUtils : : WritePacketString ( " " , 33 , & packet ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
// Write a GUID or something...
PacketUtils : : WritePacketString ( " 00000000-0000-0000-0000-000000000000 " , 37 , & packet ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
packet . Write ( static_cast < uint32_t > ( 0 ) ) ; // ???
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
// Write the localization
PacketUtils : : WritePacketString ( " US " , 3 , & packet ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
packet . Write ( static_cast < uint8_t > ( false ) ) ; // User first logged in?
packet . Write ( static_cast < uint8_t > ( false ) ) ; // User is F2P?
packet . Write ( static_cast < uint64_t > ( 0 ) ) ; // ???
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
// Write custom error message
packet . Write ( static_cast < uint16_t > ( errorMsg . length ( ) ) ) ;
PacketUtils : : WritePacketWString ( errorMsg , static_cast < uint32_t > ( errorMsg . length ( ) ) , & packet ) ;
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
// Here write auth logs
packet . Write ( static_cast < uint32_t > ( 20 ) ) ;
for ( uint32_t i = 0 ; i < 20 ; + + i ) {
packet . Write ( static_cast < uint32_t > ( 8 ) ) ;
packet . Write ( static_cast < uint32_t > ( 44 ) ) ;
packet . Write ( static_cast < uint32_t > ( 14000 ) ) ;
packet . Write ( static_cast < uint32_t > ( 0 ) ) ;
}
2022-07-25 02:26:51 +00:00
2021-12-05 17:54:36 +00:00
server - > Send ( & packet , sysAddr , false ) ;
//Inform the master server that we've created a session for this user:
{
CBITSTREAM ;
2023-05-03 21:38:32 +00:00
PacketUtils : : WriteHeader ( bitStream , eConnectionType : : MASTER , eMasterMessageType : : SET_SESSION_KEY ) ;
2021-12-05 17:54:36 +00:00
bitStream . Write ( sessionKey ) ;
PacketUtils : : WriteString ( bitStream , username , 66 ) ;
server - > SendToMaster ( & bitStream ) ;
2022-07-25 02:26:51 +00:00
server - > GetLogger ( ) - > Log ( " AuthPackets " , " Set sessionKey: %i for user %s " , sessionKey , username . c_str ( ) ) ;
2021-12-05 17:54:36 +00:00
}
}