2
0

LoginServerThread.java 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647
  1. /*
  2. * This program is free software: you can redistribute it and/or modify it under
  3. * the terms of the GNU General Public License as published by the Free Software
  4. * Foundation, either version 3 of the License, or (at your option) any later
  5. * version.
  6. *
  7. * This program is distributed in the hope that it will be useful, but WITHOUT
  8. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  9. * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
  10. * details.
  11. *
  12. * You should have received a copy of the GNU General Public License along with
  13. * this program. If not, see <http://www.gnu.org/licenses/>.
  14. */
  15. package com.l2jserver.gameserver;
  16. import java.io.BufferedOutputStream;
  17. import java.io.IOException;
  18. import java.io.InputStream;
  19. import java.io.OutputStream;
  20. import java.math.BigInteger;
  21. import java.net.Socket;
  22. import java.net.UnknownHostException;
  23. import java.security.GeneralSecurityException;
  24. import java.security.KeyFactory;
  25. import java.security.interfaces.RSAPublicKey;
  26. import java.security.spec.RSAKeyGenParameterSpec;
  27. import java.security.spec.RSAPublicKeySpec;
  28. import java.util.Collection;
  29. import java.util.List;
  30. import java.util.Map;
  31. import java.util.logging.Level;
  32. import java.util.logging.LogRecord;
  33. import java.util.logging.Logger;
  34. import javolution.util.FastList;
  35. import javolution.util.FastMap;
  36. import com.l2jserver.Config;
  37. import com.l2jserver.gameserver.model.L2World;
  38. import com.l2jserver.gameserver.model.actor.instance.L2PcInstance;
  39. import com.l2jserver.gameserver.network.L2GameClient;
  40. import com.l2jserver.gameserver.network.SystemMessageId;
  41. import com.l2jserver.gameserver.network.L2GameClient.GameClientState;
  42. import com.l2jserver.gameserver.network.gameserverpackets.AuthRequest;
  43. import com.l2jserver.gameserver.network.gameserverpackets.BlowFishKey;
  44. import com.l2jserver.gameserver.network.gameserverpackets.ChangeAccessLevel;
  45. import com.l2jserver.gameserver.network.gameserverpackets.GameServerBasePacket;
  46. import com.l2jserver.gameserver.network.gameserverpackets.PlayerAuthRequest;
  47. import com.l2jserver.gameserver.network.gameserverpackets.PlayerInGame;
  48. import com.l2jserver.gameserver.network.gameserverpackets.PlayerLogout;
  49. import com.l2jserver.gameserver.network.gameserverpackets.ServerStatus;
  50. import com.l2jserver.gameserver.network.loginserverpackets.AuthResponse;
  51. import com.l2jserver.gameserver.network.loginserverpackets.InitLS;
  52. import com.l2jserver.gameserver.network.loginserverpackets.KickPlayer;
  53. import com.l2jserver.gameserver.network.loginserverpackets.LoginServerFail;
  54. import com.l2jserver.gameserver.network.loginserverpackets.PlayerAuthResponse;
  55. import com.l2jserver.gameserver.network.serverpackets.CharSelectionInfo;
  56. import com.l2jserver.gameserver.network.serverpackets.LoginFail;
  57. import com.l2jserver.loginserver.crypt.NewCrypt;
  58. import com.l2jserver.util.Rnd;
  59. import com.l2jserver.util.Util;
  60. public class LoginServerThread extends Thread
  61. {
  62. protected static final Logger _log = Logger.getLogger(LoginServerThread.class.getName());
  63. protected static final Logger _logAccounting = Logger.getLogger("accounting");
  64. /** {@see com.l2jserver.loginserver.LoginServer#PROTOCOL_REV } */
  65. private static final int REVISION = 0x0102;
  66. private RSAPublicKey _publicKey;
  67. private String _hostname;
  68. private int _port;
  69. private int _gamePort;
  70. private Socket _loginSocket;
  71. private InputStream _in;
  72. private OutputStream _out;
  73. /**
  74. * The BlowFish engine used to encrypt packets<br>
  75. * It is first initialized with a unified key:<br>
  76. * "_;v.]05-31!|+-%xT!^[$\00"<br>
  77. * <br>
  78. * and then after handshake, with a new key sent by<br>
  79. * loginserver during the handshake. This new key is stored<br>
  80. * in {@link #_blowfishKey}
  81. */
  82. private NewCrypt _blowfish;
  83. private byte[] _blowfishKey;
  84. private byte[] _hexID;
  85. private boolean _acceptAlternate;
  86. private int _requestID;
  87. private int _serverID;
  88. private boolean _reserveHost;
  89. private int _maxPlayer;
  90. private List<WaitingClient> _waitingClients;
  91. private Map<String, L2GameClient> _accountsInGameServer;
  92. private int _status;
  93. private String _serverName;
  94. private String _gameExternalHost;
  95. private String _gameInternalHost;
  96. private LoginServerThread()
  97. {
  98. super("LoginServerThread");
  99. _port = Config.GAME_SERVER_LOGIN_PORT;
  100. _gamePort = Config.PORT_GAME;
  101. _hostname = Config.GAME_SERVER_LOGIN_HOST;
  102. _hexID = Config.HEX_ID;
  103. if (_hexID == null)
  104. {
  105. _requestID = Config.REQUEST_ID;
  106. _hexID = generateHex(16);
  107. }
  108. else
  109. {
  110. _requestID = Config.SERVER_ID;
  111. }
  112. _acceptAlternate = Config.ACCEPT_ALTERNATE_ID;
  113. _reserveHost = Config.RESERVE_HOST_ON_LOGIN;
  114. _gameExternalHost = Config.EXTERNAL_HOSTNAME;
  115. _gameInternalHost = Config.INTERNAL_HOSTNAME;
  116. _waitingClients = new FastList<WaitingClient>();
  117. _accountsInGameServer = new FastMap<String, L2GameClient>().setShared(true);
  118. _maxPlayer = Config.MAXIMUM_ONLINE_USERS;
  119. }
  120. public static LoginServerThread getInstance()
  121. {
  122. return SingletonHolder._instance;
  123. }
  124. @Override
  125. public void run()
  126. {
  127. while (true)
  128. {
  129. int lengthHi = 0;
  130. int lengthLo = 0;
  131. int length = 0;
  132. boolean checksumOk = false;
  133. try
  134. {
  135. // Connection
  136. _log.info("Connecting to login on " + _hostname + ":" + _port);
  137. _loginSocket = new Socket(_hostname, _port);
  138. _in = _loginSocket.getInputStream();
  139. _out = new BufferedOutputStream(_loginSocket.getOutputStream());
  140. //init Blowfish
  141. _blowfishKey = generateHex(40);
  142. _blowfish = new NewCrypt("_;v.]05-31!|+-%xT!^[$\00");
  143. while (true)
  144. {
  145. lengthLo = _in.read();
  146. lengthHi = _in.read();
  147. length = lengthHi * 256 + lengthLo;
  148. if (lengthHi < 0)
  149. {
  150. _log.finer("LoginServerThread: Login terminated the connection.");
  151. break;
  152. }
  153. byte[] incoming = new byte[length];
  154. incoming[0] = (byte) lengthLo;
  155. incoming[1] = (byte) lengthHi;
  156. int receivedBytes = 0;
  157. int newBytes = 0;
  158. while (newBytes != -1 && receivedBytes < length - 2)
  159. {
  160. newBytes = _in.read(incoming, 2, length - 2);
  161. receivedBytes = receivedBytes + newBytes;
  162. }
  163. if (receivedBytes != length - 2)
  164. {
  165. _log.warning("Incomplete Packet is sent to the server, closing connection.(LS)");
  166. break;
  167. }
  168. byte[] decrypt = new byte[length - 2];
  169. System.arraycopy(incoming, 2, decrypt, 0, decrypt.length);
  170. // decrypt if we have a key
  171. decrypt = _blowfish.decrypt(decrypt);
  172. checksumOk = NewCrypt.verifyChecksum(decrypt);
  173. if (!checksumOk)
  174. {
  175. _log.warning("Incorrect packet checksum, ignoring packet (LS)");
  176. break;
  177. }
  178. if (Config.DEBUG)
  179. _log.warning("[C]\n" + Util.printData(decrypt));
  180. int packetType = decrypt[0] & 0xff;
  181. switch (packetType)
  182. {
  183. case 00:
  184. InitLS init = new InitLS(decrypt);
  185. if (Config.DEBUG)
  186. _log.info("Init received");
  187. if (init.getRevision() != REVISION)
  188. {
  189. //TODO: revision mismatch
  190. _log.warning("/!\\ Revision mismatch between LS and GS /!\\");
  191. break;
  192. }
  193. try
  194. {
  195. KeyFactory kfac = KeyFactory.getInstance("RSA");
  196. BigInteger modulus = new BigInteger(init.getRSAKey());
  197. RSAPublicKeySpec kspec1 = new RSAPublicKeySpec(modulus, RSAKeyGenParameterSpec.F4);
  198. _publicKey = (RSAPublicKey) kfac.generatePublic(kspec1);
  199. if (Config.DEBUG)
  200. _log.info("RSA key set up");
  201. }
  202. catch (GeneralSecurityException e)
  203. {
  204. _log.warning("Troubles while init the public key send by login");
  205. break;
  206. }
  207. //send the blowfish key through the rsa encryption
  208. BlowFishKey bfk = new BlowFishKey(_blowfishKey, _publicKey);
  209. sendPacket(bfk);
  210. if (Config.DEBUG)
  211. _log.info("Sent new blowfish key");
  212. //now, only accept paket with the new encryption
  213. _blowfish = new NewCrypt(_blowfishKey);
  214. if (Config.DEBUG)
  215. _log.info("Changed blowfish key");
  216. AuthRequest ar = new AuthRequest(_requestID, _acceptAlternate, _hexID, _gameExternalHost, _gameInternalHost, _gamePort, _reserveHost, _maxPlayer);
  217. sendPacket(ar);
  218. if (Config.DEBUG)
  219. _log.info("Sent AuthRequest to login");
  220. break;
  221. case 01:
  222. LoginServerFail lsf = new LoginServerFail(decrypt);
  223. _log.info("Damn! Registeration Failed: " + lsf.getReasonString());
  224. // login will close the connection here
  225. break;
  226. case 02:
  227. AuthResponse aresp = new AuthResponse(decrypt);
  228. _serverID = aresp.getServerId();
  229. _serverName = aresp.getServerName();
  230. Config.saveHexid(_serverID, hexToString(_hexID));
  231. _log.info("Registered on login as Server " + _serverID + " : " + _serverName);
  232. ServerStatus st = new ServerStatus();
  233. if (Config.SERVER_LIST_BRACKET)
  234. {
  235. st.addAttribute(ServerStatus.SERVER_LIST_SQUARE_BRACKET, ServerStatus.ON);
  236. }
  237. else
  238. {
  239. st.addAttribute(ServerStatus.SERVER_LIST_SQUARE_BRACKET, ServerStatus.OFF);
  240. }
  241. if (Config.SERVER_LIST_CLOCK)
  242. {
  243. st.addAttribute(ServerStatus.SERVER_LIST_CLOCK, ServerStatus.ON);
  244. }
  245. else
  246. {
  247. st.addAttribute(ServerStatus.SERVER_LIST_CLOCK, ServerStatus.OFF);
  248. }
  249. if (Config.SERVER_LIST_TESTSERVER)
  250. {
  251. st.addAttribute(ServerStatus.TEST_SERVER, ServerStatus.ON);
  252. }
  253. else
  254. {
  255. st.addAttribute(ServerStatus.TEST_SERVER, ServerStatus.OFF);
  256. }
  257. if (Config.SERVER_GMONLY)
  258. {
  259. st.addAttribute(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_GM_ONLY);
  260. }
  261. else
  262. {
  263. st.addAttribute(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_AUTO);
  264. }
  265. sendPacket(st);
  266. if (L2World.getInstance().getAllPlayersCount() > 0)
  267. {
  268. FastList<String> playerList = new FastList<String>();
  269. Collection<L2PcInstance> pls = L2World.getInstance().getAllPlayers().values();
  270. //synchronized (L2World.getInstance().getAllPlayers())
  271. {
  272. for (L2PcInstance player : pls)
  273. playerList.add(player.getAccountName());
  274. }
  275. PlayerInGame pig = new PlayerInGame(playerList);
  276. sendPacket(pig);
  277. }
  278. break;
  279. case 03:
  280. PlayerAuthResponse par = new PlayerAuthResponse(decrypt);
  281. String account = par.getAccount();
  282. WaitingClient wcToRemove = null;
  283. synchronized (_waitingClients)
  284. {
  285. for (WaitingClient wc : _waitingClients)
  286. {
  287. if (wc.account.equals(account))
  288. {
  289. wcToRemove = wc;
  290. }
  291. }
  292. }
  293. if (wcToRemove != null)
  294. {
  295. if (par.isAuthed())
  296. {
  297. if (Config.DEBUG)
  298. _log.info("Login accepted player " + wcToRemove.account + " waited("
  299. + (GameTimeController.getGameTicks() - wcToRemove.timestamp) + "ms)");
  300. PlayerInGame pig = new PlayerInGame(par.getAccount());
  301. sendPacket(pig);
  302. wcToRemove.gameClient.setState(GameClientState.AUTHED);
  303. wcToRemove.gameClient.setSessionId(wcToRemove.session);
  304. CharSelectionInfo cl = new CharSelectionInfo(wcToRemove.account, wcToRemove.gameClient.getSessionId().playOkID1);
  305. wcToRemove.gameClient.getConnection().sendPacket(cl);
  306. wcToRemove.gameClient.setCharSelection(cl.getCharInfo());
  307. }
  308. else
  309. {
  310. _log.warning("session key is not correct. closing connection");
  311. wcToRemove.gameClient.getConnection().sendPacket(new LoginFail(1));
  312. wcToRemove.gameClient.closeNow();
  313. }
  314. _waitingClients.remove(wcToRemove);
  315. }
  316. break;
  317. case 04:
  318. KickPlayer kp = new KickPlayer(decrypt);
  319. doKickPlayer(kp.getAccount());
  320. break;
  321. }
  322. }
  323. }
  324. catch (UnknownHostException e)
  325. {
  326. if (Config.DEBUG)
  327. e.printStackTrace();
  328. }
  329. catch (IOException e)
  330. {
  331. _log.info("Deconnected from Login, Trying to reconnect:");
  332. _log.info(e.toString());
  333. }
  334. finally
  335. {
  336. try
  337. {
  338. _loginSocket.close();
  339. }
  340. catch (Exception e)
  341. {
  342. }
  343. }
  344. try
  345. {
  346. Thread.sleep(5000); // 5 seconds tempo.
  347. }
  348. catch (InterruptedException e)
  349. {
  350. return; // never swallow an interrupt!
  351. }
  352. }
  353. }
  354. public void addWaitingClientAndSendRequest(String acc, L2GameClient client, SessionKey key)
  355. {
  356. if (Config.DEBUG)
  357. _log.info(String.valueOf(key));
  358. WaitingClient wc = new WaitingClient(acc, client, key);
  359. synchronized (_waitingClients)
  360. {
  361. _waitingClients.add(wc);
  362. }
  363. PlayerAuthRequest par = new PlayerAuthRequest(acc, key);
  364. try
  365. {
  366. sendPacket(par);
  367. }
  368. catch (IOException e)
  369. {
  370. _log.warning("Error while sending player auth request");
  371. if (Config.DEBUG)
  372. e.printStackTrace();
  373. }
  374. }
  375. public void removeWaitingClient(L2GameClient client)
  376. {
  377. WaitingClient toRemove = null;
  378. synchronized (_waitingClients)
  379. {
  380. for (WaitingClient c : _waitingClients)
  381. {
  382. if (c.gameClient == client)
  383. {
  384. toRemove = c;
  385. }
  386. }
  387. if (toRemove != null)
  388. _waitingClients.remove(toRemove);
  389. }
  390. }
  391. public void sendLogout(String account)
  392. {
  393. PlayerLogout pl = new PlayerLogout(account);
  394. try
  395. {
  396. sendPacket(pl);
  397. }
  398. catch (IOException e)
  399. {
  400. _log.warning("Error while sending logout packet to login");
  401. if (Config.DEBUG)
  402. e.printStackTrace();
  403. }
  404. }
  405. public void addGameServerLogin(String account, L2GameClient client)
  406. {
  407. _accountsInGameServer.put(account, client);
  408. }
  409. public void sendAccessLevel(String account, int level)
  410. {
  411. ChangeAccessLevel cal = new ChangeAccessLevel(account, level);
  412. try
  413. {
  414. sendPacket(cal);
  415. }
  416. catch (IOException e)
  417. {
  418. if (Config.DEBUG)
  419. e.printStackTrace();
  420. }
  421. }
  422. private String hexToString(byte[] hex)
  423. {
  424. return new BigInteger(hex).toString(16);
  425. }
  426. public void doKickPlayer(String account)
  427. {
  428. if (_accountsInGameServer.get(account) != null)
  429. {
  430. L2GameClient client = _accountsInGameServer.get(account);
  431. LogRecord record = new LogRecord(Level.WARNING, "Kicked");
  432. record.setParameters(new Object[]{client});
  433. _logAccounting.log(record);
  434. L2PcInstance player = client.getActiveChar();
  435. if (player != null)
  436. {
  437. player.sendPacket(SystemMessageId.ANOTHER_LOGIN_WITH_ACCOUNT);
  438. player.logout(false);
  439. }
  440. else
  441. client.closeNow();
  442. LoginServerThread.getInstance().sendLogout(account);
  443. }
  444. }
  445. public static byte[] generateHex(int size)
  446. {
  447. byte[] array = new byte[size];
  448. Rnd.nextBytes(array);
  449. if (Config.DEBUG)
  450. _log.fine("Generated random String: \"" + array + "\"");
  451. return array;
  452. }
  453. /**
  454. * @param sl
  455. * @throws IOException
  456. */
  457. private void sendPacket(GameServerBasePacket sl) throws IOException
  458. {
  459. byte[] data = sl.getContent();
  460. NewCrypt.appendChecksum(data);
  461. if (Config.DEBUG)
  462. _log.finest("[S]\n" + Util.printData(data));
  463. data = _blowfish.crypt(data);
  464. int len = data.length + 2;
  465. synchronized (_out) //avoids tow threads writing in the mean time
  466. {
  467. _out.write(len & 0xff);
  468. _out.write(len >> 8 & 0xff);
  469. _out.write(data);
  470. _out.flush();
  471. }
  472. }
  473. /**
  474. * @param maxPlayer The maxPlayer to set.
  475. */
  476. public void setMaxPlayer(int maxPlayer)
  477. {
  478. sendServerStatus(ServerStatus.MAX_PLAYERS, maxPlayer);
  479. _maxPlayer = maxPlayer;
  480. }
  481. /**
  482. * @return Returns the maxPlayer.
  483. */
  484. public int getMaxPlayer()
  485. {
  486. return _maxPlayer;
  487. }
  488. /**
  489. * @param server_gm_only
  490. */
  491. public void sendServerStatus(int id, int value)
  492. {
  493. ServerStatus ss = new ServerStatus();
  494. ss.addAttribute(id, value);
  495. try
  496. {
  497. sendPacket(ss);
  498. }
  499. catch (IOException e)
  500. {
  501. if (Config.DEBUG)
  502. e.printStackTrace();
  503. }
  504. }
  505. /**
  506. * @return
  507. */
  508. public String getStatusString()
  509. {
  510. return ServerStatus.STATUS_STRING[_status];
  511. }
  512. /**
  513. * @return
  514. */
  515. public boolean isClockShown()
  516. {
  517. return Config.SERVER_LIST_CLOCK;
  518. }
  519. /**
  520. * @return
  521. */
  522. public boolean isBracketShown()
  523. {
  524. return Config.SERVER_LIST_BRACKET;
  525. }
  526. /**
  527. * @return Returns the serverName.
  528. */
  529. public String getServerName()
  530. {
  531. return _serverName;
  532. }
  533. public void setServerStatus(int status)
  534. {
  535. switch (status)
  536. {
  537. case ServerStatus.STATUS_AUTO:
  538. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_AUTO);
  539. _status = status;
  540. break;
  541. case ServerStatus.STATUS_DOWN:
  542. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_DOWN);
  543. _status = status;
  544. break;
  545. case ServerStatus.STATUS_FULL:
  546. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_FULL);
  547. _status = status;
  548. break;
  549. case ServerStatus.STATUS_GM_ONLY:
  550. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_GM_ONLY);
  551. _status = status;
  552. break;
  553. case ServerStatus.STATUS_GOOD:
  554. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_GOOD);
  555. _status = status;
  556. break;
  557. case ServerStatus.STATUS_NORMAL:
  558. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_NORMAL);
  559. _status = status;
  560. break;
  561. default:
  562. throw new IllegalArgumentException("Status does not exists:" + status);
  563. }
  564. }
  565. public static class SessionKey
  566. {
  567. public int playOkID1;
  568. public int playOkID2;
  569. public int loginOkID1;
  570. public int loginOkID2;
  571. public SessionKey(int loginOK1, int loginOK2, int playOK1, int playOK2)
  572. {
  573. playOkID1 = playOK1;
  574. playOkID2 = playOK2;
  575. loginOkID1 = loginOK1;
  576. loginOkID2 = loginOK2;
  577. }
  578. @Override
  579. public String toString()
  580. {
  581. return "PlayOk: " + playOkID1 + " " + playOkID2 + " LoginOk:" + loginOkID1 + " " + loginOkID2;
  582. }
  583. }
  584. private class WaitingClient
  585. {
  586. public int timestamp;
  587. public String account;
  588. public L2GameClient gameClient;
  589. public SessionKey session;
  590. public WaitingClient(String acc, L2GameClient client, SessionKey key)
  591. {
  592. account = acc;
  593. timestamp = GameTimeController.getGameTicks();
  594. gameClient = client;
  595. session = key;
  596. }
  597. }
  598. @SuppressWarnings("synthetic-access")
  599. private static class SingletonHolder
  600. {
  601. protected static final LoginServerThread _instance = new LoginServerThread();
  602. }
  603. }