LoginServerThread.java 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664
  1. /*
  2. * This program is free software: you can redistribute it and/or modify it under
  3. * the terms of the GNU General Public License as published by the Free Software
  4. * Foundation, either version 3 of the License, or (at your option) any later
  5. * version.
  6. *
  7. * This program is distributed in the hope that it will be useful, but WITHOUT
  8. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  9. * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
  10. * details.
  11. *
  12. * You should have received a copy of the GNU General Public License along with
  13. * this program. If not, see <http://www.gnu.org/licenses/>.
  14. */
  15. package com.l2jserver.gameserver;
  16. import java.io.BufferedOutputStream;
  17. import java.io.IOException;
  18. import java.io.InputStream;
  19. import java.io.OutputStream;
  20. import java.math.BigInteger;
  21. import java.net.Socket;
  22. import java.net.UnknownHostException;
  23. import java.security.GeneralSecurityException;
  24. import java.security.KeyFactory;
  25. import java.security.interfaces.RSAPublicKey;
  26. import java.security.spec.RSAKeyGenParameterSpec;
  27. import java.security.spec.RSAPublicKeySpec;
  28. import java.util.Collection;
  29. import java.util.List;
  30. import java.util.Map;
  31. import java.util.logging.Level;
  32. import java.util.logging.LogRecord;
  33. import java.util.logging.Logger;
  34. import javolution.util.FastList;
  35. import javolution.util.FastMap;
  36. import com.l2jserver.Config;
  37. import com.l2jserver.gameserver.model.L2World;
  38. import com.l2jserver.gameserver.model.actor.instance.L2PcInstance;
  39. import com.l2jserver.gameserver.network.L2GameClient;
  40. import com.l2jserver.gameserver.network.SystemMessageId;
  41. import com.l2jserver.gameserver.network.L2GameClient.GameClientState;
  42. import com.l2jserver.gameserver.network.gameserverpackets.AuthRequest;
  43. import com.l2jserver.gameserver.network.gameserverpackets.BlowFishKey;
  44. import com.l2jserver.gameserver.network.gameserverpackets.ChangeAccessLevel;
  45. import com.l2jserver.gameserver.network.gameserverpackets.PlayerAuthRequest;
  46. import com.l2jserver.gameserver.network.gameserverpackets.PlayerInGame;
  47. import com.l2jserver.gameserver.network.gameserverpackets.PlayerLogout;
  48. import com.l2jserver.gameserver.network.gameserverpackets.PlayerTracert;
  49. import com.l2jserver.gameserver.network.gameserverpackets.ServerStatus;
  50. import com.l2jserver.gameserver.network.loginserverpackets.AuthResponse;
  51. import com.l2jserver.gameserver.network.loginserverpackets.InitLS;
  52. import com.l2jserver.gameserver.network.loginserverpackets.KickPlayer;
  53. import com.l2jserver.gameserver.network.loginserverpackets.LoginServerFail;
  54. import com.l2jserver.gameserver.network.loginserverpackets.PlayerAuthResponse;
  55. import com.l2jserver.gameserver.network.serverpackets.CharSelectionInfo;
  56. import com.l2jserver.gameserver.network.serverpackets.LoginFail;
  57. import com.l2jserver.util.Util;
  58. import com.l2jserver.util.crypt.NewCrypt;
  59. import com.l2jserver.util.network.BaseSendablePacket;
  60. public class LoginServerThread extends Thread
  61. {
  62. protected static final Logger _log = Logger.getLogger(LoginServerThread.class.getName());
  63. protected static final Logger _logAccounting = Logger.getLogger("accounting");
  64. /** {@see com.l2jserver.loginserver.LoginServer#PROTOCOL_REV } */
  65. private static final int REVISION = 0x0103;
  66. private RSAPublicKey _publicKey;
  67. private String _hostname;
  68. private int _port;
  69. private int _gamePort;
  70. private Socket _loginSocket;
  71. private InputStream _in;
  72. private OutputStream _out;
  73. /**
  74. * The BlowFish engine used to encrypt packets<br>
  75. * It is first initialized with a unified key:<br>
  76. * "_;v.]05-31!|+-%xT!^[$\00"<br>
  77. * <br>
  78. * and then after handshake, with a new key sent by<br>
  79. * loginserver during the handshake. This new key is stored<br>
  80. * in {@link #_blowfishKey}
  81. */
  82. private NewCrypt _blowfish;
  83. private byte[] _blowfishKey;
  84. private byte[] _hexID;
  85. private boolean _acceptAlternate;
  86. private int _requestID;
  87. private int _serverID;
  88. private boolean _reserveHost;
  89. private int _maxPlayer;
  90. private List<WaitingClient> _waitingClients;
  91. private Map<String, L2GameClient> _accountsInGameServer;
  92. private int _status;
  93. private String _serverName;
  94. private String _gameExternalHost;
  95. private String _gameInternalHost;
  96. private LoginServerThread()
  97. {
  98. super("LoginServerThread");
  99. _port = Config.GAME_SERVER_LOGIN_PORT;
  100. _gamePort = Config.PORT_GAME;
  101. _hostname = Config.GAME_SERVER_LOGIN_HOST;
  102. _hexID = Config.HEX_ID;
  103. if (_hexID == null)
  104. {
  105. _requestID = Config.REQUEST_ID;
  106. _hexID = Util.generateHex(16);
  107. }
  108. else
  109. {
  110. _requestID = Config.SERVER_ID;
  111. }
  112. _acceptAlternate = Config.ACCEPT_ALTERNATE_ID;
  113. _reserveHost = Config.RESERVE_HOST_ON_LOGIN;
  114. _gameExternalHost = Config.EXTERNAL_HOSTNAME;
  115. _gameInternalHost = Config.INTERNAL_HOSTNAME;
  116. _waitingClients = new FastList<WaitingClient>();
  117. _accountsInGameServer = new FastMap<String, L2GameClient>().shared();
  118. _maxPlayer = Config.MAXIMUM_ONLINE_USERS;
  119. }
  120. public static LoginServerThread getInstance()
  121. {
  122. return SingletonHolder._instance;
  123. }
  124. @Override
  125. public void run()
  126. {
  127. while (!isInterrupted())
  128. {
  129. int lengthHi = 0;
  130. int lengthLo = 0;
  131. int length = 0;
  132. boolean checksumOk = false;
  133. try
  134. {
  135. // Connection
  136. _log.info("Connecting to login on " + _hostname + ":" + _port);
  137. _loginSocket = new Socket(_hostname, _port);
  138. _in = _loginSocket.getInputStream();
  139. _out = new BufferedOutputStream(_loginSocket.getOutputStream());
  140. //init Blowfish
  141. _blowfishKey = Util.generateHex(40);
  142. _blowfish = new NewCrypt("_;v.]05-31!|+-%xT!^[$\00");
  143. while (!isInterrupted())
  144. {
  145. lengthLo = _in.read();
  146. lengthHi = _in.read();
  147. length = lengthHi * 256 + lengthLo;
  148. if (lengthHi < 0)
  149. {
  150. _log.finer("LoginServerThread: Login terminated the connection.");
  151. break;
  152. }
  153. byte[] incoming = new byte[length - 2];
  154. int receivedBytes = 0;
  155. int newBytes = 0;
  156. int left = length - 2;
  157. while (newBytes != -1 && receivedBytes < length - 2)
  158. {
  159. newBytes = _in.read(incoming, receivedBytes, left);
  160. receivedBytes = receivedBytes + newBytes;
  161. left -= newBytes;
  162. }
  163. if (receivedBytes != length - 2)
  164. {
  165. _log.warning("Incomplete Packet is sent to the server, closing connection.(LS)");
  166. break;
  167. }
  168. // decrypt if we have a key
  169. byte[] decrypt = _blowfish.decrypt(incoming);
  170. checksumOk = NewCrypt.verifyChecksum(decrypt);
  171. if (!checksumOk)
  172. {
  173. _log.warning("Incorrect packet checksum, ignoring packet (LS)");
  174. break;
  175. }
  176. if (Config.DEBUG)
  177. _log.warning("[C]\n" + Util.printData(decrypt));
  178. int packetType = decrypt[0] & 0xff;
  179. switch (packetType)
  180. {
  181. case 00:
  182. InitLS init = new InitLS(decrypt);
  183. if (Config.DEBUG)
  184. _log.info("Init received");
  185. if (init.getRevision() != REVISION)
  186. {
  187. //TODO: revision mismatch
  188. _log.warning("/!\\ Revision mismatch between LS and GS /!\\");
  189. break;
  190. }
  191. try
  192. {
  193. KeyFactory kfac = KeyFactory.getInstance("RSA");
  194. BigInteger modulus = new BigInteger(init.getRSAKey());
  195. RSAPublicKeySpec kspec1 = new RSAPublicKeySpec(modulus, RSAKeyGenParameterSpec.F4);
  196. _publicKey = (RSAPublicKey) kfac.generatePublic(kspec1);
  197. if (Config.DEBUG)
  198. _log.info("RSA key set up");
  199. }
  200. catch (GeneralSecurityException e)
  201. {
  202. _log.warning("Troubles while init the public key send by login");
  203. break;
  204. }
  205. //send the blowfish key through the rsa encryption
  206. BlowFishKey bfk = new BlowFishKey(_blowfishKey, _publicKey);
  207. sendPacket(bfk);
  208. if (Config.DEBUG)
  209. _log.info("Sent new blowfish key");
  210. //now, only accept paket with the new encryption
  211. _blowfish = new NewCrypt(_blowfishKey);
  212. if (Config.DEBUG)
  213. _log.info("Changed blowfish key");
  214. AuthRequest ar = new AuthRequest(_requestID, _acceptAlternate, _hexID, _gameExternalHost, _gameInternalHost, _gamePort, _reserveHost, _maxPlayer);
  215. sendPacket(ar);
  216. if (Config.DEBUG)
  217. _log.info("Sent AuthRequest to login");
  218. break;
  219. case 01:
  220. LoginServerFail lsf = new LoginServerFail(decrypt);
  221. _log.info("Damn! Registeration Failed: " + lsf.getReasonString());
  222. // login will close the connection here
  223. break;
  224. case 02:
  225. AuthResponse aresp = new AuthResponse(decrypt);
  226. _serverID = aresp.getServerId();
  227. _serverName = aresp.getServerName();
  228. Config.saveHexid(_serverID, hexToString(_hexID));
  229. _log.info("Registered on login as Server " + _serverID + " : " + _serverName);
  230. ServerStatus st = new ServerStatus();
  231. if (Config.SERVER_LIST_BRACKET)
  232. {
  233. st.addAttribute(ServerStatus.SERVER_LIST_SQUARE_BRACKET, ServerStatus.ON);
  234. }
  235. else
  236. {
  237. st.addAttribute(ServerStatus.SERVER_LIST_SQUARE_BRACKET, ServerStatus.OFF);
  238. }
  239. if (Config.SERVER_LIST_CLOCK)
  240. {
  241. st.addAttribute(ServerStatus.SERVER_LIST_CLOCK, ServerStatus.ON);
  242. }
  243. else
  244. {
  245. st.addAttribute(ServerStatus.SERVER_LIST_CLOCK, ServerStatus.OFF);
  246. }
  247. if (Config.SERVER_LIST_TESTSERVER)
  248. {
  249. st.addAttribute(ServerStatus.TEST_SERVER, ServerStatus.ON);
  250. }
  251. else
  252. {
  253. st.addAttribute(ServerStatus.TEST_SERVER, ServerStatus.OFF);
  254. }
  255. if (Config.SERVER_GMONLY)
  256. {
  257. st.addAttribute(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_GM_ONLY);
  258. }
  259. else
  260. {
  261. st.addAttribute(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_AUTO);
  262. }
  263. sendPacket(st);
  264. if (L2World.getInstance().getAllPlayersCount() > 0)
  265. {
  266. FastList<String> playerList = new FastList<String>();
  267. Collection<L2PcInstance> pls = L2World.getInstance().getAllPlayers().values();
  268. //synchronized (L2World.getInstance().getAllPlayers())
  269. {
  270. for (L2PcInstance player : pls)
  271. playerList.add(player.getAccountName());
  272. }
  273. PlayerInGame pig = new PlayerInGame(playerList);
  274. sendPacket(pig);
  275. }
  276. break;
  277. case 03:
  278. PlayerAuthResponse par = new PlayerAuthResponse(decrypt);
  279. String account = par.getAccount();
  280. WaitingClient wcToRemove = null;
  281. synchronized (_waitingClients)
  282. {
  283. for (WaitingClient wc : _waitingClients)
  284. {
  285. if (wc.account.equals(account))
  286. {
  287. wcToRemove = wc;
  288. }
  289. }
  290. }
  291. if (wcToRemove != null)
  292. {
  293. if (par.isAuthed())
  294. {
  295. if (Config.DEBUG)
  296. _log.info("Login accepted player " + wcToRemove.account + " waited("
  297. + (GameTimeController.getGameTicks() - wcToRemove.timestamp) + "ms)");
  298. PlayerInGame pig = new PlayerInGame(par.getAccount());
  299. sendPacket(pig);
  300. wcToRemove.gameClient.setState(GameClientState.AUTHED);
  301. wcToRemove.gameClient.setSessionId(wcToRemove.session);
  302. CharSelectionInfo cl = new CharSelectionInfo(wcToRemove.account, wcToRemove.gameClient.getSessionId().playOkID1);
  303. wcToRemove.gameClient.getConnection().sendPacket(cl);
  304. wcToRemove.gameClient.setCharSelection(cl.getCharInfo());
  305. }
  306. else
  307. {
  308. _log.warning("Session key is not correct. Closing connection for account " + wcToRemove.account + ".");
  309. //wcToRemove.gameClient.getConnection().sendPacket(new LoginFail(LoginFail.SYSTEM_ERROR_LOGIN_LATER));
  310. wcToRemove.gameClient.close(new LoginFail(LoginFail.SYSTEM_ERROR_LOGIN_LATER));
  311. _accountsInGameServer.remove(wcToRemove.account);
  312. }
  313. _waitingClients.remove(wcToRemove);
  314. }
  315. break;
  316. case 04:
  317. KickPlayer kp = new KickPlayer(decrypt);
  318. doKickPlayer(kp.getAccount());
  319. break;
  320. }
  321. }
  322. }
  323. catch (UnknownHostException e)
  324. {
  325. if (Config.DEBUG)
  326. e.printStackTrace();
  327. }
  328. catch (IOException e)
  329. {
  330. _log.log(Level.WARNING, "Disconnected from Login, Trying to reconnect: " + e.getMessage(), e);
  331. }
  332. finally
  333. {
  334. try
  335. {
  336. _loginSocket.close();
  337. if (isInterrupted())
  338. return;
  339. }
  340. catch (Exception e)
  341. {
  342. }
  343. }
  344. try
  345. {
  346. Thread.sleep(5000); // 5 seconds tempo.
  347. }
  348. catch (InterruptedException e)
  349. {
  350. return; // never swallow an interrupt!
  351. }
  352. }
  353. }
  354. public void addWaitingClientAndSendRequest(String acc, L2GameClient client, SessionKey key)
  355. {
  356. if (Config.DEBUG)
  357. _log.info(String.valueOf(key));
  358. WaitingClient wc = new WaitingClient(acc, client, key);
  359. synchronized (_waitingClients)
  360. {
  361. _waitingClients.add(wc);
  362. }
  363. PlayerAuthRequest par = new PlayerAuthRequest(acc, key);
  364. try
  365. {
  366. sendPacket(par);
  367. }
  368. catch (IOException e)
  369. {
  370. _log.warning("Error while sending player auth request");
  371. if (Config.DEBUG)
  372. e.printStackTrace();
  373. }
  374. }
  375. public void removeWaitingClient(L2GameClient client)
  376. {
  377. WaitingClient toRemove = null;
  378. synchronized (_waitingClients)
  379. {
  380. for (WaitingClient c : _waitingClients)
  381. {
  382. if (c.gameClient == client)
  383. {
  384. toRemove = c;
  385. }
  386. }
  387. if (toRemove != null)
  388. _waitingClients.remove(toRemove);
  389. }
  390. }
  391. public void sendLogout(String account)
  392. {
  393. PlayerLogout pl = new PlayerLogout(account);
  394. try
  395. {
  396. sendPacket(pl);
  397. }
  398. catch (IOException e)
  399. {
  400. _log.warning("Error while sending logout packet to login");
  401. if (Config.DEBUG)
  402. e.printStackTrace();
  403. }
  404. finally
  405. {
  406. _accountsInGameServer.remove(account);
  407. }
  408. }
  409. public void addGameServerLogin(String account, L2GameClient client)
  410. {
  411. _accountsInGameServer.put(account, client);
  412. }
  413. public void sendAccessLevel(String account, int level)
  414. {
  415. ChangeAccessLevel cal = new ChangeAccessLevel(account, level);
  416. try
  417. {
  418. sendPacket(cal);
  419. }
  420. catch (IOException e)
  421. {
  422. if (Config.DEBUG)
  423. e.printStackTrace();
  424. }
  425. }
  426. public void sendClientTracert(String account, String[] adress)
  427. {
  428. PlayerTracert ptc = new PlayerTracert(account, adress[0], adress[1], adress[2], adress[3], adress[4]);
  429. try
  430. {
  431. sendPacket(ptc);
  432. }
  433. catch (IOException e)
  434. {
  435. if (Config.DEBUG)
  436. e.printStackTrace();
  437. }
  438. }
  439. private String hexToString(byte[] hex)
  440. {
  441. return new BigInteger(hex).toString(16);
  442. }
  443. public void doKickPlayer(String account)
  444. {
  445. if (_accountsInGameServer.get(account) != null)
  446. {
  447. L2GameClient client = _accountsInGameServer.get(account);
  448. LogRecord record = new LogRecord(Level.WARNING, "Kicked by login");
  449. record.setParameters(new Object[]{client});
  450. _logAccounting.log(record);
  451. final L2PcInstance player = client.getActiveChar();
  452. if (player != null)
  453. {
  454. player.sendPacket(SystemMessageId.ANOTHER_LOGIN_WITH_ACCOUNT);
  455. ThreadPoolManager.getInstance().scheduleGeneral(new Runnable()
  456. {
  457. public void run()
  458. {
  459. player.logout(false);
  460. }
  461. } , 400);
  462. }
  463. else
  464. client.closeNow();
  465. LoginServerThread.getInstance().sendLogout(account);
  466. }
  467. }
  468. /**
  469. * @param sl
  470. * @throws IOException
  471. */
  472. private void sendPacket(BaseSendablePacket sl) throws IOException
  473. {
  474. byte[] data = sl.getContent();
  475. NewCrypt.appendChecksum(data);
  476. if (Config.DEBUG)
  477. _log.finest("[S]\n" + Util.printData(data));
  478. data = _blowfish.crypt(data);
  479. int len = data.length + 2;
  480. synchronized (_out) //avoids tow threads writing in the mean time
  481. {
  482. _out.write(len & 0xff);
  483. _out.write(len >> 8 & 0xff);
  484. _out.write(data);
  485. _out.flush();
  486. }
  487. }
  488. /**
  489. * @param maxPlayer The maxPlayer to set.
  490. */
  491. public void setMaxPlayer(int maxPlayer)
  492. {
  493. sendServerStatus(ServerStatus.MAX_PLAYERS, maxPlayer);
  494. _maxPlayer = maxPlayer;
  495. }
  496. /**
  497. * @return Returns the maxPlayer.
  498. */
  499. public int getMaxPlayer()
  500. {
  501. return _maxPlayer;
  502. }
  503. /**
  504. * @param server_gm_only
  505. */
  506. public void sendServerStatus(int id, int value)
  507. {
  508. ServerStatus ss = new ServerStatus();
  509. ss.addAttribute(id, value);
  510. try
  511. {
  512. sendPacket(ss);
  513. }
  514. catch (IOException e)
  515. {
  516. if (Config.DEBUG)
  517. e.printStackTrace();
  518. }
  519. }
  520. /**
  521. * @return
  522. */
  523. public String getStatusString()
  524. {
  525. return ServerStatus.STATUS_STRING[_status];
  526. }
  527. /**
  528. * @return
  529. */
  530. public boolean isClockShown()
  531. {
  532. return Config.SERVER_LIST_CLOCK;
  533. }
  534. /**
  535. * @return
  536. */
  537. public boolean isBracketShown()
  538. {
  539. return Config.SERVER_LIST_BRACKET;
  540. }
  541. /**
  542. * @return Returns the serverName.
  543. */
  544. public String getServerName()
  545. {
  546. return _serverName;
  547. }
  548. public void setServerStatus(int status)
  549. {
  550. switch (status)
  551. {
  552. case ServerStatus.STATUS_AUTO:
  553. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_AUTO);
  554. _status = status;
  555. break;
  556. case ServerStatus.STATUS_DOWN:
  557. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_DOWN);
  558. _status = status;
  559. break;
  560. case ServerStatus.STATUS_FULL:
  561. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_FULL);
  562. _status = status;
  563. break;
  564. case ServerStatus.STATUS_GM_ONLY:
  565. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_GM_ONLY);
  566. _status = status;
  567. break;
  568. case ServerStatus.STATUS_GOOD:
  569. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_GOOD);
  570. _status = status;
  571. break;
  572. case ServerStatus.STATUS_NORMAL:
  573. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_NORMAL);
  574. _status = status;
  575. break;
  576. default:
  577. throw new IllegalArgumentException("Status does not exists:" + status);
  578. }
  579. }
  580. public static class SessionKey
  581. {
  582. public int playOkID1;
  583. public int playOkID2;
  584. public int loginOkID1;
  585. public int loginOkID2;
  586. public SessionKey(int loginOK1, int loginOK2, int playOK1, int playOK2)
  587. {
  588. playOkID1 = playOK1;
  589. playOkID2 = playOK2;
  590. loginOkID1 = loginOK1;
  591. loginOkID2 = loginOK2;
  592. }
  593. @Override
  594. public String toString()
  595. {
  596. return "PlayOk: " + playOkID1 + " " + playOkID2 + " LoginOk:" + loginOkID1 + " " + loginOkID2;
  597. }
  598. }
  599. private class WaitingClient
  600. {
  601. public int timestamp;
  602. public String account;
  603. public L2GameClient gameClient;
  604. public SessionKey session;
  605. public WaitingClient(String acc, L2GameClient client, SessionKey key)
  606. {
  607. account = acc;
  608. timestamp = GameTimeController.getGameTicks();
  609. gameClient = client;
  610. session = key;
  611. }
  612. }
  613. @SuppressWarnings("synthetic-access")
  614. private static class SingletonHolder
  615. {
  616. protected static final LoginServerThread _instance = new LoginServerThread();
  617. }
  618. }