LoginServerThread.java 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661
  1. /*
  2. * This program is free software: you can redistribute it and/or modify it under
  3. * the terms of the GNU General Public License as published by the Free Software
  4. * Foundation, either version 3 of the License, or (at your option) any later
  5. * version.
  6. *
  7. * This program is distributed in the hope that it will be useful, but WITHOUT
  8. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  9. * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
  10. * details.
  11. *
  12. * You should have received a copy of the GNU General Public License along with
  13. * this program. If not, see <http://www.gnu.org/licenses/>.
  14. */
  15. package com.l2jserver.gameserver;
  16. import java.io.BufferedOutputStream;
  17. import java.io.IOException;
  18. import java.io.InputStream;
  19. import java.io.OutputStream;
  20. import java.math.BigInteger;
  21. import java.net.Socket;
  22. import java.net.UnknownHostException;
  23. import java.security.GeneralSecurityException;
  24. import java.security.KeyFactory;
  25. import java.security.interfaces.RSAPublicKey;
  26. import java.security.spec.RSAKeyGenParameterSpec;
  27. import java.security.spec.RSAPublicKeySpec;
  28. import java.util.Collection;
  29. import java.util.List;
  30. import java.util.Map;
  31. import java.util.logging.Level;
  32. import java.util.logging.LogRecord;
  33. import java.util.logging.Logger;
  34. import javolution.util.FastList;
  35. import javolution.util.FastMap;
  36. import com.l2jserver.Config;
  37. import com.l2jserver.gameserver.model.L2World;
  38. import com.l2jserver.gameserver.model.actor.instance.L2PcInstance;
  39. import com.l2jserver.gameserver.network.L2GameClient;
  40. import com.l2jserver.gameserver.network.SystemMessageId;
  41. import com.l2jserver.gameserver.network.L2GameClient.GameClientState;
  42. import com.l2jserver.gameserver.network.gameserverpackets.AuthRequest;
  43. import com.l2jserver.gameserver.network.gameserverpackets.BlowFishKey;
  44. import com.l2jserver.gameserver.network.gameserverpackets.ChangeAccessLevel;
  45. import com.l2jserver.gameserver.network.gameserverpackets.PlayerAuthRequest;
  46. import com.l2jserver.gameserver.network.gameserverpackets.PlayerInGame;
  47. import com.l2jserver.gameserver.network.gameserverpackets.PlayerLogout;
  48. import com.l2jserver.gameserver.network.gameserverpackets.PlayerTracert;
  49. import com.l2jserver.gameserver.network.gameserverpackets.ServerStatus;
  50. import com.l2jserver.gameserver.network.loginserverpackets.AuthResponse;
  51. import com.l2jserver.gameserver.network.loginserverpackets.InitLS;
  52. import com.l2jserver.gameserver.network.loginserverpackets.KickPlayer;
  53. import com.l2jserver.gameserver.network.loginserverpackets.LoginServerFail;
  54. import com.l2jserver.gameserver.network.loginserverpackets.PlayerAuthResponse;
  55. import com.l2jserver.gameserver.network.serverpackets.CharSelectionInfo;
  56. import com.l2jserver.gameserver.network.serverpackets.LoginFail;
  57. import com.l2jserver.util.Util;
  58. import com.l2jserver.util.crypt.NewCrypt;
  59. import com.l2jserver.util.network.BaseSendablePacket;
  60. public class LoginServerThread extends Thread
  61. {
  62. protected static final Logger _log = Logger.getLogger(LoginServerThread.class.getName());
  63. protected static final Logger _logAccounting = Logger.getLogger("accounting");
  64. /** {@see com.l2jserver.loginserver.LoginServer#PROTOCOL_REV } */
  65. private static final int REVISION = 0x0103;
  66. private RSAPublicKey _publicKey;
  67. private String _hostname;
  68. private int _port;
  69. private int _gamePort;
  70. private Socket _loginSocket;
  71. private InputStream _in;
  72. private OutputStream _out;
  73. /**
  74. * The BlowFish engine used to encrypt packets<br>
  75. * It is first initialized with a unified key:<br>
  76. * "_;v.]05-31!|+-%xT!^[$\00"<br>
  77. * <br>
  78. * and then after handshake, with a new key sent by<br>
  79. * loginserver during the handshake. This new key is stored<br>
  80. * in {@link #_blowfishKey}
  81. */
  82. private NewCrypt _blowfish;
  83. private byte[] _blowfishKey;
  84. private byte[] _hexID;
  85. private boolean _acceptAlternate;
  86. private int _requestID;
  87. private int _serverID;
  88. private boolean _reserveHost;
  89. private int _maxPlayer;
  90. private List<WaitingClient> _waitingClients;
  91. private Map<String, L2GameClient> _accountsInGameServer;
  92. private int _status;
  93. private String _serverName;
  94. private String _gameExternalHost;
  95. private String _gameInternalHost;
  96. private LoginServerThread()
  97. {
  98. super("LoginServerThread");
  99. _port = Config.GAME_SERVER_LOGIN_PORT;
  100. _gamePort = Config.PORT_GAME;
  101. _hostname = Config.GAME_SERVER_LOGIN_HOST;
  102. _hexID = Config.HEX_ID;
  103. if (_hexID == null)
  104. {
  105. _requestID = Config.REQUEST_ID;
  106. _hexID = Util.generateHex(16);
  107. }
  108. else
  109. {
  110. _requestID = Config.SERVER_ID;
  111. }
  112. _acceptAlternate = Config.ACCEPT_ALTERNATE_ID;
  113. _reserveHost = Config.RESERVE_HOST_ON_LOGIN;
  114. _gameExternalHost = Config.EXTERNAL_HOSTNAME;
  115. _gameInternalHost = Config.INTERNAL_HOSTNAME;
  116. _waitingClients = new FastList<WaitingClient>();
  117. _accountsInGameServer = new FastMap<String, L2GameClient>().shared();
  118. _maxPlayer = Config.MAXIMUM_ONLINE_USERS;
  119. }
  120. public static LoginServerThread getInstance()
  121. {
  122. return SingletonHolder._instance;
  123. }
  124. @Override
  125. public void run()
  126. {
  127. while (true)
  128. {
  129. int lengthHi = 0;
  130. int lengthLo = 0;
  131. int length = 0;
  132. boolean checksumOk = false;
  133. try
  134. {
  135. // Connection
  136. _log.info("Connecting to login on " + _hostname + ":" + _port);
  137. _loginSocket = new Socket(_hostname, _port);
  138. _in = _loginSocket.getInputStream();
  139. _out = new BufferedOutputStream(_loginSocket.getOutputStream());
  140. //init Blowfish
  141. _blowfishKey = Util.generateHex(40);
  142. _blowfish = new NewCrypt("_;v.]05-31!|+-%xT!^[$\00");
  143. while (true)
  144. {
  145. lengthLo = _in.read();
  146. lengthHi = _in.read();
  147. length = lengthHi * 256 + lengthLo;
  148. if (lengthHi < 0)
  149. {
  150. _log.finer("LoginServerThread: Login terminated the connection.");
  151. break;
  152. }
  153. byte[] incoming = new byte[length];
  154. incoming[0] = (byte) lengthLo;
  155. incoming[1] = (byte) lengthHi;
  156. int receivedBytes = 0;
  157. int newBytes = 0;
  158. while (newBytes != -1 && receivedBytes < length - 2)
  159. {
  160. newBytes = _in.read(incoming, 2, length - 2);
  161. receivedBytes = receivedBytes + newBytes;
  162. }
  163. if (receivedBytes != length - 2)
  164. {
  165. _log.warning("Incomplete Packet is sent to the server, closing connection.(LS)");
  166. break;
  167. }
  168. byte[] decrypt = new byte[length - 2];
  169. System.arraycopy(incoming, 2, decrypt, 0, decrypt.length);
  170. // decrypt if we have a key
  171. decrypt = _blowfish.decrypt(decrypt);
  172. checksumOk = NewCrypt.verifyChecksum(decrypt);
  173. if (!checksumOk)
  174. {
  175. _log.warning("Incorrect packet checksum, ignoring packet (LS)");
  176. break;
  177. }
  178. if (Config.DEBUG)
  179. _log.warning("[C]\n" + Util.printData(decrypt));
  180. int packetType = decrypt[0] & 0xff;
  181. switch (packetType)
  182. {
  183. case 00:
  184. InitLS init = new InitLS(decrypt);
  185. if (Config.DEBUG)
  186. _log.info("Init received");
  187. if (init.getRevision() != REVISION)
  188. {
  189. //TODO: revision mismatch
  190. _log.warning("/!\\ Revision mismatch between LS and GS /!\\");
  191. break;
  192. }
  193. try
  194. {
  195. KeyFactory kfac = KeyFactory.getInstance("RSA");
  196. BigInteger modulus = new BigInteger(init.getRSAKey());
  197. RSAPublicKeySpec kspec1 = new RSAPublicKeySpec(modulus, RSAKeyGenParameterSpec.F4);
  198. _publicKey = (RSAPublicKey) kfac.generatePublic(kspec1);
  199. if (Config.DEBUG)
  200. _log.info("RSA key set up");
  201. }
  202. catch (GeneralSecurityException e)
  203. {
  204. _log.warning("Troubles while init the public key send by login");
  205. break;
  206. }
  207. //send the blowfish key through the rsa encryption
  208. BlowFishKey bfk = new BlowFishKey(_blowfishKey, _publicKey);
  209. sendPacket(bfk);
  210. if (Config.DEBUG)
  211. _log.info("Sent new blowfish key");
  212. //now, only accept paket with the new encryption
  213. _blowfish = new NewCrypt(_blowfishKey);
  214. if (Config.DEBUG)
  215. _log.info("Changed blowfish key");
  216. AuthRequest ar = new AuthRequest(_requestID, _acceptAlternate, _hexID, _gameExternalHost, _gameInternalHost, _gamePort, _reserveHost, _maxPlayer);
  217. sendPacket(ar);
  218. if (Config.DEBUG)
  219. _log.info("Sent AuthRequest to login");
  220. break;
  221. case 01:
  222. LoginServerFail lsf = new LoginServerFail(decrypt);
  223. _log.info("Damn! Registeration Failed: " + lsf.getReasonString());
  224. // login will close the connection here
  225. break;
  226. case 02:
  227. AuthResponse aresp = new AuthResponse(decrypt);
  228. _serverID = aresp.getServerId();
  229. _serverName = aresp.getServerName();
  230. Config.saveHexid(_serverID, hexToString(_hexID));
  231. _log.info("Registered on login as Server " + _serverID + " : " + _serverName);
  232. ServerStatus st = new ServerStatus();
  233. if (Config.SERVER_LIST_BRACKET)
  234. {
  235. st.addAttribute(ServerStatus.SERVER_LIST_SQUARE_BRACKET, ServerStatus.ON);
  236. }
  237. else
  238. {
  239. st.addAttribute(ServerStatus.SERVER_LIST_SQUARE_BRACKET, ServerStatus.OFF);
  240. }
  241. if (Config.SERVER_LIST_CLOCK)
  242. {
  243. st.addAttribute(ServerStatus.SERVER_LIST_CLOCK, ServerStatus.ON);
  244. }
  245. else
  246. {
  247. st.addAttribute(ServerStatus.SERVER_LIST_CLOCK, ServerStatus.OFF);
  248. }
  249. if (Config.SERVER_LIST_TESTSERVER)
  250. {
  251. st.addAttribute(ServerStatus.TEST_SERVER, ServerStatus.ON);
  252. }
  253. else
  254. {
  255. st.addAttribute(ServerStatus.TEST_SERVER, ServerStatus.OFF);
  256. }
  257. if (Config.SERVER_GMONLY)
  258. {
  259. st.addAttribute(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_GM_ONLY);
  260. }
  261. else
  262. {
  263. st.addAttribute(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_AUTO);
  264. }
  265. sendPacket(st);
  266. if (L2World.getInstance().getAllPlayersCount() > 0)
  267. {
  268. FastList<String> playerList = new FastList<String>();
  269. Collection<L2PcInstance> pls = L2World.getInstance().getAllPlayers().values();
  270. //synchronized (L2World.getInstance().getAllPlayers())
  271. {
  272. for (L2PcInstance player : pls)
  273. playerList.add(player.getAccountName());
  274. }
  275. PlayerInGame pig = new PlayerInGame(playerList);
  276. sendPacket(pig);
  277. }
  278. break;
  279. case 03:
  280. PlayerAuthResponse par = new PlayerAuthResponse(decrypt);
  281. String account = par.getAccount();
  282. WaitingClient wcToRemove = null;
  283. synchronized (_waitingClients)
  284. {
  285. for (WaitingClient wc : _waitingClients)
  286. {
  287. if (wc.account.equals(account))
  288. {
  289. wcToRemove = wc;
  290. }
  291. }
  292. }
  293. if (wcToRemove != null)
  294. {
  295. if (par.isAuthed())
  296. {
  297. if (Config.DEBUG)
  298. _log.info("Login accepted player " + wcToRemove.account + " waited("
  299. + (GameTimeController.getGameTicks() - wcToRemove.timestamp) + "ms)");
  300. PlayerInGame pig = new PlayerInGame(par.getAccount());
  301. sendPacket(pig);
  302. wcToRemove.gameClient.setState(GameClientState.AUTHED);
  303. wcToRemove.gameClient.setSessionId(wcToRemove.session);
  304. CharSelectionInfo cl = new CharSelectionInfo(wcToRemove.account, wcToRemove.gameClient.getSessionId().playOkID1);
  305. wcToRemove.gameClient.getConnection().sendPacket(cl);
  306. wcToRemove.gameClient.setCharSelection(cl.getCharInfo());
  307. }
  308. else
  309. {
  310. _log.warning("session key is not correct. closing connection");
  311. wcToRemove.gameClient.getConnection().sendPacket(new LoginFail(1));
  312. wcToRemove.gameClient.closeNow();
  313. }
  314. _waitingClients.remove(wcToRemove);
  315. }
  316. break;
  317. case 04:
  318. KickPlayer kp = new KickPlayer(decrypt);
  319. doKickPlayer(kp.getAccount());
  320. break;
  321. }
  322. }
  323. }
  324. catch (UnknownHostException e)
  325. {
  326. if (Config.DEBUG)
  327. e.printStackTrace();
  328. }
  329. catch (IOException e)
  330. {
  331. _log.info("Deconnected from Login, Trying to reconnect:");
  332. _log.info(e.toString());
  333. }
  334. finally
  335. {
  336. try
  337. {
  338. _loginSocket.close();
  339. }
  340. catch (Exception e)
  341. {
  342. }
  343. }
  344. try
  345. {
  346. Thread.sleep(5000); // 5 seconds tempo.
  347. }
  348. catch (InterruptedException e)
  349. {
  350. return; // never swallow an interrupt!
  351. }
  352. }
  353. }
  354. public void addWaitingClientAndSendRequest(String acc, L2GameClient client, SessionKey key)
  355. {
  356. if (Config.DEBUG)
  357. _log.info(String.valueOf(key));
  358. WaitingClient wc = new WaitingClient(acc, client, key);
  359. synchronized (_waitingClients)
  360. {
  361. _waitingClients.add(wc);
  362. }
  363. PlayerAuthRequest par = new PlayerAuthRequest(acc, key);
  364. try
  365. {
  366. sendPacket(par);
  367. }
  368. catch (IOException e)
  369. {
  370. _log.warning("Error while sending player auth request");
  371. if (Config.DEBUG)
  372. e.printStackTrace();
  373. }
  374. }
  375. public void removeWaitingClient(L2GameClient client)
  376. {
  377. WaitingClient toRemove = null;
  378. synchronized (_waitingClients)
  379. {
  380. for (WaitingClient c : _waitingClients)
  381. {
  382. if (c.gameClient == client)
  383. {
  384. toRemove = c;
  385. }
  386. }
  387. if (toRemove != null)
  388. _waitingClients.remove(toRemove);
  389. }
  390. }
  391. public void sendLogout(String account)
  392. {
  393. PlayerLogout pl = new PlayerLogout(account);
  394. try
  395. {
  396. sendPacket(pl);
  397. }
  398. catch (IOException e)
  399. {
  400. _log.warning("Error while sending logout packet to login");
  401. if (Config.DEBUG)
  402. e.printStackTrace();
  403. }
  404. }
  405. public void addGameServerLogin(String account, L2GameClient client)
  406. {
  407. _accountsInGameServer.put(account, client);
  408. }
  409. public void sendAccessLevel(String account, int level)
  410. {
  411. ChangeAccessLevel cal = new ChangeAccessLevel(account, level);
  412. try
  413. {
  414. sendPacket(cal);
  415. }
  416. catch (IOException e)
  417. {
  418. if (Config.DEBUG)
  419. e.printStackTrace();
  420. }
  421. }
  422. public void sendClientTracert(String account, String pcIp,
  423. String hop1, String hop2, String hop3, String hop4)
  424. {
  425. PlayerTracert ptc = new PlayerTracert(account, pcIp, hop1, hop2, hop3, hop4);
  426. try
  427. {
  428. sendPacket(ptc);
  429. }
  430. catch (IOException e)
  431. {
  432. if (Config.DEBUG)
  433. e.printStackTrace();
  434. }
  435. }
  436. private String hexToString(byte[] hex)
  437. {
  438. return new BigInteger(hex).toString(16);
  439. }
  440. public void doKickPlayer(String account)
  441. {
  442. if (_accountsInGameServer.get(account) != null)
  443. {
  444. L2GameClient client = _accountsInGameServer.get(account);
  445. LogRecord record = new LogRecord(Level.WARNING, "Kicked by login");
  446. record.setParameters(new Object[]{client});
  447. _logAccounting.log(record);
  448. final L2PcInstance player = client.getActiveChar();
  449. if (player != null)
  450. {
  451. player.sendPacket(SystemMessageId.ANOTHER_LOGIN_WITH_ACCOUNT);
  452. ThreadPoolManager.getInstance().scheduleGeneral(new Runnable()
  453. {
  454. public void run()
  455. {
  456. player.logout(false);
  457. }
  458. } , 400);
  459. }
  460. else
  461. client.closeNow();
  462. LoginServerThread.getInstance().sendLogout(account);
  463. }
  464. }
  465. /**
  466. * @param sl
  467. * @throws IOException
  468. */
  469. private void sendPacket(BaseSendablePacket sl) throws IOException
  470. {
  471. byte[] data = sl.getContent();
  472. NewCrypt.appendChecksum(data);
  473. if (Config.DEBUG)
  474. _log.finest("[S]\n" + Util.printData(data));
  475. data = _blowfish.crypt(data);
  476. int len = data.length + 2;
  477. synchronized (_out) //avoids tow threads writing in the mean time
  478. {
  479. _out.write(len & 0xff);
  480. _out.write(len >> 8 & 0xff);
  481. _out.write(data);
  482. _out.flush();
  483. }
  484. }
  485. /**
  486. * @param maxPlayer The maxPlayer to set.
  487. */
  488. public void setMaxPlayer(int maxPlayer)
  489. {
  490. sendServerStatus(ServerStatus.MAX_PLAYERS, maxPlayer);
  491. _maxPlayer = maxPlayer;
  492. }
  493. /**
  494. * @return Returns the maxPlayer.
  495. */
  496. public int getMaxPlayer()
  497. {
  498. return _maxPlayer;
  499. }
  500. /**
  501. * @param server_gm_only
  502. */
  503. public void sendServerStatus(int id, int value)
  504. {
  505. ServerStatus ss = new ServerStatus();
  506. ss.addAttribute(id, value);
  507. try
  508. {
  509. sendPacket(ss);
  510. }
  511. catch (IOException e)
  512. {
  513. if (Config.DEBUG)
  514. e.printStackTrace();
  515. }
  516. }
  517. /**
  518. * @return
  519. */
  520. public String getStatusString()
  521. {
  522. return ServerStatus.STATUS_STRING[_status];
  523. }
  524. /**
  525. * @return
  526. */
  527. public boolean isClockShown()
  528. {
  529. return Config.SERVER_LIST_CLOCK;
  530. }
  531. /**
  532. * @return
  533. */
  534. public boolean isBracketShown()
  535. {
  536. return Config.SERVER_LIST_BRACKET;
  537. }
  538. /**
  539. * @return Returns the serverName.
  540. */
  541. public String getServerName()
  542. {
  543. return _serverName;
  544. }
  545. public void setServerStatus(int status)
  546. {
  547. switch (status)
  548. {
  549. case ServerStatus.STATUS_AUTO:
  550. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_AUTO);
  551. _status = status;
  552. break;
  553. case ServerStatus.STATUS_DOWN:
  554. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_DOWN);
  555. _status = status;
  556. break;
  557. case ServerStatus.STATUS_FULL:
  558. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_FULL);
  559. _status = status;
  560. break;
  561. case ServerStatus.STATUS_GM_ONLY:
  562. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_GM_ONLY);
  563. _status = status;
  564. break;
  565. case ServerStatus.STATUS_GOOD:
  566. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_GOOD);
  567. _status = status;
  568. break;
  569. case ServerStatus.STATUS_NORMAL:
  570. sendServerStatus(ServerStatus.SERVER_LIST_STATUS, ServerStatus.STATUS_NORMAL);
  571. _status = status;
  572. break;
  573. default:
  574. throw new IllegalArgumentException("Status does not exists:" + status);
  575. }
  576. }
  577. public static class SessionKey
  578. {
  579. public int playOkID1;
  580. public int playOkID2;
  581. public int loginOkID1;
  582. public int loginOkID2;
  583. public SessionKey(int loginOK1, int loginOK2, int playOK1, int playOK2)
  584. {
  585. playOkID1 = playOK1;
  586. playOkID2 = playOK2;
  587. loginOkID1 = loginOK1;
  588. loginOkID2 = loginOK2;
  589. }
  590. @Override
  591. public String toString()
  592. {
  593. return "PlayOk: " + playOkID1 + " " + playOkID2 + " LoginOk:" + loginOkID1 + " " + loginOkID2;
  594. }
  595. }
  596. private class WaitingClient
  597. {
  598. public int timestamp;
  599. public String account;
  600. public L2GameClient gameClient;
  601. public SessionKey session;
  602. public WaitingClient(String acc, L2GameClient client, SessionKey key)
  603. {
  604. account = acc;
  605. timestamp = GameTimeController.getGameTicks();
  606. gameClient = client;
  607. session = key;
  608. }
  609. }
  610. @SuppressWarnings("synthetic-access")
  611. private static class SingletonHolder
  612. {
  613. protected static final LoginServerThread _instance = new LoginServerThread();
  614. }
  615. }