root/trunk/src/trinityrealm/AuthSocket.cpp @ 34

Revision 34, 30.9 kB (checked in by yumileroy, 17 years ago)

[svn] * Removing useless data accidentally committed.
* Applying ImpConfig? patch.
* Note: QUEUE_FOR_GM currently disabled as it's not compatible with the ACE patch. Anyone care to rewrite it?
* Note2: This is untested - I may have done some mistakes here and there. Will try to compile now.

Original author: XTZGZoReX
Date: 2008-10-10 13:37:21-05:00

Line 
1/*
2 * Copyright (C) 2005-2008 MaNGOS <http://www.mangosproject.org/>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation; either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
17 */
18
19/** \file
20    \ingroup realmd
21*/
22
23#include "Common.h"
24#include "Database/DatabaseEnv.h"
25#include "ByteBuffer.h"
26#include "Config/ConfigEnv.h"
27#include "Log.h"
28#include "RealmList.h"
29#include "AuthSocket.h"
30#include "AuthCodes.h"
31#include <openssl/md5.h>
32#include "Auth/Sha1.h"
33//#include "Util.h" -- for commented utf8ToUpperOnlyLatin
34
35extern RealmList m_realmList;
36
37extern DatabaseType dbRealmServer;
38
39#define ChunkSize 2048
40
41enum eAuthCmd
42{
43    //AUTH_NO_CMD                 = 0xFF,
44    AUTH_LOGON_CHALLENGE        = 0x00,
45    AUTH_LOGON_PROOF            = 0x01,
46    //AUTH_RECONNECT_CHALLENGE    = 0x02,
47    //AUTH_RECONNECT_PROOF        = 0x03,
48    //update srv =4
49    REALM_LIST                  = 0x10,
50    XFER_INITIATE               = 0x30,
51    XFER_DATA                   = 0x31,
52    XFER_ACCEPT                 = 0x32,
53    XFER_RESUME                 = 0x33,
54    XFER_CANCEL                 = 0x34
55};
56
57enum eStatus
58{
59    STATUS_CONNECTED = 0,
60    STATUS_AUTHED
61};
62
63// GCC have alternative #pragma pack(N) syntax and old gcc version not support pack(push,N), also any gcc version not support it at some paltform
64#if defined( __GNUC__ )
65#pragma pack(1)
66#else
67#pragma pack(push,1)
68#endif
69
70typedef struct AUTH_LOGON_CHALLENGE_C
71{
72    uint8   cmd;
73    uint8   error;
74    uint16  size;
75    uint8   gamename[4];
76    uint8   version1;
77    uint8   version2;
78    uint8   version3;
79    uint16  build;
80    uint8   platform[4];
81    uint8   os[4];
82    uint8   country[4];
83    uint32  timezone_bias;
84    uint32  ip;
85    uint8   I_len;
86    uint8   I[1];
87} sAuthLogonChallenge_C;
88
89//typedef sAuthLogonChallenge_C sAuthReconnectChallenge_C;
90/*
91typedef struct
92{
93    uint8   cmd;
94    uint8   error;
95    uint8   unk2;
96    uint8   B[32];
97    uint8   g_len;
98    uint8   g[1];
99    uint8   N_len;
100    uint8   N[32];
101    uint8   s[32];
102    uint8   unk3[16];
103} sAuthLogonChallenge_S;
104*/
105
106typedef struct AUTH_LOGON_PROOF_C
107{
108    uint8   cmd;
109    uint8   A[32];
110    uint8   M1[20];
111    uint8   crc_hash[20];
112    uint8   number_of_keys;
113    uint8   unk;                                            // Added in 1.12.x client branch
114} sAuthLogonProof_C;
115/*
116typedef struct
117{
118    uint16  unk1;
119    uint32  unk2;
120    uint8   unk3[4];
121    uint16  unk4[20];
122}  sAuthLogonProofKey_C;
123*/
124typedef struct AUTH_LOGON_PROOF_S
125{
126    uint8   cmd;
127    uint8   error;
128    uint8   M2[20];
129    uint32  unk1;
130    uint32  unk2;
131    uint16  unk3;
132} sAuthLogonProof_S;
133
134typedef struct XFER_INIT
135{
136    uint8 cmd;                                              // XFER_INITIATE
137    uint8 fileNameLen;                                      // strlen(fileName);
138    uint8 fileName[1];                                      // fileName[fileNameLen]
139    uint64 file_size;                                       // file size (bytes)
140    uint8 md5[MD5_DIGEST_LENGTH];                           // MD5
141}XFER_INIT;
142
143typedef struct XFER_DATA
144{
145    uint8 opcode;
146    uint16 data_size;
147    uint8 data[ChunkSize];
148}XFER_DATA_STRUCT;
149
150typedef struct AuthHandler
151{
152    eAuthCmd cmd;
153    uint32 status;
154    bool (AuthSocket::*handler)(void);
155}AuthHandler;
156
157// GCC have alternative #pragma pack() syntax and old gcc version not support pack(pop), also any gcc version not support it at some paltform
158#if defined( __GNUC__ )
159#pragma pack()
160#else
161#pragma pack(pop)
162#endif
163
164/// Launch a thread to transfer a patch to the client
165class PatcherRunnable: public ZThread::Runnable
166{
167    public:
168        PatcherRunnable(class AuthSocket *);
169        void run();
170
171    private:
172        AuthSocket * mySocket;
173};
174
175typedef struct PATCH_INFO
176{
177    uint8 md5[MD5_DIGEST_LENGTH];
178}PATCH_INFO;
179
180/// Caches MD5 hash of client patches present on the server
181class Patcher
182{
183    public:
184        typedef std::map<std::string, PATCH_INFO*> Patches;
185        ~Patcher();
186        Patcher();
187        Patches::const_iterator begin() const { return _patches.begin(); }
188        Patches::const_iterator end() const { return _patches.end(); }
189        void LoadPatchMD5(char*);
190        bool GetHash(char * pat,uint8 mymd5[16]);
191
192    private:
193        void LoadPatchesInfo();
194        Patches _patches;
195};
196
197const AuthHandler table[] =
198{
199    { AUTH_LOGON_CHALLENGE,     STATUS_CONNECTED, &AuthSocket::_HandleLogonChallenge},
200    { AUTH_LOGON_PROOF,         STATUS_CONNECTED, &AuthSocket::_HandleLogonProof    },
201    { REALM_LIST,               STATUS_AUTHED,    &AuthSocket::_HandleRealmList     },
202    { XFER_ACCEPT,              STATUS_CONNECTED, &AuthSocket::_HandleXferAccept    },
203    { XFER_RESUME,              STATUS_CONNECTED, &AuthSocket::_HandleXferResume    },
204    { XFER_CANCEL,              STATUS_CONNECTED, &AuthSocket::_HandleXferCancel    }
205};
206
207#define AUTH_TOTAL_COMMANDS sizeof(table)/sizeof(AuthHandler)
208
209///Holds the MD5 hash of client patches present on the server
210Patcher PatchesCache;
211
212/// Constructor - set the N and g values for SRP6
213AuthSocket::AuthSocket(ISocketHandler &h) : TcpSocket(h)
214{
215    N.SetHexStr("894B645E89E1535BBDAD5B8B290650530801B18EBFBF5E8FAB3C82872A3E9BB7");
216    g.SetDword(7);
217    _authed = false;
218    pPatch=NULL;
219
220    _accountSecurityLevel = SEC_PLAYER;
221}
222
223/// Close patch file descriptor before leaving
224AuthSocket::~AuthSocket()
225{
226    if(pPatch)
227        fclose(pPatch);
228}
229
230/// Accept the connection and set the s random value for SRP6
231void AuthSocket::OnAccept()
232{
233    sLog.outBasic("Accepting connection from '%s:%d'",
234        GetRemoteAddress().c_str(), GetRemotePort());
235
236    s.SetRand(s_BYTE_SIZE * 8);
237}
238
239/// Read the packet from the client
240void AuthSocket::OnRead()
241{
242    ///- Read the packet
243    TcpSocket::OnRead();
244    uint8 _cmd;
245    while (1)
246    {
247        if (!ibuf.GetLength())
248            return;
249
250        ///- Get the command out of it
251        ibuf.SoftRead((char *)&_cmd, 1);                    // UQ1: No longer exists in new net code ???
252        //ibuf.Read((char *)&_cmd, 1);
253        /*char *command = (char *)malloc(1);
254
255        ibuf.Read(command, 1);
256
257        _cmd = (uint8)command;*/
258        //      assert(0);
259        size_t i;
260
261        ///- Circle through known commands and call the correct command handler
262        for (i=0;i<AUTH_TOTAL_COMMANDS; i++)
263        {
264            if ((uint8)table[i].cmd == _cmd &&
265                (table[i].status == STATUS_CONNECTED ||
266                (_authed && table[i].status == STATUS_AUTHED)))
267            {
268                DEBUG_LOG("[Auth] got data for cmd %u ibuf length %u", (uint32)_cmd, ibuf.GetLength());
269
270                if (!(*this.*table[i].handler)())
271                {
272                    DEBUG_LOG("Command handler failed for cmd %u ibuf length %u", (uint32)_cmd, ibuf.GetLength());
273                    return;
274                }
275                break;
276            }
277        }
278
279        ///- Report unknown commands in the debug log
280        if (i==AUTH_TOTAL_COMMANDS)
281        {
282            DEBUG_LOG("[Auth] got unknown packet %u", (uint32)_cmd);
283            return;
284        }
285    }
286}
287
288/// Make the SRP6 calculation from hash in dB
289void AuthSocket::_SetVSFields(std::string rI)
290{
291    BigNumber I;
292    I.SetHexStr(rI.c_str());
293
294    //In case of leading zeroes in the rI hash, restore them
295    uint8 mDigest[SHA_DIGEST_LENGTH];
296    memset(mDigest,0,SHA_DIGEST_LENGTH);
297    if (I.GetNumBytes() <= SHA_DIGEST_LENGTH)
298        memcpy(mDigest,I.AsByteArray(),I.GetNumBytes());
299
300    std::reverse(mDigest,mDigest+SHA_DIGEST_LENGTH);
301
302    Sha1Hash sha;
303    sha.UpdateData(s.AsByteArray(), s.GetNumBytes());
304    sha.UpdateData(mDigest, SHA_DIGEST_LENGTH);
305    sha.Finalize();
306    BigNumber x;
307    x.SetBinary(sha.GetDigest(), sha.GetLength());
308    v = g.ModExp(x, N);
309    // No SQL injection (username escaped)
310    const char *v_hex, *s_hex;
311    v_hex = v.AsHexStr();
312    s_hex = s.AsHexStr();
313    dbRealmServer.PExecute("UPDATE account SET v = '%s', s = '%s' WHERE username = '%s'",v_hex,s_hex, _safelogin.c_str() );
314    OPENSSL_free((void*)v_hex);
315    OPENSSL_free((void*)s_hex);
316}
317
318/// Logon Challenge command handler
319bool AuthSocket::_HandleLogonChallenge()
320{
321    DEBUG_LOG("Entering _HandleLogonChallenge");
322    if (ibuf.GetLength() < sizeof(sAuthLogonChallenge_C))
323        return false;
324
325    ///- Read the first 4 bytes (header) to get the length of the remaining of the packet
326    std::vector<uint8> buf;
327    buf.resize(4);
328
329    ibuf.Read((char *)&buf[0], 4);
330
331    EndianConvert(*((uint16*)(buf[0])));
332    uint16 remaining = ((sAuthLogonChallenge_C *)&buf[0])->size;
333    DEBUG_LOG("[AuthChallenge] got header, body is %#04x bytes", remaining);
334
335    if ((remaining < sizeof(sAuthLogonChallenge_C) - buf.size()) || (ibuf.GetLength() < remaining))
336        return false;
337
338    //No big fear of memory outage (size is int16, i.e. < 65536)
339    buf.resize(remaining + buf.size() + 1);
340    buf[buf.size() - 1] = 0;
341    sAuthLogonChallenge_C *ch = (sAuthLogonChallenge_C*)&buf[0];
342
343    // BigEndian code, nop in little endian case
344    // size already converted
345    EndianConvert(*((uint32*)(&ch->gamename[0])));
346    EndianConvert(ch->build);
347    EndianConvert(*((uint32*)(&ch->platform[0])));
348    EndianConvert(*((uint32*)(&ch->os[0])));
349    EndianConvert(*((uint32*)(&ch->country[0])));
350    EndianConvert(ch->timezone_bias);
351    EndianConvert(ch->ip);
352
353    ///- Read the remaining of the packet
354    ibuf.Read((char *)&buf[4], remaining);
355    DEBUG_LOG("[AuthChallenge] got full packet, %#04x bytes", ch->size);
356    DEBUG_LOG("[AuthChallenge] name(%d): '%s'", ch->I_len, ch->I);
357
358    ByteBuffer pkt;
359
360    _login = (const char*)ch->I;
361
362    ///- Normalize account name
363    //utf8ToUpperOnlyLatin(_login); -- client already send account in expected form
364
365    //Escape the user login to avoid further SQL injection
366    //Memory will be freed on AuthSocket object destruction
367    _safelogin=_login;
368    dbRealmServer.escape_string(_safelogin);
369
370    ///- Check if the client has one of the expected version numbers
371    bool valid_version=false;
372        int MinBuild = sConfig.GetIntDefault("MinBuild", 8606);
373        int MaxBuild = sConfig.GetIntDefault("MaxBuild", 8606);
374
375        if(ch->build >= MinBuild && ch->build <= MaxBuild)
376        valid_version=true;
377        break;
378    }
379    else
380        valid_version=false;
381
382    /// <ul><li> if this is a valid version
383    if(valid_version)
384    {
385        pkt << (uint8) AUTH_LOGON_CHALLENGE;
386        pkt << (uint8) 0x00;
387
388        ///- Verify that this IP is not in the ip_banned table
389        // No SQL injection possible (paste the IP address as passed by the socket)
390        dbRealmServer.Execute("DELETE FROM ip_banned WHERE unbandate<=UNIX_TIMESTAMP() AND unbandate<>bandate");
391
392        std::string address = GetRemoteAddress();
393        dbRealmServer.escape_string(address);
394        QueryResult *result = dbRealmServer.PQuery(  "SELECT * FROM ip_banned WHERE ip = '%s'",address.c_str());
395        if(result)
396        {
397            pkt << (uint8)REALM_AUTH_ACCOUNT_BANNED;
398            sLog.outBasic("[AuthChallenge] Banned ip %s tries to login!",GetRemoteAddress().c_str ());
399            delete result;
400        }
401        else
402        {
403            ///- Get the account details from the account table
404            // No SQL injection (escaped user name)
405
406            result = dbRealmServer.PQuery("SELECT sha_pass_hash,id,locked,last_ip,gmlevel FROM account WHERE username = '%s'",_safelogin.c_str ());
407            if( result )
408            {
409                ///- If the IP is 'locked', check that the player comes indeed from the correct IP address
410                bool locked = false;
411                if((*result)[2].GetUInt8() == 1)            // if ip is locked
412                {
413                    DEBUG_LOG("[AuthChallenge] Account '%s' is locked to IP - '%s'", _login.c_str(), (*result)[3].GetString());
414                    DEBUG_LOG("[AuthChallenge] Player address is '%s'", GetRemoteAddress().c_str());
415                    if ( strcmp((*result)[3].GetString(),GetRemoteAddress().c_str()) )
416                    {
417                        DEBUG_LOG("[AuthChallenge] Account IP differs");
418                        pkt << (uint8) REALM_AUTH_ACCOUNT_FREEZED;
419                        locked=true;
420                    }
421                    else
422                    {
423                        DEBUG_LOG("[AuthChallenge] Account IP matches");
424                    }
425                }
426                else
427                {
428                    DEBUG_LOG("[AuthChallenge] Account '%s' is not locked to ip", _login.c_str());
429                }
430
431                if (!locked)
432                {
433                    //set expired bans to inactive
434                    dbRealmServer.Execute("UPDATE account_banned SET active = 0 WHERE unbandate<=UNIX_TIMESTAMP() AND unbandate<>bandate");
435                    ///- If the account is banned, reject the logon attempt
436                    QueryResult *banresult = dbRealmServer.PQuery("SELECT bandate,unbandate FROM account_banned WHERE id = %u AND active = 1", (*result)[1].GetUInt32());
437                    if(banresult)
438                    {
439                        if((*banresult)[0].GetUInt64() == (*banresult)[1].GetUInt64())
440                        {
441                            pkt << (uint8) REALM_AUTH_ACCOUNT_BANNED;
442                            sLog.outBasic("[AuthChallenge] Banned account %s tries to login!",_login.c_str ());
443                        }
444                        else
445                        {
446                            pkt << (uint8) REALM_AUTH_ACCOUNT_FREEZED;
447                            sLog.outBasic("[AuthChallenge] Temporarily banned account %s tries to login!",_login.c_str ());
448                        }
449
450                        delete banresult;
451                    }
452                    else
453                    {
454                        ///- Get the password from the account table, upper it, and make the SRP6 calculation
455                        std::string rI = (*result)[0].GetCppString();
456                        _SetVSFields(rI);
457
458                        b.SetRand(19 * 8);
459                        BigNumber gmod=g.ModExp(b, N);
460                        B = ((v * 3) + gmod) % N;
461
462                        ASSERT(gmod.GetNumBytes() <= 32);
463
464                        BigNumber unk3;
465                        unk3.SetRand(16*8);
466
467                        ///- Fill the response packet with the result
468                        pkt << (uint8)REALM_AUTH_SUCCESS;
469
470                        // B may be calculated < 32B so we force minnimal length to 32B
471                        pkt.append(B.AsByteArray(32), 32);   // 32 bytes
472                        pkt << (uint8)1;
473                        pkt.append(g.AsByteArray(), 1);
474                        pkt << (uint8)32;
475                        pkt.append(N.AsByteArray(), 32);
476                        pkt.append(s.AsByteArray(), s.GetNumBytes());   // 32 bytes
477                        pkt.append(unk3.AsByteArray(), 16);
478                        pkt << (uint8)0;                    // Added in 1.12.x client branch
479
480                        uint8 secLevel = (*result)[4].GetUInt8();
481                        _accountSecurityLevel = secLevel <= SEC_ADMINISTRATOR ? AccountTypes(secLevel) : SEC_ADMINISTRATOR;
482
483                        std::string localeName;
484                        localeName.resize(4);
485                        for(int i = 0; i <4; ++i)
486                            localeName[i] = ch->country[4-i-1];
487
488                        _localization = GetLocaleByName(localeName);
489
490                        sLog.outBasic("[AuthChallenge] account %s is using '%c%c%c%c' locale (%u)", _login.c_str (), ch->country[3],ch->country[2],ch->country[1],ch->country[0], _localization);
491                    }
492                }
493                delete result;
494            }
495            else                                            //no account
496            {
497                pkt<< (uint8) REALM_AUTH_NO_MATCH;
498            }
499        }
500    }                                                       //valid version
501    else
502        ///<li> else
503    {
504        ///- Check if we have the apropriate patch on the disk
505        char tmp[64];
506        // No buffer overflow (fixed length of arguments)
507        sprintf(tmp,"./patches/%d%c%c%c%c.mpq",ch->build,ch->country[3],
508            ch->country[2],ch->country[1],ch->country[0]);
509        // This will be closed at the destruction of the AuthSocket (client deconnection)
510        FILE *pFile=fopen(tmp,"rb");
511        if(!pFile)
512        {
513            pkt << (uint8) AUTH_LOGON_CHALLENGE;
514            pkt << (uint8) 0x00;
515            pkt << (uint8) REALM_AUTH_WRONG_BUILD_NUMBER;
516            DEBUG_LOG("[AuthChallenge] %u is not a valid client version!", ch->build);
517            DEBUG_LOG("[AuthChallenge] Patch %s not found",tmp);
518        }else
519        {                                                   //have patch
520            pPatch=pFile;
521            XFER_INIT xferh;
522
523            ///- Get the MD5 hash of the patch file (get it from preloaded Patcher cache or calculate it)
524            if(PatchesCache.GetHash(tmp,(uint8*)&xferh.md5))
525            {
526                DEBUG_LOG("\n[AuthChallenge] Found precached patch info for patch %s",tmp);
527            }
528            else
529            {                                               //calculate patch md5
530                printf("\n[AuthChallenge] Patch info for %s was not cached.",tmp);
531                PatchesCache.LoadPatchMD5(tmp);
532                PatchesCache.GetHash(tmp,(uint8*)&xferh.md5);
533            }
534
535            ///- Send a packet to the client with the file length and MD5 hash
536            uint8 data[2]={AUTH_LOGON_PROOF,REALM_AUTH_UPDATE_CLIENT};
537            SendBuf((const char*)data,sizeof(data));
538
539            memcpy(&xferh,"0\x05Patch",7);
540            xferh.cmd=XFER_INITIATE;
541            fseek(pPatch,0,SEEK_END);
542            xferh.file_size=ftell(pPatch);
543
544            SendBuf((const char*)&xferh,sizeof(xferh));
545            return true;
546        }
547    }
548    /// </ul>
549    SendBuf((char const*)pkt.contents(), pkt.size());
550    return true;
551}
552
553/// Logon Proof command handler
554bool AuthSocket::_HandleLogonProof()
555{
556    DEBUG_LOG("Entering _HandleLogonProof");
557    ///- Read the packet
558    if (ibuf.GetLength() < sizeof(sAuthLogonProof_C))
559        return false;
560
561    sAuthLogonProof_C lp;
562    ibuf.Read((char *)&lp, sizeof(sAuthLogonProof_C));
563
564    ///- Continue the SRP6 calculation based on data received from the client
565    BigNumber A;
566    A.SetBinary(lp.A, 32);
567
568    Sha1Hash sha;
569    sha.UpdateBigNumbers(&A, &B, NULL);
570    sha.Finalize();
571    BigNumber u;
572    u.SetBinary(sha.GetDigest(), 20);
573    BigNumber S = (A * (v.ModExp(u, N))).ModExp(b, N);
574
575    uint8 t[32];
576    uint8 t1[16];
577    uint8 vK[40];
578    memcpy(t, S.AsByteArray(), 32);
579    for (int i = 0; i < 16; i++)
580    {
581        t1[i] = t[i*2];
582    }
583    sha.Initialize();
584    sha.UpdateData(t1, 16);
585    sha.Finalize();
586    for (int i = 0; i < 20; i++)
587    {
588        vK[i*2] = sha.GetDigest()[i];
589    }
590    for (int i = 0; i < 16; i++)
591    {
592        t1[i] = t[i*2+1];
593    }
594    sha.Initialize();
595    sha.UpdateData(t1, 16);
596    sha.Finalize();
597    for (int i = 0; i < 20; i++)
598    {
599        vK[i*2+1] = sha.GetDigest()[i];
600    }
601    K.SetBinary(vK, 40);
602
603    uint8 hash[20];
604
605    sha.Initialize();
606    sha.UpdateBigNumbers(&N, NULL);
607    sha.Finalize();
608    memcpy(hash, sha.GetDigest(), 20);
609    sha.Initialize();
610    sha.UpdateBigNumbers(&g, NULL);
611    sha.Finalize();
612    for (int i = 0; i < 20; i++)
613    {
614        hash[i] ^= sha.GetDigest()[i];
615    }
616    BigNumber t3;
617    t3.SetBinary(hash, 20);
618
619    sha.Initialize();
620    sha.UpdateData(_login);
621    sha.Finalize();
622    uint8 t4[SHA_DIGEST_LENGTH];
623    memcpy(t4, sha.GetDigest(), SHA_DIGEST_LENGTH);
624
625    sha.Initialize();
626    sha.UpdateBigNumbers(&t3, NULL);
627    sha.UpdateData(t4, SHA_DIGEST_LENGTH);
628    sha.UpdateBigNumbers(&s, &A, &B, &K, NULL);
629    sha.Finalize();
630    BigNumber M;
631    M.SetBinary(sha.GetDigest(), 20);
632
633    ///- Check if SRP6 results match (password is correct), else send an error
634    if (!memcmp(M.AsByteArray(), lp.M1, 20))
635    {
636        sLog.outBasic("User '%s' successfully authenticated", _login.c_str());
637
638        ///- Update the sessionkey, last_ip, last login time and reset number of failed logins in the account table for this account
639        // No SQL injection (escaped user name) and IP address as received by socket
640        const char* K_hex = K.AsHexStr();
641        dbRealmServer.PExecute("UPDATE account SET sessionkey = '%s', last_ip = '%s', last_login = NOW(), locale = '%u', failed_logins = 0 WHERE username = '%s'", K_hex, GetRemoteAddress().c_str(),  _localization, _safelogin.c_str() );
642        OPENSSL_free((void*)K_hex);
643
644        ///- Finish SRP6 and send the final result to the client
645        sha.Initialize();
646        sha.UpdateBigNumbers(&A, &M, &K, NULL);
647        sha.Finalize();
648
649        sAuthLogonProof_S proof;
650        memcpy(proof.M2, sha.GetDigest(), 20);
651        proof.cmd = AUTH_LOGON_PROOF;
652        proof.error = 0;
653        proof.unk1 = 0x00800000;
654        proof.unk2 = 0x00;
655        proof.unk3 = 0x00;
656
657        SendBuf((char *)&proof, sizeof(proof));
658
659        ///- Set _authed to true!
660        _authed = true;
661    }
662    else
663    {
664        char data[4]={AUTH_LOGON_PROOF,REALM_AUTH_NO_MATCH,3,0};
665        SendBuf(data,sizeof(data));
666        sLog.outBasic("[AuthChallenge] account %s tried to login with wrong password!",_login.c_str ());
667
668        uint32 MaxWrongPassCount = sConfig.GetIntDefault("WrongPass.MaxCount", 0);
669        if(MaxWrongPassCount > 0)
670        {
671            //Increment number of failed logins by one and if it reaches the limit temporarily ban that account or IP
672            dbRealmServer.PExecute("UPDATE account SET failed_logins = failed_logins + 1 WHERE username = '%s'",_safelogin.c_str());
673
674            if(QueryResult *loginfail = dbRealmServer.PQuery("SELECT id, failed_logins FROM account WHERE username = '%s'", _safelogin.c_str()))
675            {
676                Field* fields = loginfail->Fetch();
677                uint32 failed_logins = fields[1].GetUInt32();
678
679                if( failed_logins >= MaxWrongPassCount )
680                {
681                    uint32 WrongPassBanTime = sConfig.GetIntDefault("WrongPass.BanTime", 600);
682                    bool WrongPassBanType = sConfig.GetBoolDefault("WrongPass.BanType", false);
683
684                    if(WrongPassBanType)
685                    {
686                        uint32 acc_id = fields[0].GetUInt32();
687                        dbRealmServer.PExecute("INSERT INTO account_banned VALUES ('%u',UNIX_TIMESTAMP(),UNIX_TIMESTAMP()+'%u','MaNGOS realmd','Failed login autoban',1)",
688                            acc_id, WrongPassBanTime);
689                        sLog.outBasic("[AuthChallenge] account %s got banned for '%u' seconds because it failed to authenticate '%u' times",
690                            _login.c_str(), WrongPassBanTime, failed_logins);
691                    }
692                    else
693                    {
694                        std::string current_ip = GetRemoteAddress();
695                        dbRealmServer.escape_string(current_ip);
696                        dbRealmServer.PExecute("INSERT INTO ip_banned VALUES ('%s',UNIX_TIMESTAMP(),UNIX_TIMESTAMP()+'%u','MaNGOS realmd','Failed login autoban')",
697                            current_ip.c_str(), WrongPassBanTime);
698                        sLog.outBasic("[AuthChallenge] IP %s got banned for '%u' seconds because account %s failed to authenticate '%u' times",
699                            current_ip.c_str(), WrongPassBanTime, _login.c_str(), failed_logins);
700                    }
701                }
702                delete loginfail;
703            }
704        }
705    }
706    return true;
707}
708
709/// %Realm List command handler
710bool AuthSocket::_HandleRealmList()
711{
712    DEBUG_LOG("Entering _HandleRealmList");
713    if (ibuf.GetLength() < 5)
714        return false;
715
716    ibuf.Remove(5);
717
718    ///- Get the user id (else close the connection)
719    // No SQL injection (escaped user name)
720
721    QueryResult *result = dbRealmServer.PQuery("SELECT id,sha_pass_hash FROM account WHERE username = '%s'",_safelogin.c_str());
722    if(!result)
723    {
724        sLog.outError("[ERROR] user %s tried to login and we cannot find him in the database.",_login.c_str());
725        SetCloseAndDelete();
726        return false;
727    }
728
729    uint32 id = (*result)[0].GetUInt32();
730    std::string rI = (*result)[1].GetCppString();
731    delete result;
732
733    ///- Update realm list if need
734    m_realmList.UpdateIfNeed();
735
736    ///- Circle through realms in the RealmList and construct the return packet (including # of user characters in each realm)
737    ByteBuffer pkt;
738    pkt << (uint32) 0;
739    pkt << (uint16) m_realmList.size();
740    RealmList::RealmMap::const_iterator i;
741    for( i = m_realmList.begin(); i != m_realmList.end(); i++ )
742    {
743        uint8 AmountOfCharacters;
744
745        // No SQL injection. id of realm is controlled by the database.
746        result = dbRealmServer.PQuery( "SELECT numchars FROM realmcharacters WHERE realmid = '%d' AND acctid='%u'",i->second.m_ID,id);
747        if( result )
748        {
749            Field *fields = result->Fetch();
750            AmountOfCharacters = fields[0].GetUInt8();
751            delete result;
752        }
753        else
754            AmountOfCharacters = 0;
755
756        uint8 lock = (i->second.allowedSecurityLevel > _accountSecurityLevel) ? 1 : 0;
757
758        pkt << i->second.icon;                             // realm type
759        pkt << lock;                                       // if 1, then realm locked
760        pkt << i->second.color;                            // if 2, then realm is offline
761        pkt << i->first;
762        pkt << i->second.address;
763        pkt << i->second.populationLevel;
764        pkt << AmountOfCharacters;
765        pkt << i->second.timezone;                          // realm category
766        pkt << (uint8) 0x2C;                                // unk, may be realm number/id?
767    }
768    pkt << (uint8) 0x10;
769    pkt << (uint8) 0x00;
770
771    ByteBuffer hdr;
772    hdr << (uint8) REALM_LIST;
773    hdr << (uint16)pkt.size();
774    hdr.append(pkt);
775
776    SendBuf((char const*)hdr.contents(), hdr.size());
777
778    // Set check field before possible relogin to realm
779    _SetVSFields(rI);
780    return true;
781}
782
783/// Resume patch transfer
784bool AuthSocket::_HandleXferResume()
785{
786    DEBUG_LOG("Entering _HandleXferResume");
787    ///- Check packet length and patch existence
788    if (ibuf.GetLength()<9 || !pPatch)
789    {
790        sLog.outError("Error while resuming patch transfer (wrong packet)");
791        return false;
792    }
793
794    ///- Launch a PatcherRunnable thread starting at given patch file offset
795    uint64 start;
796    ibuf.Remove(1);
797    ibuf.Read((char*)&start,sizeof(start));
798    fseek(pPatch,start,0);
799
800    ZThread::Thread u(new PatcherRunnable(this));
801    return true;
802}
803
804/// Cancel patch transfer
805bool AuthSocket::_HandleXferCancel()
806{
807    DEBUG_LOG("Entering _HandleXferCancel");
808
809    ///- Close and delete the socket
810    ibuf.Remove(1);                                         //clear input buffer
811
812    //ZThread::Thread::sleep(15);
813    SetCloseAndDelete();
814
815    return true;
816}
817
818/// Accept patch transfer
819bool AuthSocket::_HandleXferAccept()
820{
821    DEBUG_LOG("Entering _HandleXferAccept");
822
823    ///- Check packet length and patch existence
824    if (!pPatch)
825    {
826        sLog.outError("Error while accepting patch transfer (wrong packet)");
827        return false;
828    }
829
830    ///- Launch a PatcherRunnable thread, starting at the begining of the patch file
831    ibuf.Remove(1);                                         //clear input buffer
832    fseek(pPatch,0,0);
833
834    ZThread::Thread u(new PatcherRunnable(this));
835
836    return true;
837}
838
839/// Check if there is lag on the connection to the client
840bool AuthSocket::IsLag()
841{
842    return (TCP_BUFSIZE_READ-GetOutputLength()< 2*ChunkSize);
843}
844
845PatcherRunnable::PatcherRunnable(class AuthSocket * as)
846{
847    mySocket=as;
848}
849
850/// Send content of patch file to the client
851void PatcherRunnable::run()
852{
853    XFER_DATA_STRUCT xfdata;
854    xfdata.opcode = XFER_DATA;
855
856    while(!feof(mySocket->pPatch) && mySocket->Ready())
857    {
858        ///- Wait until output buffer is reasonably empty
859        while(mySocket->Ready() && mySocket->IsLag())
860        {
861            ZThread::Thread::sleep(1);
862        }
863        ///- And send content of the patch file to the client
864        xfdata.data_size=fread(&xfdata.data,1,ChunkSize,mySocket->pPatch);
865        mySocket->SendBuf((const char*)&xfdata,xfdata.data_size +(sizeof(XFER_DATA_STRUCT)-ChunkSize));
866    }
867}
868
869/// Preload MD5 hashes of existing patch files on server
870#ifndef _WIN32
871#include <sys/dir.h>
872#include <errno.h>
873void Patcher::LoadPatchesInfo()
874{
875    DIR * dirp;
876    //int errno;
877    struct dirent * dp;
878    dirp = opendir("./patches/");
879    if(!dirp)
880        return;
881    while (dirp)
882    {
883        errno = 0;
884        if ((dp = readdir(dirp)) != NULL)
885        {
886            int l=strlen(dp->d_name);
887            if(l<8)continue;
888            if(!memcmp(&dp->d_name[l-4],".mpq",4))
889                LoadPatchMD5(dp->d_name);
890        }
891        else
892        {
893            if(errno != 0)
894            {
895                closedir(dirp);
896                return;
897            }
898            break;
899        }
900    }
901
902    if(dirp)
903        closedir(dirp);
904}
905
906#else
907void Patcher::LoadPatchesInfo()
908{
909    WIN32_FIND_DATA fil;
910    HANDLE hFil=FindFirstFile("./patches/*.mpq",&fil);
911    if(hFil==INVALID_HANDLE_VALUE)
912        return;                                             //no patches were found
913
914    LoadPatchMD5(fil.cFileName);
915
916    while(FindNextFile(hFil,&fil))
917        LoadPatchMD5(fil.cFileName);
918}
919#endif
920
921/// Calculate and store MD5 hash for a given patch file
922void Patcher::LoadPatchMD5(char * szFileName)
923{
924    ///- Try to open the patch file
925    std::string path = "./patches/";
926    path += szFileName;
927    FILE * pPatch=fopen(path.c_str(),"rb");
928    sLog.outDebug("Loading patch info from %s\n",path.c_str());
929    if(!pPatch)
930    {
931        sLog.outError("Error loading patch %s\n",path.c_str());
932        return;
933    }
934
935    ///- Calculate the MD5 hash
936    MD5_CTX ctx;
937    MD5_Init(&ctx);
938    uint8* buf = new uint8[512*1024];
939
940    while (!feof(pPatch))
941    {
942        size_t read = fread(buf, 1, 512*1024, pPatch);
943        MD5_Update(&ctx, buf, read);
944    }
945    delete [] buf;
946    fclose(pPatch);
947
948    ///- Store the result in the internal patch hash map
949    _patches[path] = new PATCH_INFO;
950    MD5_Final((uint8 *)&_patches[path]->md5 , &ctx);
951}
952
953/// Get cached MD5 hash for a given patch file
954bool Patcher::GetHash(char * pat,uint8 mymd5[16])
955{
956    for( Patches::iterator i = _patches.begin(); i != _patches.end(); i++ )
957        if(!stricmp(pat,i->first.c_str () ))
958    {
959        memcpy(mymd5,i->second->md5,16);
960        return true;
961    }
962
963    return false;
964}
965
966/// Launch the patch hashing mechanism on object creation
967Patcher::Patcher()
968{
969    LoadPatchesInfo();
970}
971
972/// Empty and delete the patch map on termination
973Patcher::~Patcher()
974{
975    for(Patches::iterator i = _patches.begin(); i != _patches.end(); i++ )
976        delete i->second;
977}
Note: See TracBrowser for help on using the browser.