[1] | 1 | // Copyright (c) Athena Dev Teams - Licensed under GNU GPL |
---|
| 2 | // For more information, see LICENCE in the main folder |
---|
| 3 | |
---|
| 4 | #include "../common/cbasetypes.h" |
---|
| 5 | #include "../common/mmo.h" |
---|
| 6 | #include "../common/core.h" |
---|
| 7 | #include "../common/socket.h" |
---|
| 8 | #include "../common/db.h" |
---|
| 9 | #include "../common/timer.h" |
---|
| 10 | #include "../common/malloc.h" |
---|
| 11 | #include "../common/strlib.h" |
---|
| 12 | #include "../common/showmsg.h" |
---|
| 13 | #include "../common/version.h" |
---|
| 14 | #include "../common/md5calc.h" |
---|
| 15 | #include "../common/lock.h" |
---|
| 16 | #include "login.h" |
---|
| 17 | |
---|
| 18 | #include <stdio.h> |
---|
| 19 | #include <stdlib.h> |
---|
| 20 | #include <string.h> |
---|
| 21 | #include <sys/stat.h> // for stat/lstat/fstat |
---|
| 22 | |
---|
| 23 | struct Login_Config login_config; |
---|
| 24 | |
---|
| 25 | int login_fd; // login server socket |
---|
| 26 | #define MAX_SERVERS 30 |
---|
| 27 | struct mmo_char_server server[MAX_SERVERS]; // char server data |
---|
| 28 | |
---|
| 29 | #define sex_num2str(num) ( (num == 0 ) ? 'F' : (num == 1 ) ? 'M' : 'S' ) |
---|
| 30 | #define sex_str2num(str) ( (str == 'F' ) ? 0 : (str == 'M' ) ? 1 : 2 ) |
---|
| 31 | |
---|
| 32 | // Advanced subnet check [LuzZza] |
---|
| 33 | struct s_subnet { |
---|
| 34 | uint32 mask; |
---|
| 35 | uint32 char_ip; |
---|
| 36 | uint32 map_ip; |
---|
| 37 | } subnet[16]; |
---|
| 38 | |
---|
| 39 | int subnet_count = 0; |
---|
| 40 | |
---|
| 41 | // GM account management |
---|
| 42 | struct gm_account* gm_account_db = NULL; |
---|
| 43 | unsigned int GM_num = 0; // number of gm accounts |
---|
| 44 | char GM_account_filename[1024] = "conf/GM_account.txt"; |
---|
| 45 | long creation_time_GM_account_file; // tracks the last-changed timestamp of the gm accounts file |
---|
| 46 | int gm_account_filename_check_timer = 15; // Timer to check if GM_account file has been changed and reload GM account automaticaly (in seconds; default: 15) |
---|
| 47 | |
---|
| 48 | //Account registration flood protection [Kevin] |
---|
| 49 | int allowed_regs = 1; |
---|
| 50 | int time_allowed = 10; //in seconds |
---|
| 51 | unsigned int new_reg_tick = 0; |
---|
| 52 | |
---|
| 53 | |
---|
| 54 | // data handling (TXT) |
---|
| 55 | char account_filename[1024] = "save/account.txt"; |
---|
| 56 | |
---|
| 57 | // account database |
---|
| 58 | struct mmo_account* auth_dat = NULL; |
---|
| 59 | unsigned int auth_num = 0, auth_max = 0; |
---|
| 60 | |
---|
| 61 | int account_id_count = START_ACCOUNT_NUM; |
---|
| 62 | |
---|
| 63 | // define the number of times that some players must authentify them before to save account file. |
---|
| 64 | // it's just about normal authentication. If an account is created or modified, save is immediatly done. |
---|
| 65 | // An authentication just change last connected IP and date. It already save in log file. |
---|
| 66 | // set minimum auth change before save: |
---|
| 67 | #define AUTH_BEFORE_SAVE_FILE 10 |
---|
| 68 | // set divider of auth_num to found number of change before save |
---|
| 69 | #define AUTH_SAVE_FILE_DIVIDER 50 |
---|
| 70 | int auth_before_save_file = 0; // Counter. First save when 1st char-server do connection. |
---|
| 71 | |
---|
| 72 | |
---|
| 73 | // ladmin configuration |
---|
| 74 | bool admin_state = false; |
---|
| 75 | char admin_pass[24] = ""; |
---|
| 76 | uint32 admin_allowed_ip = 0; |
---|
| 77 | |
---|
| 78 | int parse_admin(int fd); |
---|
| 79 | |
---|
| 80 | |
---|
| 81 | //----------------------------------------------------- |
---|
| 82 | // Auth database |
---|
| 83 | //----------------------------------------------------- |
---|
| 84 | #define AUTH_TIMEOUT 30000 |
---|
| 85 | |
---|
| 86 | struct auth_node { |
---|
| 87 | int account_id; |
---|
| 88 | uint32 login_id1; |
---|
| 89 | uint32 login_id2; |
---|
| 90 | uint32 ip; |
---|
| 91 | char sex; |
---|
| 92 | }; |
---|
| 93 | |
---|
| 94 | static DBMap* auth_db; // int account_id -> struct auth_node* |
---|
| 95 | |
---|
| 96 | //----------------------------------------------------- |
---|
| 97 | // Online User Database [Wizputer] |
---|
| 98 | //----------------------------------------------------- |
---|
| 99 | |
---|
| 100 | struct online_login_data { |
---|
| 101 | int account_id; |
---|
| 102 | int waiting_disconnect; |
---|
| 103 | int char_server; |
---|
| 104 | }; |
---|
| 105 | |
---|
| 106 | static DBMap* online_db; // int account_id -> struct online_login_data* |
---|
| 107 | static int waiting_disconnect_timer(int tid, unsigned int tick, int id, intptr data); |
---|
| 108 | |
---|
| 109 | static void* create_online_user(DBKey key, va_list args) |
---|
| 110 | { |
---|
| 111 | struct online_login_data* p; |
---|
| 112 | CREATE(p, struct online_login_data, 1); |
---|
| 113 | p->account_id = key.i; |
---|
| 114 | p->char_server = -1; |
---|
| 115 | p->waiting_disconnect = -1; |
---|
| 116 | return p; |
---|
| 117 | } |
---|
| 118 | |
---|
| 119 | struct online_login_data* add_online_user(int char_server, int account_id) |
---|
| 120 | { |
---|
| 121 | struct online_login_data* p; |
---|
| 122 | if( !login_config.online_check ) |
---|
| 123 | return NULL; |
---|
| 124 | p = (struct online_login_data*)idb_ensure(online_db, account_id, create_online_user); |
---|
| 125 | p->char_server = char_server; |
---|
| 126 | if( p->waiting_disconnect != -1 ) |
---|
| 127 | { |
---|
| 128 | delete_timer(p->waiting_disconnect, waiting_disconnect_timer); |
---|
| 129 | p->waiting_disconnect = -1; |
---|
| 130 | } |
---|
| 131 | return p; |
---|
| 132 | } |
---|
| 133 | |
---|
| 134 | void remove_online_user(int account_id) |
---|
| 135 | { |
---|
| 136 | struct online_login_data* p; |
---|
| 137 | if( !login_config.online_check ) |
---|
| 138 | return; |
---|
| 139 | p = (struct online_login_data*)idb_get(online_db, account_id); |
---|
| 140 | if( p == NULL ) |
---|
| 141 | return; |
---|
| 142 | if( p->waiting_disconnect != -1 ) |
---|
| 143 | delete_timer(p->waiting_disconnect, waiting_disconnect_timer); |
---|
| 144 | |
---|
| 145 | idb_remove(online_db, account_id); |
---|
| 146 | } |
---|
| 147 | |
---|
| 148 | static int waiting_disconnect_timer(int tid, unsigned int tick, int id, intptr data) |
---|
| 149 | { |
---|
| 150 | struct online_login_data* p = (struct online_login_data*)idb_get(online_db, id); |
---|
| 151 | if( p != NULL && p->waiting_disconnect == tid && p->account_id == id ) |
---|
| 152 | { |
---|
| 153 | p->waiting_disconnect = -1; |
---|
| 154 | remove_online_user(id); |
---|
| 155 | idb_remove(auth_db, id); |
---|
| 156 | } |
---|
| 157 | return 0; |
---|
| 158 | } |
---|
| 159 | |
---|
| 160 | //-------------------------------------------------------------------- |
---|
| 161 | // Packet send to all char-servers, except one (wos: without our self) |
---|
| 162 | //-------------------------------------------------------------------- |
---|
| 163 | int charif_sendallwos(int sfd, uint8* buf, size_t len) |
---|
| 164 | { |
---|
| 165 | int i, c; |
---|
| 166 | |
---|
| 167 | for( i = 0, c = 0; i < MAX_SERVERS; ++i ) |
---|
| 168 | { |
---|
| 169 | int fd = server[i].fd; |
---|
| 170 | if( session_isValid(fd) && fd != sfd ) |
---|
| 171 | { |
---|
| 172 | WFIFOHEAD(fd,len); |
---|
| 173 | memcpy(WFIFOP(fd,0), buf, len); |
---|
| 174 | WFIFOSET(fd,len); |
---|
| 175 | ++c; |
---|
| 176 | } |
---|
| 177 | } |
---|
| 178 | |
---|
| 179 | return c; |
---|
| 180 | } |
---|
| 181 | |
---|
| 182 | //---------------------------------------------------------------------- |
---|
| 183 | // Determine if an account (id) is a GM account |
---|
| 184 | // and returns its level (or 0 if it isn't a GM account or if not found) |
---|
| 185 | //---------------------------------------------------------------------- |
---|
| 186 | int isGM(int account_id) |
---|
| 187 | { |
---|
| 188 | unsigned int i; |
---|
| 189 | ARR_FIND( 0, GM_num, i, gm_account_db[i].account_id == account_id ); |
---|
| 190 | return ( i < GM_num ) ? gm_account_db[i].level : 0; |
---|
| 191 | } |
---|
| 192 | |
---|
| 193 | //---------------------------------------------------------------------- |
---|
| 194 | // Adds a new GM using acc id and level |
---|
| 195 | //---------------------------------------------------------------------- |
---|
| 196 | void addGM(int account_id, int level) |
---|
| 197 | { |
---|
| 198 | static unsigned int GM_max = 0; |
---|
| 199 | unsigned int i; |
---|
| 200 | |
---|
| 201 | ARR_FIND( 0, auth_num, i, auth_dat[i].account_id == account_id ); |
---|
| 202 | if( i == auth_num ) |
---|
| 203 | return; // no such account |
---|
| 204 | |
---|
| 205 | ARR_FIND( 0, GM_num, i, gm_account_db[i].account_id == account_id ); |
---|
| 206 | if( i < GM_num ) |
---|
| 207 | { |
---|
| 208 | if (gm_account_db[i].level == level) |
---|
| 209 | ShowWarning("addGM: GM account %d defined twice (same level: %d).\n", account_id, level); |
---|
| 210 | else { |
---|
| 211 | ShowWarning("addGM: GM account %d defined twice (levels: %d and %d).\n", account_id, gm_account_db[i].level, level); |
---|
| 212 | gm_account_db[i].level = level; |
---|
| 213 | } |
---|
| 214 | return; // entry already present |
---|
| 215 | } |
---|
| 216 | |
---|
| 217 | // new account |
---|
| 218 | if (GM_num >= GM_max) { |
---|
| 219 | GM_max += 256; |
---|
| 220 | RECREATE(gm_account_db, struct gm_account, GM_max); |
---|
| 221 | } |
---|
| 222 | gm_account_db[GM_num].account_id = account_id; |
---|
| 223 | gm_account_db[GM_num].level = level; |
---|
| 224 | GM_num++; |
---|
| 225 | if (GM_num >= 4000) |
---|
| 226 | ShowWarning("4000 GM accounts found. Next GM accounts are not read.\n"); |
---|
| 227 | } |
---|
| 228 | |
---|
| 229 | //------------------------------------------------------- |
---|
| 230 | // Reading function of GM accounts file (and their level) |
---|
| 231 | //------------------------------------------------------- |
---|
| 232 | int read_gm_account(void) |
---|
| 233 | { |
---|
| 234 | char line[512]; |
---|
| 235 | FILE *fp; |
---|
| 236 | int account_id, level; |
---|
| 237 | int line_counter; |
---|
| 238 | struct stat file_stat; |
---|
| 239 | int start_range = 0, end_range = 0, is_range = 0, current_id = 0; |
---|
| 240 | |
---|
| 241 | if(gm_account_db) aFree(gm_account_db); |
---|
| 242 | CREATE(gm_account_db, struct gm_account, 1); |
---|
| 243 | GM_num = 0; |
---|
| 244 | |
---|
| 245 | // get last modify time/date |
---|
| 246 | if (stat(GM_account_filename, &file_stat)) |
---|
| 247 | creation_time_GM_account_file = 0; // error |
---|
| 248 | else |
---|
| 249 | creation_time_GM_account_file = (long)file_stat.st_mtime; |
---|
| 250 | |
---|
| 251 | if ((fp = fopen(GM_account_filename, "r")) == NULL) { |
---|
| 252 | ShowError("read_gm_account: GM accounts file [%s] not found.\n", GM_account_filename); |
---|
| 253 | return 1; |
---|
| 254 | } |
---|
| 255 | |
---|
| 256 | line_counter = 0; |
---|
| 257 | // limited to 4000, because we send information to char-servers (more than 4000 GM accounts???) |
---|
| 258 | // int (id) + int (level) = 8 bytes * 4000 = 32k (limit of packets in windows) |
---|
| 259 | while(fgets(line, sizeof(line), fp) && GM_num < 4000) |
---|
| 260 | { |
---|
| 261 | line_counter++; |
---|
| 262 | if ((line[0] == '/' && line[1] == '/') || line[0] == '\0' || line[0] == '\n' || line[0] == '\r') |
---|
| 263 | continue; |
---|
| 264 | is_range = (sscanf(line, "%d%*[-~]%d %d",&start_range,&end_range,&level)==3); // ID Range [MC Cameri] |
---|
| 265 | if (!is_range && sscanf(line, "%d %d", &account_id, &level) != 2 && sscanf(line, "%d: %d", &account_id, &level) != 2) |
---|
| 266 | ShowError("read_gm_account: file [%s], invalid 'acount_id|range level' format (line #%d).\n", GM_account_filename, line_counter); |
---|
| 267 | else if (level <= 0) |
---|
| 268 | ShowError("read_gm_account: file [%s] %dth account (line #%d) (invalid level [0 or negative]: %d).\n", GM_account_filename, GM_num+1, line_counter, level); |
---|
| 269 | else { |
---|
| 270 | if (level > 99) { |
---|
| 271 | ShowNotice("read_gm_account: file [%s] %dth account (invalid level, but corrected: %d->99).\n", GM_account_filename, GM_num+1, level); |
---|
| 272 | level = 99; |
---|
| 273 | } |
---|
| 274 | if (is_range) { |
---|
| 275 | if (start_range==end_range) |
---|
| 276 | ShowError("read_gm_account: file [%s] invalid range, beginning of range is equal to end of range (line #%d).\n", GM_account_filename, line_counter); |
---|
| 277 | else if (start_range>end_range) |
---|
| 278 | ShowError("read_gm_account: file [%s] invalid range, beginning of range must be lower than end of range (line #%d).\n", GM_account_filename, line_counter); |
---|
| 279 | else |
---|
| 280 | for (current_id = start_range;current_id<=end_range;current_id++) |
---|
| 281 | addGM(current_id,level); |
---|
| 282 | } else { |
---|
| 283 | addGM(account_id,level); |
---|
| 284 | } |
---|
| 285 | } |
---|
| 286 | } |
---|
| 287 | fclose(fp); |
---|
| 288 | |
---|
| 289 | ShowStatus("read_gm_account: file '%s' read (%d GM accounts found).\n", GM_account_filename, GM_num); |
---|
| 290 | |
---|
| 291 | return 0; |
---|
| 292 | } |
---|
| 293 | |
---|
| 294 | |
---|
| 295 | //----------------------------------------------- |
---|
| 296 | // Search an account id |
---|
| 297 | // (return account index or -1 (if not found)) |
---|
| 298 | // If exact account name is not found, |
---|
| 299 | // the function checks without case sensitive |
---|
| 300 | // and returns index if only 1 account is found |
---|
| 301 | // and similar to the searched name. |
---|
| 302 | //----------------------------------------------- |
---|
| 303 | int search_account_index(char* account_name) |
---|
| 304 | { |
---|
| 305 | unsigned int i, quantity; |
---|
| 306 | int index; |
---|
| 307 | |
---|
| 308 | quantity = 0; |
---|
| 309 | index = -1; |
---|
| 310 | |
---|
| 311 | for(i = 0; i < auth_num; i++) { |
---|
| 312 | // Without case sensitive check (increase the number of similar account names found) |
---|
| 313 | if (stricmp(auth_dat[i].userid, account_name) == 0) { |
---|
| 314 | // Strict comparison (if found, we finish the function immediatly with correct value) |
---|
| 315 | if (strcmp(auth_dat[i].userid, account_name) == 0) |
---|
| 316 | return i; |
---|
| 317 | quantity++; |
---|
| 318 | index = i; |
---|
| 319 | } |
---|
| 320 | } |
---|
| 321 | // Here, the exact account name is not found |
---|
| 322 | // We return the found index of a similar account ONLY if there is 1 similar account |
---|
| 323 | if (quantity == 1) |
---|
| 324 | return index; |
---|
| 325 | |
---|
| 326 | // Exact account name is not found and 0 or more than 1 similar accounts have been found ==> we say not found |
---|
| 327 | return -1; |
---|
| 328 | } |
---|
| 329 | |
---|
| 330 | //-------------------------------------------------------- |
---|
| 331 | // Create a string to save the account in the account file |
---|
| 332 | //-------------------------------------------------------- |
---|
| 333 | int mmo_auth_tostr(char* str, struct mmo_account* p) |
---|
| 334 | { |
---|
| 335 | int i; |
---|
| 336 | char *str_p = str; |
---|
| 337 | |
---|
| 338 | str_p += sprintf(str_p, "%d\t%s\t%s\t%s\t%c\t%d\t%u\t%s\t%s\t%ld\t%s\t%s\t%ld\t", |
---|
| 339 | p->account_id, p->userid, p->pass, p->lastlogin, p->sex, |
---|
| 340 | p->logincount, p->state, p->email, p->error_message, |
---|
| 341 | (long)p->expiration_time, p->last_ip, p->memo, (long)p->unban_time); |
---|
| 342 | |
---|
| 343 | for(i = 0; i < p->account_reg2_num; i++) |
---|
| 344 | if (p->account_reg2[i].str[0]) |
---|
| 345 | str_p += sprintf(str_p, "%s,%s ", p->account_reg2[i].str, p->account_reg2[i].value); |
---|
| 346 | |
---|
| 347 | return 0; |
---|
| 348 | } |
---|
| 349 | |
---|
| 350 | //--------------------------------- |
---|
| 351 | // Reading of the accounts database |
---|
| 352 | //--------------------------------- |
---|
| 353 | int mmo_auth_init(void) |
---|
| 354 | { |
---|
| 355 | FILE *fp; |
---|
| 356 | int account_id; |
---|
| 357 | uint32 state; |
---|
| 358 | int logincount, n; |
---|
| 359 | uint32 i, j; |
---|
| 360 | char line[2048], *p, userid[2048], pass[2048], lastlogin[2048], sex, email[2048], error_message[2048], last_ip[2048], memo[2048]; |
---|
| 361 | long unban_time; |
---|
| 362 | long expiration_time; |
---|
| 363 | char str[2048]; |
---|
| 364 | char v[2048]; |
---|
| 365 | int GM_count = 0; |
---|
| 366 | int server_count = 0; |
---|
| 367 | |
---|
| 368 | auth_max = 256; |
---|
| 369 | CREATE(auth_dat, struct mmo_account, auth_max); |
---|
| 370 | |
---|
| 371 | if ((fp = fopen(account_filename, "r")) == NULL) { |
---|
| 372 | // no account file -> no account -> no login, including char-server (ERROR) |
---|
| 373 | ShowError(CL_RED"mmmo_auth_init: Accounts file [%s] not found."CL_RESET"\n", account_filename); |
---|
| 374 | return 0; |
---|
| 375 | } |
---|
| 376 | |
---|
| 377 | while(fgets(line, sizeof(line), fp) != NULL) |
---|
| 378 | { |
---|
| 379 | if (line[0] == '/' && line[1] == '/') |
---|
| 380 | continue; |
---|
| 381 | |
---|
| 382 | p = line; |
---|
| 383 | |
---|
| 384 | memset(userid, 0, sizeof(userid)); |
---|
| 385 | memset(pass, 0, sizeof(pass)); |
---|
| 386 | memset(lastlogin, 0, sizeof(lastlogin)); |
---|
| 387 | memset(email, 0, sizeof(email)); |
---|
| 388 | memset(error_message, 0, sizeof(error_message)); |
---|
| 389 | memset(last_ip, 0, sizeof(last_ip)); |
---|
| 390 | memset(memo, 0, sizeof(memo)); |
---|
| 391 | |
---|
| 392 | // database version reading (v2) |
---|
| 393 | if (((i = sscanf(line, "%d\t%[^\t]\t%[^\t]\t%[^\t]\t%c\t%d\t%u\t" |
---|
| 394 | "%[^\t]\t%[^\t]\t%ld\t%[^\t]\t%[^\t]\t%ld%n", |
---|
| 395 | &account_id, userid, pass, lastlogin, &sex, &logincount, &state, |
---|
| 396 | email, error_message, &expiration_time, last_ip, memo, &unban_time, &n)) == 13 && line[n] == '\t') || |
---|
| 397 | ((i = sscanf(line, "%d\t%[^\t]\t%[^\t]\t%[^\t]\t%c\t%d\t%u\t" |
---|
| 398 | "%[^\t]\t%[^\t]\t%ld\t%[^\t]\t%[^\t]%n", |
---|
| 399 | &account_id, userid, pass, lastlogin, &sex, &logincount, &state, |
---|
| 400 | email, error_message, &expiration_time, last_ip, memo, &n)) == 12 && line[n] == '\t')) { |
---|
| 401 | n = n + 1; |
---|
| 402 | |
---|
| 403 | // Some checks |
---|
| 404 | if (account_id > END_ACCOUNT_NUM) { |
---|
| 405 | ShowError(CL_RED"mmmo_auth_init: an account has an id higher than %d\n", END_ACCOUNT_NUM); |
---|
| 406 | ShowError(" account id #%d -> account not read (data is lost!)."CL_RESET"\n", account_id); |
---|
| 407 | continue; |
---|
| 408 | } |
---|
| 409 | userid[23] = '\0'; |
---|
| 410 | remove_control_chars(userid); |
---|
| 411 | for(j = 0; j < auth_num; j++) { |
---|
| 412 | if (auth_dat[j].account_id == account_id) { |
---|
| 413 | ShowError(CL_RED"mmmo_auth_init: an account has an identical id to another.\n"); |
---|
| 414 | ShowError(" account id #%d -> new account not read (data is lost!)."CL_RED"\n", account_id); |
---|
| 415 | break; |
---|
| 416 | } else if (strcmp(auth_dat[j].userid, userid) == 0) { |
---|
| 417 | ShowError(CL_RED"mmmo_auth_init: account name already exists.\n"); |
---|
| 418 | ShowError(" account name '%s' -> new account not read (data is lost!)."CL_RESET"\n", userid); // 2 lines, account name can be long. |
---|
| 419 | break; |
---|
| 420 | } |
---|
| 421 | } |
---|
| 422 | if (j != auth_num) |
---|
| 423 | continue; |
---|
| 424 | |
---|
| 425 | if (auth_num >= auth_max) { |
---|
| 426 | auth_max += 256; |
---|
| 427 | auth_dat = (struct mmo_account*)aRealloc(auth_dat, sizeof(struct mmo_account) * auth_max); |
---|
| 428 | } |
---|
| 429 | |
---|
| 430 | memset(&auth_dat[auth_num], '\0', sizeof(struct mmo_account)); |
---|
| 431 | |
---|
| 432 | auth_dat[auth_num].account_id = account_id; |
---|
| 433 | |
---|
| 434 | strncpy(auth_dat[auth_num].userid, userid, 24); |
---|
| 435 | |
---|
| 436 | pass[32] = '\0'; |
---|
| 437 | remove_control_chars(pass); |
---|
| 438 | strncpy(auth_dat[auth_num].pass, pass, 32); |
---|
| 439 | |
---|
| 440 | lastlogin[23] = '\0'; |
---|
| 441 | remove_control_chars(lastlogin); |
---|
| 442 | strncpy(auth_dat[auth_num].lastlogin, lastlogin, 24); |
---|
| 443 | |
---|
| 444 | auth_dat[auth_num].sex = sex; |
---|
| 445 | |
---|
| 446 | if (logincount >= 0) |
---|
| 447 | auth_dat[auth_num].logincount = logincount; |
---|
| 448 | else |
---|
| 449 | auth_dat[auth_num].logincount = 0; |
---|
| 450 | |
---|
| 451 | if (state > 255) |
---|
| 452 | auth_dat[auth_num].state = 100; |
---|
| 453 | else |
---|
| 454 | auth_dat[auth_num].state = state; |
---|
| 455 | |
---|
| 456 | if (e_mail_check(email) == 0) { |
---|
| 457 | ShowNotice("Account %s (%d): invalid e-mail (replaced par a@a.com).\n", auth_dat[auth_num].userid, auth_dat[auth_num].account_id); |
---|
| 458 | strncpy(auth_dat[auth_num].email, "a@a.com", 40); |
---|
| 459 | } else { |
---|
| 460 | remove_control_chars(email); |
---|
| 461 | strncpy(auth_dat[auth_num].email, email, 40); |
---|
| 462 | } |
---|
| 463 | |
---|
| 464 | error_message[19] = '\0'; |
---|
| 465 | remove_control_chars(error_message); |
---|
| 466 | if (error_message[0] == '\0' || state != 7) { // 7, because state is packet 0x006a value + 1 |
---|
| 467 | strncpy(auth_dat[auth_num].error_message, "-", 20); |
---|
| 468 | } else { |
---|
| 469 | strncpy(auth_dat[auth_num].error_message, error_message, 20); |
---|
| 470 | } |
---|
| 471 | |
---|
| 472 | if (i == 13) |
---|
| 473 | auth_dat[auth_num].unban_time = (time_t)unban_time; |
---|
| 474 | else |
---|
| 475 | auth_dat[auth_num].unban_time = 0; |
---|
| 476 | |
---|
| 477 | auth_dat[auth_num].expiration_time = (time_t)expiration_time; |
---|
| 478 | |
---|
| 479 | last_ip[15] = '\0'; |
---|
| 480 | remove_control_chars(last_ip); |
---|
| 481 | strncpy(auth_dat[auth_num].last_ip, last_ip, 16); |
---|
| 482 | |
---|
| 483 | memo[254] = '\0'; |
---|
| 484 | remove_control_chars(memo); |
---|
| 485 | strncpy(auth_dat[auth_num].memo, memo, 255); |
---|
| 486 | |
---|
| 487 | for(j = 0; j < ACCOUNT_REG2_NUM; j++) { |
---|
| 488 | p += n; |
---|
| 489 | if (sscanf(p, "%[^\t,],%[^\t ] %n", str, v, &n) != 2) { |
---|
| 490 | // We must check if a str is void. If it's, we can continue to read other REG2. |
---|
| 491 | // Account line will have something like: str2,9 ,9 str3,1 (here, ,9 is not good) |
---|
| 492 | if (p[0] == ',' && sscanf(p, ",%[^\t ] %n", v, &n) == 1) { |
---|
| 493 | j--; |
---|
| 494 | continue; |
---|
| 495 | } else |
---|
| 496 | break; |
---|
| 497 | } |
---|
| 498 | str[31] = '\0'; |
---|
| 499 | remove_control_chars(str); |
---|
| 500 | strncpy(auth_dat[auth_num].account_reg2[j].str, str, 32); |
---|
| 501 | strncpy(auth_dat[auth_num].account_reg2[j].value,v,256); |
---|
| 502 | } |
---|
| 503 | auth_dat[auth_num].account_reg2_num = j; |
---|
| 504 | |
---|
| 505 | if (isGM(account_id) > 0) |
---|
| 506 | GM_count++; |
---|
| 507 | if (auth_dat[auth_num].sex == 'S') |
---|
| 508 | server_count++; |
---|
| 509 | |
---|
| 510 | auth_num++; |
---|
| 511 | if (account_id >= account_id_count) |
---|
| 512 | account_id_count = account_id + 1; |
---|
| 513 | |
---|
| 514 | // Old athena database version reading (v1) |
---|
| 515 | } else if ((i = sscanf(line, "%d\t%[^\t]\t%[^\t]\t%[^\t]\t%c\t%d\t%u\t%n", |
---|
| 516 | &account_id, userid, pass, lastlogin, &sex, &logincount, &state, &n)) >= 5) { |
---|
| 517 | if (account_id > END_ACCOUNT_NUM) { |
---|
| 518 | ShowError(CL_RED"mmmo_auth_init: an account has an id higher than %d\n", END_ACCOUNT_NUM); |
---|
| 519 | ShowError(" account id #%d -> account not read (data is lost!)."CL_RESET"\n", account_id); |
---|
| 520 | continue; |
---|
| 521 | } |
---|
| 522 | userid[23] = '\0'; |
---|
| 523 | remove_control_chars(userid); |
---|
| 524 | for(j = 0; j < auth_num; j++) { |
---|
| 525 | if (auth_dat[j].account_id == account_id) { |
---|
| 526 | ShowError(CL_RED"mmo_auth_init: an account has an identical id to another.\n"); |
---|
| 527 | ShowError(" account id #%d -> new account not read (data is lost!)."CL_RESET"\n", account_id); |
---|
| 528 | break; |
---|
| 529 | } else if (strcmp(auth_dat[j].userid, userid) == 0) { |
---|
| 530 | ShowError(CL_RED"mmo_auth_init: account name already exists.\n"); |
---|
| 531 | ShowError(" account name '%s' -> new account not read (data is lost!)."CL_RESET"\n", userid); |
---|
| 532 | break; |
---|
| 533 | } |
---|
| 534 | } |
---|
| 535 | if (j != auth_num) |
---|
| 536 | continue; |
---|
| 537 | |
---|
| 538 | if (auth_num >= auth_max) { |
---|
| 539 | auth_max += 256; |
---|
| 540 | RECREATE(auth_dat, struct mmo_account, auth_max); |
---|
| 541 | } |
---|
| 542 | |
---|
| 543 | memset(&auth_dat[auth_num], '\0', sizeof(struct mmo_account)); |
---|
| 544 | |
---|
| 545 | auth_dat[auth_num].account_id = account_id; |
---|
| 546 | |
---|
| 547 | strncpy(auth_dat[auth_num].userid, userid, 24); |
---|
| 548 | |
---|
| 549 | pass[23] = '\0'; |
---|
| 550 | remove_control_chars(pass); |
---|
| 551 | strncpy(auth_dat[auth_num].pass, pass, 24); |
---|
| 552 | |
---|
| 553 | lastlogin[23] = '\0'; |
---|
| 554 | remove_control_chars(lastlogin); |
---|
| 555 | strncpy(auth_dat[auth_num].lastlogin, lastlogin, 24); |
---|
| 556 | |
---|
| 557 | auth_dat[auth_num].sex = sex; |
---|
| 558 | |
---|
| 559 | if (i >= 6) { |
---|
| 560 | if (logincount >= 0) |
---|
| 561 | auth_dat[auth_num].logincount = logincount; |
---|
| 562 | else |
---|
| 563 | auth_dat[auth_num].logincount = 0; |
---|
| 564 | } else |
---|
| 565 | auth_dat[auth_num].logincount = 0; |
---|
| 566 | |
---|
| 567 | if (i >= 7) { |
---|
| 568 | if (state > 255) |
---|
| 569 | auth_dat[auth_num].state = 100; |
---|
| 570 | else |
---|
| 571 | auth_dat[auth_num].state = state; |
---|
| 572 | } else |
---|
| 573 | auth_dat[auth_num].state = 0; |
---|
| 574 | |
---|
| 575 | // Initialization of new data |
---|
| 576 | strncpy(auth_dat[auth_num].email, "a@a.com", 40); |
---|
| 577 | strncpy(auth_dat[auth_num].error_message, "-", 20); |
---|
| 578 | auth_dat[auth_num].unban_time = 0; |
---|
| 579 | auth_dat[auth_num].expiration_time = 0; |
---|
| 580 | strncpy(auth_dat[auth_num].last_ip, "-", 16); |
---|
| 581 | strncpy(auth_dat[auth_num].memo, "-", 255); |
---|
| 582 | |
---|
| 583 | for(j = 0; j < ACCOUNT_REG2_NUM; j++) { |
---|
| 584 | p += n; |
---|
| 585 | if (sscanf(p, "%[^\t,],%[^\t ] %n", str, v, &n) != 2) { |
---|
| 586 | // We must check if a str is void. If it's, we can continue to read other REG2. |
---|
| 587 | // Account line will have something like: str2,9 ,9 str3,1 (here, ,9 is not good) |
---|
| 588 | if (p[0] == ',' && sscanf(p, ",%[^\t ] %n", v, &n) == 1) { |
---|
| 589 | j--; |
---|
| 590 | continue; |
---|
| 591 | } else |
---|
| 592 | break; |
---|
| 593 | } |
---|
| 594 | str[31] = '\0'; |
---|
| 595 | remove_control_chars(str); |
---|
| 596 | strncpy(auth_dat[auth_num].account_reg2[j].str, str, 32); |
---|
| 597 | strncpy(auth_dat[auth_num].account_reg2[j].value,v,256); |
---|
| 598 | } |
---|
| 599 | auth_dat[auth_num].account_reg2_num = j; |
---|
| 600 | |
---|
| 601 | if (isGM(account_id) > 0) |
---|
| 602 | GM_count++; |
---|
| 603 | if (auth_dat[auth_num].sex == 'S') |
---|
| 604 | server_count++; |
---|
| 605 | |
---|
| 606 | auth_num++; |
---|
| 607 | if (account_id >= account_id_count) |
---|
| 608 | account_id_count = account_id + 1; |
---|
| 609 | |
---|
| 610 | } else { |
---|
| 611 | int i = 0; |
---|
| 612 | if (sscanf(line, "%d\t%%newid%%\n%n", &account_id, &i) == 1 && |
---|
| 613 | i > 0 && account_id > account_id_count) |
---|
| 614 | account_id_count = account_id; |
---|
| 615 | } |
---|
| 616 | } |
---|
| 617 | fclose(fp); |
---|
| 618 | |
---|
| 619 | if( auth_num == 0 ) |
---|
| 620 | ShowNotice("mmo_auth_init: No account found in %s.\n", account_filename); |
---|
| 621 | else |
---|
| 622 | if( auth_num == 1 ) |
---|
| 623 | ShowStatus("mmo_auth_init: 1 account read in %s,\n", account_filename); |
---|
| 624 | else |
---|
| 625 | ShowStatus("mmo_auth_init: %d accounts read in %s,\n", auth_num, account_filename); |
---|
| 626 | |
---|
| 627 | if( GM_count == 0 ) |
---|
| 628 | ShowStatus(" of which is no GM account, and \n"); |
---|
| 629 | else |
---|
| 630 | if( GM_count == 1 ) |
---|
| 631 | ShowStatus(" of which is 1 GM account, and \n"); |
---|
| 632 | else |
---|
| 633 | ShowStatus(" of which is %d GM accounts, and \n", GM_count); |
---|
| 634 | |
---|
| 635 | if( server_count == 0 ) |
---|
| 636 | ShowStatus(" no server account ('S').\n"); |
---|
| 637 | else |
---|
| 638 | if( server_count == 1 ) |
---|
| 639 | ShowStatus(" 1 server account ('S').\n"); |
---|
| 640 | else |
---|
| 641 | ShowStatus(" %d server accounts ('S').\n", server_count); |
---|
| 642 | |
---|
| 643 | return 0; |
---|
| 644 | } |
---|
| 645 | |
---|
| 646 | //------------------------------------------ |
---|
| 647 | // Writing of the accounts database file |
---|
| 648 | // (accounts are sorted by id before save) |
---|
| 649 | //------------------------------------------ |
---|
| 650 | void mmo_auth_sync(void) |
---|
| 651 | { |
---|
| 652 | FILE *fp; |
---|
| 653 | unsigned int i, j, k; |
---|
| 654 | int lock; |
---|
| 655 | int account_id; |
---|
| 656 | CREATE_BUFFER(id, int, auth_num); |
---|
| 657 | char line[65536]; |
---|
| 658 | |
---|
| 659 | // Sorting before save |
---|
| 660 | for(i = 0; i < auth_num; i++) { |
---|
| 661 | id[i] = i; |
---|
| 662 | account_id = auth_dat[i].account_id; |
---|
| 663 | for(j = 0; j < i; j++) { |
---|
| 664 | if (account_id < auth_dat[id[j]].account_id) { |
---|
| 665 | for(k = i; k > j; k--) |
---|
| 666 | id[k] = id[k-1]; |
---|
| 667 | id[j] = i; // id[i] |
---|
| 668 | break; |
---|
| 669 | } |
---|
| 670 | } |
---|
| 671 | } |
---|
| 672 | |
---|
| 673 | // Data save |
---|
| 674 | if ((fp = lock_fopen(account_filename, &lock)) == NULL) { |
---|
| 675 | //if (id) aFree(id); |
---|
| 676 | DELETE_BUFFER(id); |
---|
| 677 | return; |
---|
| 678 | } |
---|
| 679 | |
---|
| 680 | fprintf(fp, "// Accounts file: here are saved all information about the accounts.\n"); |
---|
| 681 | fprintf(fp, "// Structure: ID, account name, password, last login time, sex, # of logins, state, email, error message for state 7, validity time, last (accepted) login ip, memo field, ban timestamp, repeated(register text, register value)\n"); |
---|
| 682 | fprintf(fp, "// Some explanations:\n"); |
---|
| 683 | fprintf(fp, "// account name : between 4 to 23 char for a normal account (standard client can't send less than 4 char).\n"); |
---|
| 684 | fprintf(fp, "// account password: between 4 to 23 char\n"); |
---|
| 685 | fprintf(fp, "// sex : M or F for normal accounts, S for server accounts\n"); |
---|
| 686 | fprintf(fp, "// state : 0: account is ok, 1 to 256: error code of packet 0x006a + 1\n"); |
---|
| 687 | fprintf(fp, "// email : between 3 to 39 char (a@a.com is like no email)\n"); |
---|
| 688 | fprintf(fp, "// error message : text for the state 7: 'Your are Prohibited to login until <text>'. Max 19 char\n"); |
---|
| 689 | fprintf(fp, "// valitidy time : 0: unlimited account, <other value>: date calculated by addition of 1/1/1970 + value (number of seconds since the 1/1/1970)\n"); |
---|
| 690 | fprintf(fp, "// memo field : max 254 char\n"); |
---|
| 691 | fprintf(fp, "// ban time : 0: no ban, <other value>: banned until the date: date calculated by addition of 1/1/1970 + value (number of seconds since the 1/1/1970)\n"); |
---|
| 692 | for(i = 0; i < auth_num; i++) { |
---|
| 693 | k = id[i]; // use of sorted index |
---|
| 694 | if (auth_dat[k].account_id == -1) |
---|
| 695 | continue; |
---|
| 696 | |
---|
| 697 | mmo_auth_tostr(line, &auth_dat[k]); |
---|
| 698 | fprintf(fp, "%s\n", line); |
---|
| 699 | } |
---|
| 700 | fprintf(fp, "%d\t%%newid%%\n", account_id_count); |
---|
| 701 | |
---|
| 702 | lock_fclose(fp, account_filename, &lock); |
---|
| 703 | |
---|
| 704 | // set new counter to minimum number of auth before save |
---|
| 705 | auth_before_save_file = auth_num / AUTH_SAVE_FILE_DIVIDER; // Re-initialise counter. We have save. |
---|
| 706 | if (auth_before_save_file < AUTH_BEFORE_SAVE_FILE) |
---|
| 707 | auth_before_save_file = AUTH_BEFORE_SAVE_FILE; |
---|
| 708 | |
---|
| 709 | //if (id) aFree(id); |
---|
| 710 | DELETE_BUFFER(id); |
---|
| 711 | |
---|
| 712 | return; |
---|
| 713 | } |
---|
| 714 | |
---|
| 715 | //----------------------------------------------------- |
---|
| 716 | // Check if we must save accounts file or not |
---|
| 717 | // every minute, we check if we must save because we |
---|
| 718 | // have do some authentications without arrive to |
---|
| 719 | // the minimum of authentications for the save. |
---|
| 720 | // Note: all other modification of accounts (deletion, |
---|
| 721 | // change of some informations excepted lastip/ |
---|
| 722 | // lastlogintime, creation) are always save |
---|
| 723 | // immediatly and set the minimum of |
---|
| 724 | // authentications to its initialization value. |
---|
| 725 | //----------------------------------------------------- |
---|
| 726 | int check_auth_sync(int tid, unsigned int tick, int id, intptr data) |
---|
| 727 | { |
---|
| 728 | // we only save if necessary: |
---|
| 729 | // we have do some authentications without do saving |
---|
| 730 | if (auth_before_save_file < AUTH_BEFORE_SAVE_FILE || |
---|
| 731 | auth_before_save_file < (int)(auth_num / AUTH_SAVE_FILE_DIVIDER)) |
---|
| 732 | mmo_auth_sync(); |
---|
| 733 | |
---|
| 734 | return 0; |
---|
| 735 | } |
---|
| 736 | |
---|
| 737 | //----------------------------------------------------- |
---|
| 738 | // periodic ip address synchronization |
---|
| 739 | //----------------------------------------------------- |
---|
| 740 | static int sync_ip_addresses(int tid, unsigned int tick, int id, intptr data) |
---|
| 741 | { |
---|
| 742 | uint8 buf[2]; |
---|
| 743 | ShowInfo("IP Sync in progress...\n"); |
---|
| 744 | WBUFW(buf,0) = 0x2735; |
---|
| 745 | charif_sendallwos(-1, buf, 2); |
---|
| 746 | return 0; |
---|
| 747 | } |
---|
| 748 | |
---|
| 749 | //----------------------------------------------------- |
---|
| 750 | // Send GM accounts to one or all char-servers |
---|
| 751 | //----------------------------------------------------- |
---|
| 752 | void send_GM_accounts(int fd) |
---|
| 753 | { |
---|
| 754 | unsigned int i; |
---|
| 755 | uint8 buf[32767]; |
---|
| 756 | uint16 len; |
---|
| 757 | |
---|
| 758 | len = 4; |
---|
| 759 | WBUFW(buf,0) = 0x2732; |
---|
| 760 | for(i = 0; i < GM_num; i++) |
---|
| 761 | // send only existing accounts. We can not create a GM account when server is online. |
---|
| 762 | if (gm_account_db[i].level > 0) { |
---|
| 763 | WBUFL(buf,len) = gm_account_db[i].account_id; |
---|
| 764 | WBUFB(buf,len+4) = (uint8)gm_account_db[i].level; |
---|
| 765 | len += 5; |
---|
| 766 | if (len >= 32000) { |
---|
| 767 | ShowWarning("send_GM_accounts: Too many accounts! Only %d out of %d were sent.\n", i, GM_num); |
---|
| 768 | break; |
---|
| 769 | } |
---|
| 770 | } |
---|
| 771 | |
---|
| 772 | WBUFW(buf,2) = len; |
---|
| 773 | if (fd == -1) // send to all charservers |
---|
| 774 | charif_sendallwos(-1, buf, len); |
---|
| 775 | else { // send only to target |
---|
| 776 | WFIFOHEAD(fd,len); |
---|
| 777 | memcpy(WFIFOP(fd,0), buf, len); |
---|
| 778 | WFIFOSET(fd,len); |
---|
| 779 | } |
---|
| 780 | |
---|
| 781 | return; |
---|
| 782 | } |
---|
| 783 | |
---|
| 784 | //----------------------------------------------------- |
---|
| 785 | // Check if GM file account have been changed |
---|
| 786 | //----------------------------------------------------- |
---|
| 787 | int check_GM_file(int tid, unsigned int tick, int id, intptr data) |
---|
| 788 | { |
---|
| 789 | struct stat file_stat; |
---|
| 790 | long new_time; |
---|
| 791 | |
---|
| 792 | // if we would not check |
---|
| 793 | if (gm_account_filename_check_timer < 1) |
---|
| 794 | return 0; |
---|
| 795 | |
---|
| 796 | // get last modify time/date |
---|
| 797 | if (stat(GM_account_filename, &file_stat)) |
---|
| 798 | new_time = 0; // error |
---|
| 799 | else |
---|
| 800 | new_time = (long)file_stat.st_mtime; |
---|
| 801 | |
---|
| 802 | if (new_time != creation_time_GM_account_file) { |
---|
| 803 | read_gm_account(); |
---|
| 804 | send_GM_accounts(-1); |
---|
| 805 | } |
---|
| 806 | |
---|
| 807 | return 0; |
---|
| 808 | } |
---|
| 809 | |
---|
| 810 | |
---|
| 811 | //----------------------------------------------------- |
---|
| 812 | // encrypted/unencrypted password check |
---|
| 813 | //----------------------------------------------------- |
---|
| 814 | bool check_encrypted(const char* str1, const char* str2, const char* passwd) |
---|
| 815 | { |
---|
| 816 | char md5str[64], md5bin[32]; |
---|
| 817 | |
---|
| 818 | snprintf(md5str, sizeof(md5str), "%s%s", str1, str2); |
---|
| 819 | md5str[sizeof(md5str)-1] = '\0'; |
---|
| 820 | MD5_String2binary(md5str, md5bin); |
---|
| 821 | |
---|
| 822 | return (0==memcmp(passwd, md5bin, 16)); |
---|
| 823 | } |
---|
| 824 | |
---|
| 825 | bool check_password(struct login_session_data* sd, int passwdenc, const char* passwd, const char* refpass) |
---|
| 826 | { |
---|
| 827 | if(passwdenc == 0) |
---|
| 828 | { |
---|
| 829 | return (0==strcmp(passwd, refpass)); |
---|
| 830 | } |
---|
| 831 | else if(sd != NULL) |
---|
| 832 | { |
---|
| 833 | // password mode set to 1 -> (md5key, refpass) enable with <passwordencrypt></passwordencrypt> |
---|
| 834 | // password mode set to 2 -> (refpass, md5key) enable with <passwordencrypt2></passwordencrypt2> |
---|
| 835 | |
---|
| 836 | return ((passwdenc&0x01) && check_encrypted(sd->md5key, refpass, passwd)) || |
---|
| 837 | ((passwdenc&0x02) && check_encrypted(refpass, sd->md5key, passwd)); |
---|
| 838 | } |
---|
| 839 | return false; |
---|
| 840 | } |
---|
| 841 | |
---|
| 842 | |
---|
| 843 | //------------------------------------- |
---|
| 844 | // Make new account |
---|
| 845 | //------------------------------------- |
---|
| 846 | int mmo_auth_new(struct mmo_account* account) |
---|
| 847 | { |
---|
| 848 | static int num_regs = 0; // registration counter |
---|
| 849 | unsigned int tick = gettick(); |
---|
| 850 | |
---|
| 851 | time_t expiration_time = 0; |
---|
| 852 | unsigned int i = auth_num; |
---|
| 853 | |
---|
| 854 | // check if the account doesn't exist already |
---|
| 855 | ARR_FIND( 0, auth_num, i, strcmp(account->userid, auth_dat[i].userid) == 0 ); |
---|
| 856 | if( i < auth_num ) |
---|
| 857 | { |
---|
| 858 | ShowNotice("Attempt of creation of an already existant account (account: %s_%c, pass: %s, received pass: %s)\n", account->userid, account->sex, auth_dat[i].pass, account->pass); |
---|
| 859 | return 1; // 1 = Incorrect Password |
---|
| 860 | } |
---|
| 861 | |
---|
| 862 | //Account Registration Flood Protection by [Kevin] |
---|
| 863 | if( DIFF_TICK(tick, new_reg_tick) < 0 && num_regs >= allowed_regs ) |
---|
| 864 | { |
---|
| 865 | ShowNotice("Account registration denied (registration limit exceeded)\n"); |
---|
| 866 | return 3; |
---|
| 867 | } |
---|
| 868 | |
---|
| 869 | if (auth_num >= auth_max) { |
---|
| 870 | auth_max += 256; |
---|
| 871 | auth_dat = (struct mmo_account*)aRealloc(auth_dat, sizeof(struct mmo_account) * auth_max); |
---|
| 872 | } |
---|
| 873 | |
---|
| 874 | memset(&auth_dat[i], '\0', sizeof(struct mmo_account)); |
---|
| 875 | |
---|
| 876 | // find a suitable non-gm account id |
---|
| 877 | while (isGM(account_id_count) > 0) |
---|
| 878 | account_id_count++; |
---|
| 879 | |
---|
| 880 | auth_dat[i].account_id = account_id_count++; |
---|
| 881 | safestrncpy(auth_dat[i].userid, account->userid, NAME_LENGTH); |
---|
| 882 | if( login_config.use_md5_passwds ) |
---|
| 883 | MD5_String(account->pass, auth_dat[i].pass); |
---|
| 884 | else |
---|
| 885 | safestrncpy(auth_dat[i].pass, account->pass, NAME_LENGTH); |
---|
| 886 | safestrncpy(auth_dat[i].lastlogin, "-", sizeof(auth_dat[i].lastlogin)); |
---|
| 887 | auth_dat[i].sex = account->sex; |
---|
| 888 | auth_dat[i].logincount = 0; |
---|
| 889 | auth_dat[i].state = 0; |
---|
| 890 | safestrncpy(auth_dat[i].email, e_mail_check(account->email) ? account->email : "a@a.com", sizeof(auth_dat[i].email)); |
---|
| 891 | safestrncpy(auth_dat[i].error_message, "-", sizeof(auth_dat[i].error_message)); |
---|
| 892 | auth_dat[i].unban_time = 0; |
---|
| 893 | if( login_config.start_limited_time != -1 ) |
---|
| 894 | expiration_time = time(NULL) + login_config.start_limited_time; |
---|
| 895 | auth_dat[i].expiration_time = expiration_time; |
---|
| 896 | strncpy(auth_dat[i].last_ip, "-", 16); |
---|
| 897 | strncpy(auth_dat[i].memo, "-", 255); |
---|
| 898 | auth_dat[i].account_reg2_num = 0; |
---|
| 899 | |
---|
| 900 | ShowNotice("Account creation (account %s, id: %d, pass: %s, sex: %c)\n", account->userid, auth_num, account->pass, account->sex); |
---|
| 901 | auth_num++; |
---|
| 902 | |
---|
| 903 | if( DIFF_TICK(tick, new_reg_tick) > 0 ) |
---|
| 904 | {// Update the registration check. |
---|
| 905 | num_regs = 0; |
---|
| 906 | new_reg_tick = tick + time_allowed*1000; |
---|
| 907 | } |
---|
| 908 | ++num_regs; |
---|
| 909 | |
---|
| 910 | return 0; |
---|
| 911 | } |
---|
| 912 | |
---|
| 913 | //----------------------------------------------------- |
---|
| 914 | // Check/authentication of a connection |
---|
| 915 | //----------------------------------------------------- |
---|
| 916 | int mmo_auth(struct login_session_data* sd) |
---|
| 917 | { |
---|
| 918 | unsigned int i; |
---|
| 919 | time_t raw_time; |
---|
| 920 | char tmpstr[256]; |
---|
| 921 | size_t len; |
---|
| 922 | char user_password[32+1]; // reserve for md5-ed pw |
---|
| 923 | |
---|
| 924 | char ip[16]; |
---|
| 925 | ip2str(session[sd->fd]->client_addr, ip); |
---|
| 926 | |
---|
| 927 | // DNS Blacklist check |
---|
| 928 | if( login_config.use_dnsbl ) |
---|
| 929 | { |
---|
| 930 | char r_ip[16]; |
---|
| 931 | char ip_dnsbl[256]; |
---|
| 932 | char* dnsbl_serv; |
---|
| 933 | bool matched = false; |
---|
| 934 | uint8* sin_addr = (uint8*)&session[sd->fd]->client_addr; |
---|
| 935 | |
---|
| 936 | sprintf(r_ip, "%u.%u.%u.%u", sin_addr[0], sin_addr[1], sin_addr[2], sin_addr[3]); |
---|
| 937 | |
---|
| 938 | for( dnsbl_serv = strtok(login_config.dnsbl_servs,","); !matched && dnsbl_serv != NULL; dnsbl_serv = strtok(NULL,",") ) |
---|
| 939 | { |
---|
| 940 | sprintf(ip_dnsbl, "%s.%s", r_ip, dnsbl_serv); |
---|
| 941 | if( host2ip(ip_dnsbl) ) |
---|
| 942 | matched = true; |
---|
| 943 | } |
---|
| 944 | |
---|
| 945 | if( matched ) |
---|
| 946 | { |
---|
| 947 | ShowInfo("DNSBL: (%s) Blacklisted. User Kicked.\n", r_ip); |
---|
| 948 | return 3; |
---|
| 949 | } |
---|
| 950 | } |
---|
| 951 | |
---|
| 952 | //Client Version check |
---|
| 953 | if( login_config.check_client_version && sd->version != login_config.client_version_to_connect ) |
---|
| 954 | return 5; |
---|
| 955 | |
---|
| 956 | len = strnlen(sd->userid, NAME_LENGTH); |
---|
| 957 | |
---|
| 958 | // Account creation with _M/_F |
---|
| 959 | if( login_config.new_account_flag ) |
---|
| 960 | { |
---|
| 961 | if( len > 2 && strnlen(sd->passwd, NAME_LENGTH) > 0 && // valid user and password lengths |
---|
| 962 | sd->passwdenc == 0 && // unencoded password |
---|
| 963 | sd->userid[len-2] == '_' && memchr("FfMm", sd->userid[len-1], 4) && // _M/_F suffix |
---|
| 964 | account_id_count <= END_ACCOUNT_NUM ) |
---|
| 965 | { |
---|
| 966 | struct mmo_account acc; |
---|
| 967 | int result; |
---|
| 968 | |
---|
| 969 | len -= 2; |
---|
| 970 | sd->userid[len] = '\0'; |
---|
| 971 | |
---|
| 972 | memset(&acc, '\0', sizeof(acc)); |
---|
| 973 | safestrncpy(acc.userid, sd->userid, NAME_LENGTH); |
---|
| 974 | safestrncpy(acc.pass, sd->passwd, NAME_LENGTH); |
---|
| 975 | safestrncpy(acc.email, "a@a.com", sizeof(acc.email)); |
---|
| 976 | acc.sex = TOUPPER(sd->userid[len+1]); |
---|
| 977 | |
---|
| 978 | result = mmo_auth_new(&acc); |
---|
| 979 | if( result ) |
---|
| 980 | return result;// Failed to make account. [Skotlex]. |
---|
| 981 | |
---|
| 982 | auth_before_save_file = 0; // Creation of an account -> save accounts file immediatly |
---|
| 983 | } |
---|
| 984 | } |
---|
| 985 | |
---|
| 986 | // Strict account search |
---|
| 987 | ARR_FIND( 0, auth_num, i, strcmp(sd->userid, auth_dat[i].userid) == 0 ); |
---|
| 988 | |
---|
| 989 | // if strict account search fails, we do a no sensitive case research for index |
---|
| 990 | if( i < auth_num ) |
---|
| 991 | { |
---|
| 992 | i = search_account_index(sd->userid); |
---|
| 993 | if( i == -1 ) |
---|
| 994 | i = auth_num; |
---|
| 995 | else |
---|
| 996 | memcpy(sd->userid, auth_dat[i].userid, NAME_LENGTH); // for the possible tests/checks afterwards (copy correcte sensitive case). |
---|
| 997 | } |
---|
| 998 | |
---|
| 999 | if( i == auth_num ) |
---|
| 1000 | { |
---|
| 1001 | ShowNotice("Unknown account (account: %s, received pass: %s, ip: %s)\n", sd->userid, sd->passwd, ip); |
---|
| 1002 | return 0; // 0 = Unregistered ID |
---|
| 1003 | } |
---|
| 1004 | |
---|
| 1005 | if( login_config.use_md5_passwds ) |
---|
| 1006 | MD5_String(sd->passwd, user_password); |
---|
| 1007 | else |
---|
| 1008 | safestrncpy(user_password, sd->passwd, NAME_LENGTH); |
---|
| 1009 | |
---|
| 1010 | if( !check_password(sd, sd->passwdenc, user_password, auth_dat[i].pass) ) |
---|
| 1011 | { |
---|
| 1012 | ShowNotice("Invalid password (account: %s, pass: %s, received pass: %s, ip: %s)\n", sd->userid, auth_dat[i].pass, (sd->passwdenc) ? "[MD5]" : sd->passwd, ip); |
---|
| 1013 | return 1; // 1 = Incorrect Password |
---|
| 1014 | } |
---|
| 1015 | |
---|
| 1016 | if( auth_dat[i].expiration_time != 0 && auth_dat[i].expiration_time < time(NULL) ) |
---|
| 1017 | { |
---|
| 1018 | ShowNotice("Connection refused (account: %s, pass: %s, expired ID, ip: %s)\n", sd->userid, sd->passwd, ip); |
---|
| 1019 | return 2; // 2 = This ID is expired |
---|
| 1020 | } |
---|
| 1021 | |
---|
| 1022 | if( auth_dat[i].unban_time != 0 && auth_dat[i].unban_time > time(NULL) ) |
---|
| 1023 | { |
---|
| 1024 | strftime(tmpstr, 20, login_config.date_format, localtime(&auth_dat[i].unban_time)); |
---|
| 1025 | tmpstr[19] = '\0'; |
---|
| 1026 | ShowNotice("Connection refused (account: %s, pass: %s, banned until %s, ip: %s)\n", sd->userid, sd->passwd, tmpstr, ip); |
---|
| 1027 | return 6; // 6 = Your are Prohibited to log in until %s |
---|
| 1028 | } |
---|
| 1029 | |
---|
| 1030 | if( auth_dat[i].state ) |
---|
| 1031 | { |
---|
| 1032 | ShowNotice("Connection refused (account: %s, pass: %s, state: %d, ip: %s)\n", sd->userid, sd->passwd, auth_dat[i].state, ip); |
---|
| 1033 | return auth_dat[i].state - 1; |
---|
| 1034 | } |
---|
| 1035 | |
---|
| 1036 | ShowNotice("Authentication accepted (account: %s, id: %d, ip: %s)\n", sd->userid, auth_dat[i].account_id, ip); |
---|
| 1037 | |
---|
| 1038 | // auth start : time seed |
---|
| 1039 | time(&raw_time); |
---|
| 1040 | strftime(tmpstr, 24, "%Y-%m-%d %H:%M:%S",localtime(&raw_time)); |
---|
| 1041 | |
---|
| 1042 | sd->account_id = auth_dat[i].account_id; |
---|
| 1043 | sd->login_id1 = rand(); |
---|
| 1044 | sd->login_id2 = rand(); |
---|
| 1045 | safestrncpy(sd->lastlogin, auth_dat[i].lastlogin, 24); |
---|
| 1046 | sd->sex = auth_dat[i].sex; |
---|
| 1047 | |
---|
| 1048 | if( sd->sex != 'S' && sd->account_id < START_ACCOUNT_NUM ) |
---|
| 1049 | ShowWarning("Account %s has account id %d! Account IDs must be over %d to work properly!\n", sd->userid, sd->account_id, START_ACCOUNT_NUM); |
---|
| 1050 | |
---|
| 1051 | safestrncpy(auth_dat[i].lastlogin, tmpstr, sizeof(auth_dat[i].lastlogin)); |
---|
| 1052 | safestrncpy(auth_dat[i].last_ip, ip, sizeof(auth_dat[i].last_ip)); |
---|
| 1053 | auth_dat[i].unban_time = 0; |
---|
| 1054 | auth_dat[i].logincount++; |
---|
| 1055 | |
---|
| 1056 | // Save until for change ip/time of auth is not very useful => limited save for that |
---|
| 1057 | // Save there informations isnot necessary, because they are saved in log file. |
---|
| 1058 | if (--auth_before_save_file <= 0) // Reduce counter. 0 or less, we save |
---|
| 1059 | mmo_auth_sync(); |
---|
| 1060 | |
---|
| 1061 | return -1; // account OK |
---|
| 1062 | } |
---|
| 1063 | |
---|
| 1064 | static int online_db_setoffline(DBKey key, void* data, va_list ap) |
---|
| 1065 | { |
---|
| 1066 | struct online_login_data* p = (struct online_login_data*)data; |
---|
| 1067 | int server = va_arg(ap, int); |
---|
| 1068 | if( server == -1 ) |
---|
| 1069 | { |
---|
| 1070 | p->char_server = -1; |
---|
| 1071 | if( p->waiting_disconnect != -1 ) |
---|
| 1072 | { |
---|
| 1073 | delete_timer(p->waiting_disconnect, waiting_disconnect_timer); |
---|
| 1074 | p->waiting_disconnect = -1; |
---|
| 1075 | } |
---|
| 1076 | } |
---|
| 1077 | else if( p->char_server == server ) |
---|
| 1078 | p->char_server = -2; //Char server disconnected. |
---|
| 1079 | return 0; |
---|
| 1080 | } |
---|
| 1081 | |
---|
| 1082 | //-------------------------------- |
---|
| 1083 | // Packet parsing for char-servers |
---|
| 1084 | //-------------------------------- |
---|
| 1085 | int parse_fromchar(int fd) |
---|
| 1086 | { |
---|
| 1087 | unsigned int i; |
---|
| 1088 | int j, id; |
---|
| 1089 | uint32 ipl; |
---|
| 1090 | char ip[16]; |
---|
| 1091 | |
---|
| 1092 | ARR_FIND( 0, MAX_SERVERS, id, server[id].fd == fd ); |
---|
| 1093 | if( id == MAX_SERVERS ) |
---|
| 1094 | {// not a char server |
---|
| 1095 | set_eof(fd); |
---|
| 1096 | do_close(fd); |
---|
| 1097 | return 0; |
---|
| 1098 | } |
---|
| 1099 | |
---|
| 1100 | if( session[fd]->flag.eof ) |
---|
| 1101 | { |
---|
| 1102 | ShowStatus("Char-server '%s' has disconnected.\n", server[id].name); |
---|
| 1103 | online_db->foreach(online_db, online_db_setoffline, id); //Set all chars from this char server to offline. |
---|
| 1104 | memset(&server[id], 0, sizeof(struct mmo_char_server)); |
---|
| 1105 | server[id].fd = -1; |
---|
| 1106 | do_close(fd); |
---|
| 1107 | return 0; |
---|
| 1108 | } |
---|
| 1109 | |
---|
| 1110 | ipl = server[id].ip; |
---|
| 1111 | ip2str(ipl, ip); |
---|
| 1112 | |
---|
| 1113 | while( RFIFOREST(fd) >= 2 ) |
---|
| 1114 | { |
---|
| 1115 | uint16 command = RFIFOW(fd,0); |
---|
| 1116 | |
---|
| 1117 | switch( command ) |
---|
| 1118 | { |
---|
| 1119 | |
---|
| 1120 | case 0x2709: // request from map-server via char-server to reload GM accounts |
---|
| 1121 | RFIFOSKIP(fd,2); |
---|
| 1122 | ShowStatus("Char-server '%s': Request to re-load GM configuration file (ip: %s).\n", server[id].name, ip); |
---|
| 1123 | read_gm_account(); |
---|
| 1124 | // send GM accounts to all char-servers |
---|
| 1125 | send_GM_accounts(-1); |
---|
| 1126 | break; |
---|
| 1127 | |
---|
| 1128 | case 0x2712: // request from char-server to authenticate an account |
---|
| 1129 | if( RFIFOREST(fd) < 19 ) |
---|
| 1130 | return 0; |
---|
| 1131 | { |
---|
| 1132 | struct auth_node* node; |
---|
| 1133 | |
---|
| 1134 | int account_id = RFIFOL(fd,2); |
---|
| 1135 | int login_id1 = RFIFOL(fd,6); |
---|
| 1136 | int login_id2 = RFIFOL(fd,10); |
---|
| 1137 | char sex = sex_num2str(RFIFOB(fd,14)); |
---|
| 1138 | uint32 ip_ = ntohl(RFIFOL(fd,15)); |
---|
| 1139 | RFIFOSKIP(fd,19); |
---|
| 1140 | |
---|
| 1141 | node = (struct auth_node*)idb_get(auth_db, account_id); |
---|
| 1142 | if( node != NULL && |
---|
| 1143 | node->account_id == account_id && |
---|
| 1144 | node->login_id1 == login_id1 && |
---|
| 1145 | node->login_id2 == login_id2 && |
---|
| 1146 | node->sex == sex && |
---|
| 1147 | node->ip == ip_ ) |
---|
| 1148 | {// found |
---|
| 1149 | uint32 expiration_time; |
---|
| 1150 | char email[40]; |
---|
| 1151 | unsigned int k; |
---|
| 1152 | |
---|
| 1153 | //ShowStatus("Char-server '%s': authentication of the account %d accepted (ip: %s).\n", server[id].name, account_id, ip); |
---|
| 1154 | |
---|
| 1155 | // each auth entry can only be used once |
---|
| 1156 | idb_remove(auth_db, account_id); |
---|
| 1157 | |
---|
| 1158 | // retrieve email and account expiration time |
---|
| 1159 | ARR_FIND( 0, auth_num, k, auth_dat[k].account_id == account_id ); |
---|
| 1160 | if( k < auth_num ) |
---|
| 1161 | { |
---|
| 1162 | strcpy(email, auth_dat[k].email); |
---|
| 1163 | expiration_time = (uint32)auth_dat[k].expiration_time; |
---|
| 1164 | } |
---|
| 1165 | else |
---|
| 1166 | { |
---|
| 1167 | memset(email, 0, sizeof(email)); |
---|
| 1168 | expiration_time = 0; |
---|
| 1169 | } |
---|
| 1170 | |
---|
| 1171 | // send ack |
---|
| 1172 | WFIFOHEAD(fd,59); |
---|
| 1173 | WFIFOW(fd,0) = 0x2713; |
---|
| 1174 | WFIFOL(fd,2) = account_id; |
---|
| 1175 | WFIFOL(fd,6) = login_id1; |
---|
| 1176 | WFIFOL(fd,10) = login_id2; |
---|
| 1177 | WFIFOB(fd,14) = 0; |
---|
| 1178 | memcpy(WFIFOP(fd,15), email, 40); |
---|
| 1179 | WFIFOL(fd,55) = expiration_time; |
---|
| 1180 | WFIFOSET(fd,59); |
---|
| 1181 | } |
---|
| 1182 | else |
---|
| 1183 | {// authentication not found |
---|
| 1184 | ShowStatus("Char-server '%s': authentication of the account %d REFUSED (ip: %s).\n", server[id].name, account_id, ip); |
---|
| 1185 | WFIFOHEAD(fd,59); |
---|
| 1186 | WFIFOW(fd,0) = 0x2713; |
---|
| 1187 | WFIFOL(fd,2) = account_id; |
---|
| 1188 | WFIFOL(fd,6) = login_id1; |
---|
| 1189 | WFIFOL(fd,10) = login_id2; |
---|
| 1190 | WFIFOB(fd,14) = 1; |
---|
| 1191 | // It is unnecessary to send email |
---|
| 1192 | // It is unnecessary to send validity date of the account |
---|
| 1193 | WFIFOSET(fd,59); |
---|
| 1194 | } |
---|
| 1195 | } |
---|
| 1196 | break; |
---|
| 1197 | |
---|
| 1198 | case 0x2714: |
---|
| 1199 | if( RFIFOREST(fd) < 6 ) |
---|
| 1200 | return 0; |
---|
| 1201 | { |
---|
| 1202 | int users = RFIFOL(fd,2); |
---|
| 1203 | RFIFOSKIP(fd,6); |
---|
| 1204 | |
---|
| 1205 | // how many users on world? (update) |
---|
| 1206 | if( server[id].users != users ) |
---|
| 1207 | { |
---|
| 1208 | ShowStatus("set users %s : %d\n", server[id].name, users); |
---|
| 1209 | |
---|
| 1210 | server[id].users = users; |
---|
| 1211 | } |
---|
| 1212 | } |
---|
| 1213 | break; |
---|
| 1214 | |
---|
| 1215 | case 0x2715: // request from char server to change e-email from default "a@a.com" |
---|
| 1216 | if (RFIFOREST(fd) < 46) |
---|
| 1217 | return 0; |
---|
| 1218 | { |
---|
| 1219 | char email[40]; |
---|
| 1220 | int acc = RFIFOL(fd,2); |
---|
| 1221 | safestrncpy(email, (char*)RFIFOP(fd,6), 40); remove_control_chars(email); |
---|
| 1222 | RFIFOSKIP(fd,46); |
---|
| 1223 | |
---|
| 1224 | if( e_mail_check(email) == 0 ) |
---|
| 1225 | ShowNotice("Char-server '%s': Attempt to create an e-mail on an account with a default e-mail REFUSED - e-mail is invalid (account: %d, ip: %s)\n", server[id].name, acc, ip); |
---|
| 1226 | else |
---|
| 1227 | { |
---|
| 1228 | ARR_FIND( 0, auth_num, i, auth_dat[i].account_id == acc && (strcmp(auth_dat[i].email, "a@a.com") == 0 || auth_dat[i].email[0] == '\0') ); |
---|
| 1229 | if( i == auth_num ) |
---|
| 1230 | ShowNotice("Char-server '%s': Attempt to create an e-mail on an account with a default e-mail REFUSED - account doesn't exist or e-mail of account isn't default e-mail (account: %d, ip: %s).\n", server[id].name, acc, ip); |
---|
| 1231 | else |
---|
| 1232 | { |
---|
| 1233 | memcpy(auth_dat[i].email, email, 40); |
---|
| 1234 | ShowNotice("Char-server '%s': Create an e-mail on an account with a default e-mail (account: %d, new e-mail: %s, ip: %s).\n", server[id].name, acc, email, ip); |
---|
| 1235 | // Save |
---|
| 1236 | mmo_auth_sync(); |
---|
| 1237 | } |
---|
| 1238 | } |
---|
| 1239 | } |
---|
| 1240 | break; |
---|
| 1241 | |
---|
| 1242 | case 0x2716: // received an e-mail/limited time request, because a player comes back from a map-server to the char-server |
---|
| 1243 | if( RFIFOREST(fd) < 6 ) |
---|
| 1244 | return 0; |
---|
| 1245 | { |
---|
| 1246 | uint32 expiration_time = 0; |
---|
| 1247 | char email[40] = ""; |
---|
| 1248 | |
---|
| 1249 | int account_id = RFIFOL(fd,2); |
---|
| 1250 | RFIFOSKIP(fd,6); |
---|
| 1251 | |
---|
| 1252 | ARR_FIND( 0, auth_num, i, auth_dat[i].account_id == account_id ); |
---|
| 1253 | if( i == auth_num ) |
---|
| 1254 | ShowNotice("Char-server '%s': e-mail of the account %d NOT found (ip: %s).\n", server[id].name, RFIFOL(fd,2), ip); |
---|
| 1255 | else |
---|
| 1256 | { |
---|
| 1257 | safestrncpy(email, auth_dat[i].email, sizeof(email)); |
---|
| 1258 | expiration_time = (uint32)auth_dat[i].expiration_time; |
---|
| 1259 | } |
---|
| 1260 | |
---|
| 1261 | WFIFOHEAD(fd,50); |
---|
| 1262 | WFIFOW(fd,0) = 0x2717; |
---|
| 1263 | WFIFOL(fd,2) = account_id; |
---|
| 1264 | safestrncpy((char*)WFIFOP(fd,6), email, 40); |
---|
| 1265 | WFIFOL(fd,46) = expiration_time; |
---|
| 1266 | WFIFOSET(fd,50); |
---|
| 1267 | } |
---|
| 1268 | break; |
---|
| 1269 | |
---|
| 1270 | case 0x2719: // ping request from charserver |
---|
| 1271 | if( RFIFOREST(fd) < 2 ) |
---|
| 1272 | return 0; |
---|
| 1273 | RFIFOSKIP(fd,2); |
---|
| 1274 | |
---|
| 1275 | WFIFOHEAD(fd,2); |
---|
| 1276 | WFIFOW(fd,0) = 0x2718; |
---|
| 1277 | WFIFOSET(fd,2); |
---|
| 1278 | break; |
---|
| 1279 | |
---|
| 1280 | // Map server send information to change an email of an account via char-server |
---|
| 1281 | case 0x2722: // 0x2722 <account_id>.L <actual_e-mail>.40B <new_e-mail>.40B |
---|
| 1282 | if (RFIFOREST(fd) < 86) |
---|
| 1283 | return 0; |
---|
| 1284 | { |
---|
| 1285 | char actual_email[40]; |
---|
| 1286 | char new_email[40]; |
---|
| 1287 | int account_id = RFIFOL(fd,2); |
---|
| 1288 | safestrncpy(actual_email, (char*)RFIFOP(fd,6), 40); remove_control_chars(actual_email); |
---|
| 1289 | safestrncpy(new_email, (char*)RFIFOP(fd,46), 40); remove_control_chars(new_email); |
---|
| 1290 | RFIFOSKIP(fd, 86); |
---|
| 1291 | |
---|
| 1292 | if( e_mail_check(actual_email) == 0 ) |
---|
| 1293 | ShowNotice("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command), but actual email is invalid (account: %d, ip: %s)\n", server[id].name, account_id, ip); |
---|
| 1294 | else if( e_mail_check(new_email) == 0 ) |
---|
| 1295 | ShowNotice("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a invalid new e-mail (account: %d, ip: %s)\n", server[id].name, account_id, ip); |
---|
| 1296 | else if( strcmpi(new_email, "a@a.com") == 0 ) |
---|
| 1297 | ShowNotice("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a default e-mail (account: %d, ip: %s)\n", server[id].name, account_id, ip); |
---|
| 1298 | else { |
---|
| 1299 | ARR_FIND( 0, auth_num, i, auth_dat[i].account_id == account_id ); |
---|
| 1300 | if( i == auth_num ) |
---|
| 1301 | ShowNotice("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command), but account doesn't exist (account: %d, ip: %s).\n", server[id].name, account_id, ip); |
---|
| 1302 | else |
---|
| 1303 | if( strcmpi(auth_dat[i].email, actual_email) != 0 ) |
---|
| 1304 | ShowNotice("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command), but actual e-mail is incorrect (account: %d (%s), actual e-mail: %s, proposed e-mail: %s, ip: %s).\n", server[id].name, account_id, auth_dat[i].userid, auth_dat[i].email, actual_email, ip); |
---|
| 1305 | else { |
---|
| 1306 | safestrncpy(auth_dat[i].email, new_email, 40); |
---|
| 1307 | ShowNotice("Char-server '%s': Modify an e-mail on an account (@email GM command) (account: %d (%s), new e-mail: %s, ip: %s).\n", server[id].name, account_id, auth_dat[i].userid, new_email, ip); |
---|
| 1308 | // Save |
---|
| 1309 | mmo_auth_sync(); |
---|
| 1310 | } |
---|
| 1311 | } |
---|
| 1312 | } |
---|
| 1313 | break; |
---|
| 1314 | |
---|
| 1315 | case 0x2724: // Receiving an account state update request from a map-server (relayed via char-server) |
---|
| 1316 | if (RFIFOREST(fd) < 10) |
---|
| 1317 | return 0; |
---|
| 1318 | { |
---|
| 1319 | int account_id = RFIFOL(fd,2); |
---|
| 1320 | uint32 state = RFIFOL(fd,6); |
---|
| 1321 | RFIFOSKIP(fd,10); |
---|
| 1322 | |
---|
| 1323 | ARR_FIND( 0, auth_num, i, auth_dat[i].account_id == account_id ); |
---|
| 1324 | if( i == auth_num ) |
---|
| 1325 | ShowNotice("Char-server '%s': Error of Status change (account: %d not found, suggested status %d, ip: %s).\n", server[id].name, account_id, state, ip); |
---|
| 1326 | else |
---|
| 1327 | if( auth_dat[i].state == state ) |
---|
| 1328 | ShowNotice("Char-server '%s': Error of Status change - actual status is already the good status (account: %d, status %d, ip: %s).\n", server[id].name, account_id, state, ip); |
---|
| 1329 | else { |
---|
| 1330 | ShowNotice("Char-server '%s': Status change (account: %d, new status %d, ip: %s).\n", server[id].name, account_id, state, ip); |
---|
| 1331 | if (state != 0) { |
---|
| 1332 | uint8 buf[11]; |
---|
| 1333 | WBUFW(buf,0) = 0x2731; |
---|
| 1334 | WBUFL(buf,2) = account_id; |
---|
| 1335 | WBUFB(buf,6) = 0; // 0: change of state, 1: ban |
---|
| 1336 | WBUFL(buf,7) = state; // status or final date of a banishment |
---|
| 1337 | charif_sendallwos(-1, buf, 11); |
---|
| 1338 | } |
---|
| 1339 | auth_dat[i].state = state; |
---|
| 1340 | // Save |
---|
| 1341 | mmo_auth_sync(); |
---|
| 1342 | } |
---|
| 1343 | } |
---|
| 1344 | break; |
---|
| 1345 | |
---|
| 1346 | case 0x2725: // Receiving of map-server via char-server a ban request |
---|
| 1347 | if (RFIFOREST(fd) < 18) |
---|
| 1348 | return 0; |
---|
| 1349 | { |
---|
| 1350 | int account_id = RFIFOL(fd,2); |
---|
| 1351 | int year = (short)RFIFOW(fd,6); |
---|
| 1352 | int month = (short)RFIFOW(fd,8); |
---|
| 1353 | int mday = (short)RFIFOW(fd,10); |
---|
| 1354 | int hour = (short)RFIFOW(fd,12); |
---|
| 1355 | int min = (short)RFIFOW(fd,14); |
---|
| 1356 | int sec = (short)RFIFOW(fd,16); |
---|
| 1357 | RFIFOSKIP(fd,18); |
---|
| 1358 | |
---|
| 1359 | ARR_FIND( 0, auth_num, i, auth_dat[i].account_id == account_id ); |
---|
| 1360 | if( i == auth_num ) |
---|
| 1361 | ShowNotice("Char-server '%s': Error of ban request (account: %d not found, ip: %s).\n", server[id].name, account_id, ip); |
---|
| 1362 | else |
---|
| 1363 | { |
---|
| 1364 | time_t timestamp; |
---|
| 1365 | struct tm *tmtime; |
---|
| 1366 | if (auth_dat[i].unban_time == 0 || auth_dat[i].unban_time < time(NULL)) |
---|
| 1367 | timestamp = time(NULL); |
---|
| 1368 | else |
---|
| 1369 | timestamp = auth_dat[i].unban_time; |
---|
| 1370 | tmtime = localtime(×tamp); |
---|
| 1371 | tmtime->tm_year = tmtime->tm_year + year; |
---|
| 1372 | tmtime->tm_mon = tmtime->tm_mon + month; |
---|
| 1373 | tmtime->tm_mday = tmtime->tm_mday + mday; |
---|
| 1374 | tmtime->tm_hour = tmtime->tm_hour + hour; |
---|
| 1375 | tmtime->tm_min = tmtime->tm_min + min; |
---|
| 1376 | tmtime->tm_sec = tmtime->tm_sec + sec; |
---|
| 1377 | timestamp = mktime(tmtime); |
---|
| 1378 | if (timestamp == -1) |
---|
| 1379 | ShowNotice("Char-server '%s': Error of ban request (account: %d, invalid date, ip: %s).\n", server[id].name, account_id, ip); |
---|
| 1380 | else |
---|
| 1381 | if( timestamp <= time(NULL) || timestamp == 0 ) |
---|
| 1382 | ShowNotice("Char-server '%s': Error of ban request (account: %d, new date unbans the account, ip: %s).\n", server[id].name, account_id, ip); |
---|
| 1383 | else |
---|
| 1384 | { |
---|
| 1385 | unsigned char buf[16]; |
---|
| 1386 | char tmpstr[2048]; |
---|
| 1387 | strftime(tmpstr, 24, login_config.date_format, localtime(×tamp)); |
---|
| 1388 | ShowNotice("Char-server '%s': Ban request (account: %d, new final date of banishment: %d (%s), ip: %s).\n", server[id].name, account_id, timestamp, tmpstr, ip); |
---|
| 1389 | WBUFW(buf,0) = 0x2731; |
---|
| 1390 | WBUFL(buf,2) = auth_dat[i].account_id; |
---|
| 1391 | WBUFB(buf,6) = 1; // 0: change of status, 1: ban |
---|
| 1392 | WBUFL(buf,7) = (unsigned int)timestamp; // status or final date of a banishment |
---|
| 1393 | charif_sendallwos(-1, buf, 11); |
---|
| 1394 | auth_dat[i].unban_time = timestamp; |
---|
| 1395 | // Save |
---|
| 1396 | mmo_auth_sync(); |
---|
| 1397 | } |
---|
| 1398 | } |
---|
| 1399 | } |
---|
| 1400 | break; |
---|
| 1401 | |
---|
| 1402 | case 0x2727: // Change of sex (sex is reversed) |
---|
| 1403 | if( RFIFOREST(fd) < 6 ) |
---|
| 1404 | return 0; |
---|
| 1405 | { |
---|
| 1406 | int account_id = RFIFOL(fd,2); |
---|
| 1407 | RFIFOSKIP(fd,6); |
---|
| 1408 | |
---|
| 1409 | ARR_FIND( 0, auth_num, i, auth_dat[i].account_id == account_id ); |
---|
| 1410 | if( i == auth_num ) |
---|
| 1411 | ShowNotice("Char-server '%s': Error of sex change (account: %d not found, ip: %s).\n", server[id].name, account_id, ip); |
---|
| 1412 | else |
---|
| 1413 | if( auth_dat[i].sex == 'S' ) |
---|
| 1414 | ShowNotice("Char-server '%s': Error of sex change - account to change is a Server account (account: %d, ip: %s).\n", server[id].name, account_id, ip); |
---|
| 1415 | else |
---|
| 1416 | { |
---|
| 1417 | unsigned char buf[7]; |
---|
| 1418 | char sex = ( auth_dat[i].sex == 'M' ) ? 'F' : 'M'; //Change gender |
---|
| 1419 | |
---|
| 1420 | auth_dat[i].sex = sex; |
---|
| 1421 | |
---|
| 1422 | ShowNotice("Char-server '%s': Sex change (account: %d, new sex %c, ip: %s).\n", server[id].name, account_id, sex, ip); |
---|
| 1423 | WBUFW(buf,0) = 0x2723; |
---|
| 1424 | WBUFL(buf,2) = account_id; |
---|
| 1425 | WBUFB(buf,6) = sex_str2num(sex); |
---|
| 1426 | charif_sendallwos(-1, buf, 7); |
---|
| 1427 | // Save |
---|
| 1428 | mmo_auth_sync(); |
---|
| 1429 | } |
---|
| 1430 | } |
---|
| 1431 | break; |
---|
| 1432 | |
---|
| 1433 | case 0x2728: // We receive account_reg2 from a char-server, and we send them to other map-servers. |
---|
| 1434 | if( RFIFOREST(fd) < 4 || RFIFOREST(fd) < RFIFOW(fd,2) ) |
---|
| 1435 | return 0; |
---|
| 1436 | { |
---|
| 1437 | int acc = RFIFOL(fd,4); |
---|
| 1438 | |
---|
| 1439 | ARR_FIND( 0, auth_num, i, auth_dat[i].account_id == acc ); |
---|
| 1440 | if( i == auth_num ) |
---|
| 1441 | ShowStatus("Char-server '%s': receiving (from the char-server) of account_reg2 (account: %d not found, ip: %s).\n", server[id].name, acc, ip); |
---|
| 1442 | else |
---|
| 1443 | { |
---|
| 1444 | int len; |
---|
| 1445 | int p; |
---|
| 1446 | ShowNotice("char-server '%s': receiving (from the char-server) of account_reg2 (account: %d, ip: %s).\n", server[id].name, acc, ip); |
---|
| 1447 | for(j=0,p=13;j<ACCOUNT_REG2_NUM && p<RFIFOW(fd,2);j++){ |
---|
| 1448 | sscanf((char*)RFIFOP(fd,p), "%31c%n",auth_dat[i].account_reg2[j].str,&len); |
---|
| 1449 | auth_dat[i].account_reg2[j].str[len]='\0'; |
---|
| 1450 | p +=len+1; //+1 to skip the '\0' between strings. |
---|
| 1451 | sscanf((char*)RFIFOP(fd,p), "%255c%n",auth_dat[i].account_reg2[j].value,&len); |
---|
| 1452 | auth_dat[i].account_reg2[j].value[len]='\0'; |
---|
| 1453 | p +=len+1; |
---|
| 1454 | remove_control_chars(auth_dat[i].account_reg2[j].str); |
---|
| 1455 | remove_control_chars(auth_dat[i].account_reg2[j].value); |
---|
| 1456 | } |
---|
| 1457 | auth_dat[i].account_reg2_num = j; |
---|
| 1458 | |
---|
| 1459 | // Sending information towards the other char-servers. |
---|
| 1460 | RFIFOW(fd,0) = 0x2729;// reusing read buffer |
---|
| 1461 | charif_sendallwos(fd, RFIFOP(fd,0), RFIFOW(fd,2)); |
---|
| 1462 | RFIFOSKIP(fd,RFIFOW(fd,2)); |
---|
| 1463 | |
---|
| 1464 | // Save |
---|
| 1465 | mmo_auth_sync(); |
---|
| 1466 | } |
---|
| 1467 | |
---|
| 1468 | } |
---|
| 1469 | break; |
---|
| 1470 | |
---|
| 1471 | case 0x272a: // Receiving of map-server via char-server an unban request |
---|
| 1472 | if( RFIFOREST(fd) < 6 ) |
---|
| 1473 | return 0; |
---|
| 1474 | { |
---|
| 1475 | int account_id = RFIFOL(fd,2); |
---|
| 1476 | RFIFOSKIP(fd,6); |
---|
| 1477 | |
---|
| 1478 | ARR_FIND( 0, auth_num, i, auth_dat[i].account_id == account_id ); |
---|
| 1479 | if( i == auth_num ) |
---|
| 1480 | ShowNotice("Char-server '%s': Error of UnBan request (account: %d not found, ip: %s).\n", server[id].name, account_id, ip); |
---|
| 1481 | else |
---|
| 1482 | if( auth_dat[i].unban_time == 0 ) |
---|
| 1483 | ShowNotice("Char-server '%s': Error of UnBan request (account: %d, no change for unban date, ip: %s).\n", server[id].name, account_id, ip); |
---|
| 1484 | else |
---|
| 1485 | { |
---|
| 1486 | auth_dat[i].unban_time = 0; |
---|
| 1487 | ShowNotice("Char-server '%s': UnBan request (account: %d, ip: %s).\n", server[id].name, account_id, ip); |
---|
| 1488 | } |
---|
| 1489 | } |
---|
| 1490 | break; |
---|
| 1491 | |
---|
| 1492 | case 0x272b: // Set account_id to online [Wizputer] |
---|
| 1493 | if( RFIFOREST(fd) < 6 ) |
---|
| 1494 | return 0; |
---|
| 1495 | add_online_user(id, RFIFOL(fd,2)); |
---|
| 1496 | RFIFOSKIP(fd,6); |
---|
| 1497 | break; |
---|
| 1498 | |
---|
| 1499 | case 0x272c: // Set account_id to offline [Wizputer] |
---|
| 1500 | if( RFIFOREST(fd) < 6 ) |
---|
| 1501 | return 0; |
---|
| 1502 | remove_online_user(RFIFOL(fd,2)); |
---|
| 1503 | RFIFOSKIP(fd,6); |
---|
| 1504 | break; |
---|
| 1505 | |
---|
| 1506 | case 0x272d: // Receive list of all online accounts. [Skotlex] |
---|
| 1507 | if (RFIFOREST(fd) < 4 || RFIFOREST(fd) < RFIFOW(fd,2)) |
---|
| 1508 | return 0; |
---|
| 1509 | if( login_config.online_check ) |
---|
| 1510 | { |
---|
| 1511 | struct online_login_data *p; |
---|
| 1512 | int aid; |
---|
| 1513 | uint32 i, users; |
---|
| 1514 | online_db->foreach(online_db, online_db_setoffline, id); //Set all chars from this char-server offline first |
---|
| 1515 | users = RFIFOW(fd,4); |
---|
| 1516 | for (i = 0; i < users; i++) { |
---|
| 1517 | aid = RFIFOL(fd,6+i*4); |
---|
| 1518 | p = (struct online_login_data*)idb_ensure(online_db, aid, create_online_user); |
---|
| 1519 | p->char_server = id; |
---|
| 1520 | if (p->waiting_disconnect != -1) |
---|
| 1521 | { |
---|
| 1522 | delete_timer(p->waiting_disconnect, waiting_disconnect_timer); |
---|
| 1523 | p->waiting_disconnect = -1; |
---|
| 1524 | } |
---|
| 1525 | } |
---|
| 1526 | } |
---|
| 1527 | RFIFOSKIP(fd,RFIFOW(fd,2)); |
---|
| 1528 | break; |
---|
| 1529 | |
---|
| 1530 | case 0x272e: //Request account_reg2 for a character. |
---|
| 1531 | if (RFIFOREST(fd) < 10) |
---|
| 1532 | return 0; |
---|
| 1533 | { |
---|
| 1534 | size_t off; |
---|
| 1535 | |
---|
| 1536 | int account_id = RFIFOL(fd,2); |
---|
| 1537 | int char_id = RFIFOL(fd,6); |
---|
| 1538 | RFIFOSKIP(fd,10); |
---|
| 1539 | |
---|
| 1540 | WFIFOHEAD(fd,10000); |
---|
| 1541 | WFIFOW(fd,0) = 0x2729; |
---|
| 1542 | WFIFOL(fd,4) = account_id; |
---|
| 1543 | WFIFOL(fd,8) = char_id; |
---|
| 1544 | WFIFOB(fd,12) = 1; //Type 1 for Account2 registry |
---|
| 1545 | |
---|
| 1546 | ARR_FIND( 0, auth_num, i, auth_dat[i].account_id == account_id ); |
---|
| 1547 | if( i == auth_num ) |
---|
| 1548 | { |
---|
| 1549 | //Account not found? Send at least empty data, map servers need a reply! |
---|
| 1550 | WFIFOW(fd,2) = 13; |
---|
| 1551 | WFIFOSET(fd,WFIFOW(fd,2)); |
---|
| 1552 | break; |
---|
| 1553 | } |
---|
| 1554 | |
---|
| 1555 | for( off = 13, j = 0; j < auth_dat[i].account_reg2_num && off < 9000; j++ ) |
---|
| 1556 | { |
---|
| 1557 | if( auth_dat[i].account_reg2[j].str[0] != '\0' ) |
---|
| 1558 | { |
---|
| 1559 | off += sprintf((char*)WFIFOP(fd,off), "%s", auth_dat[i].account_reg2[j].str)+1; //We add 1 to consider the '\0' in place. |
---|
| 1560 | off += sprintf((char*)WFIFOP(fd,off), "%s", auth_dat[i].account_reg2[j].value)+1; |
---|
| 1561 | } |
---|
| 1562 | } |
---|
| 1563 | |
---|
| 1564 | if( off >= 9000 ) |
---|
| 1565 | ShowWarning("Too many account2 registries for AID %d. Some registries were not sent.\n", account_id); |
---|
| 1566 | |
---|
| 1567 | WFIFOW(fd,2) = (uint16)off; |
---|
| 1568 | WFIFOSET(fd,WFIFOW(fd,2)); |
---|
| 1569 | } |
---|
| 1570 | break; |
---|
| 1571 | |
---|
| 1572 | case 0x2736: // WAN IP update from char-server |
---|
| 1573 | if( RFIFOREST(fd) < 6 ) |
---|
| 1574 | return 0; |
---|
| 1575 | server[id].ip = ntohl(RFIFOL(fd,2)); |
---|
| 1576 | ShowInfo("Updated IP of Server #%d to %d.%d.%d.%d.\n",id, CONVIP(server[id].ip)); |
---|
| 1577 | RFIFOSKIP(fd,6); |
---|
| 1578 | break; |
---|
| 1579 | |
---|
| 1580 | case 0x2737: //Request to set all offline. |
---|
| 1581 | ShowInfo("Setting accounts from char-server %d offline.\n", id); |
---|
| 1582 | online_db->foreach(online_db, online_db_setoffline, id); |
---|
| 1583 | RFIFOSKIP(fd,2); |
---|
| 1584 | break; |
---|
| 1585 | |
---|
| 1586 | default: |
---|
| 1587 | ShowError("parse_fromchar: Unknown packet 0x%x from a char-server! Disconnecting!\n", command); |
---|
| 1588 | set_eof(fd); |
---|
| 1589 | return 0; |
---|
| 1590 | } // switch |
---|
| 1591 | } // while |
---|
| 1592 | |
---|
| 1593 | RFIFOSKIP(fd,RFIFOREST(fd)); |
---|
| 1594 | return 0; |
---|
| 1595 | } |
---|
| 1596 | |
---|
| 1597 | //-------------------------------------------- |
---|
| 1598 | // Test to know if an IP come from LAN or WAN. |
---|
| 1599 | //-------------------------------------------- |
---|
| 1600 | int lan_subnetcheck(uint32 ip) |
---|
| 1601 | { |
---|
| 1602 | int i; |
---|
| 1603 | ARR_FIND( 0, subnet_count, i, (subnet[i].char_ip & subnet[i].mask) == (ip & subnet[i].mask) ); |
---|
| 1604 | return ( i < subnet_count ) ? subnet[i].char_ip : 0; |
---|
| 1605 | } |
---|
| 1606 | |
---|
| 1607 | void login_auth_ok(struct login_session_data* sd) |
---|
| 1608 | { |
---|
| 1609 | int fd = sd->fd; |
---|
| 1610 | uint32 ip = session[fd]->client_addr; |
---|
| 1611 | |
---|
| 1612 | uint8 server_num, n; |
---|
| 1613 | uint32 subnet_char_ip; |
---|
| 1614 | struct auth_node* node; |
---|
| 1615 | int i; |
---|
| 1616 | |
---|
| 1617 | sd->level = isGM(sd->account_id); |
---|
| 1618 | |
---|
| 1619 | if( sd->level < login_config.min_level_to_connect ) |
---|
| 1620 | { |
---|
| 1621 | ShowStatus("Connection refused: the minimum GM level for connection is %d (account: %s, GM level: %d).\n", login_config.min_level_to_connect, sd->userid, sd->level); |
---|
| 1622 | WFIFOHEAD(fd,3); |
---|
| 1623 | WFIFOW(fd,0) = 0x81; |
---|
| 1624 | WFIFOB(fd,2) = 1; // 01 = Server closed |
---|
| 1625 | WFIFOSET(fd,3); |
---|
| 1626 | return; |
---|
| 1627 | } |
---|
| 1628 | |
---|
| 1629 | server_num = 0; |
---|
| 1630 | for( i = 0; i < MAX_SERVERS; ++i ) |
---|
| 1631 | if( session_isValid(server[i].fd) ) |
---|
| 1632 | server_num++; |
---|
| 1633 | |
---|
| 1634 | if( server_num == 0 ) |
---|
| 1635 | {// if no char-server, don't send void list of servers, just disconnect the player with proper message |
---|
| 1636 | ShowStatus("Connection refused: there is no char-server online (account: %s).\n", sd->userid); |
---|
| 1637 | WFIFOHEAD(fd,3); |
---|
| 1638 | WFIFOW(fd,0) = 0x81; |
---|
| 1639 | WFIFOB(fd,2) = 1; // 01 = Server closed |
---|
| 1640 | WFIFOSET(fd,3); |
---|
| 1641 | return; |
---|
| 1642 | } |
---|
| 1643 | |
---|
| 1644 | if( login_config.online_check ) |
---|
| 1645 | { |
---|
| 1646 | struct online_login_data* data = (struct online_login_data*)idb_get(online_db, sd->account_id); |
---|
| 1647 | if( data ) |
---|
| 1648 | {// account is already marked as online! |
---|
| 1649 | if( data->char_server > -1 ) |
---|
| 1650 | {// Request char servers to kick this account out. [Skotlex] |
---|
| 1651 | uint8 buf[6]; |
---|
| 1652 | ShowNotice("User '%s' is already online - Rejected.\n", sd->userid); |
---|
| 1653 | WBUFW(buf,0) = 0x2734; |
---|
| 1654 | WBUFL(buf,2) = sd->account_id; |
---|
| 1655 | charif_sendallwos(-1, buf, 6); |
---|
| 1656 | if( data->waiting_disconnect == -1 ) |
---|
| 1657 | data->waiting_disconnect = add_timer(gettick()+AUTH_TIMEOUT, waiting_disconnect_timer, sd->account_id, 0); |
---|
| 1658 | |
---|
| 1659 | WFIFOHEAD(fd,3); |
---|
| 1660 | WFIFOW(fd,0) = 0x81; |
---|
| 1661 | WFIFOB(fd,2) = 8; // 08 = Server still recognizes your last login |
---|
| 1662 | WFIFOSET(fd,3); |
---|
| 1663 | return; |
---|
| 1664 | } |
---|
| 1665 | else |
---|
| 1666 | if( data->char_server == -1 ) |
---|
| 1667 | {// client has authed but did not access char-server yet |
---|
| 1668 | // wipe previous session |
---|
| 1669 | idb_remove(auth_db, sd->account_id); |
---|
| 1670 | remove_online_user(sd->account_id); |
---|
| 1671 | data = NULL; |
---|
| 1672 | } |
---|
| 1673 | } |
---|
| 1674 | } |
---|
| 1675 | |
---|
| 1676 | if( sd->level > 0 ) |
---|
| 1677 | ShowStatus("Connection of the GM (level:%d) account '%s' accepted.\n", sd->level, sd->userid); |
---|
| 1678 | else |
---|
| 1679 | ShowStatus("Connection of the account '%s' accepted.\n", sd->userid); |
---|
| 1680 | |
---|
| 1681 | WFIFOHEAD(fd,47+32*server_num); |
---|
| 1682 | WFIFOW(fd,0) = 0x69; |
---|
| 1683 | WFIFOW(fd,2) = 47+32*server_num; |
---|
| 1684 | WFIFOL(fd,4) = sd->login_id1; |
---|
| 1685 | WFIFOL(fd,8) = sd->account_id; |
---|
| 1686 | WFIFOL(fd,12) = sd->login_id2; |
---|
| 1687 | WFIFOL(fd,16) = 0; // in old version, that was for ip (not more used) |
---|
| 1688 | //memcpy(WFIFOP(fd,20), sd->lastlogin, 24); // in old version, that was for name (not more used) |
---|
| 1689 | WFIFOW(fd,44) = 0; // unknown |
---|
| 1690 | WFIFOB(fd,46) = sex_str2num(sd->sex); |
---|
| 1691 | for( i = 0, n = 0; i < MAX_SERVERS; ++i ) |
---|
| 1692 | { |
---|
| 1693 | if( !session_isValid(server[i].fd) ) |
---|
| 1694 | continue; |
---|
| 1695 | |
---|
| 1696 | subnet_char_ip = lan_subnetcheck(ip); // Advanced subnet check [LuzZza] |
---|
| 1697 | WFIFOL(fd,47+n*32) = htonl((subnet_char_ip) ? subnet_char_ip : server[i].ip); |
---|
| 1698 | WFIFOW(fd,47+n*32+4) = ntows(htons(server[i].port)); // [!] LE byte order here [!] |
---|
| 1699 | memcpy(WFIFOP(fd,47+n*32+6), server[i].name, 20); |
---|
| 1700 | WFIFOW(fd,47+n*32+26) = server[i].users; |
---|
| 1701 | WFIFOW(fd,47+n*32+28) = server[i].maintenance; |
---|
| 1702 | WFIFOW(fd,47+n*32+30) = server[i].new_; |
---|
| 1703 | n++; |
---|
| 1704 | } |
---|
| 1705 | WFIFOSET(fd,47+32*server_num); |
---|
| 1706 | |
---|
| 1707 | // create temporary auth entry |
---|
| 1708 | CREATE(node, struct auth_node, 1); |
---|
| 1709 | node->account_id = sd->account_id; |
---|
| 1710 | node->login_id1 = sd->login_id1; |
---|
| 1711 | node->login_id2 = sd->login_id2; |
---|
| 1712 | node->sex = sd->sex; |
---|
| 1713 | node->ip = ip; |
---|
| 1714 | idb_put(auth_db, sd->account_id, node); |
---|
| 1715 | |
---|
| 1716 | if( login_config.online_check ) |
---|
| 1717 | { |
---|
| 1718 | struct online_login_data* data; |
---|
| 1719 | |
---|
| 1720 | // mark client as 'online' |
---|
| 1721 | data = add_online_user(-1, sd->account_id); |
---|
| 1722 | |
---|
| 1723 | // schedule deletion of this node |
---|
| 1724 | data->waiting_disconnect = add_timer(gettick()+AUTH_TIMEOUT, waiting_disconnect_timer, sd->account_id, 0); |
---|
| 1725 | } |
---|
| 1726 | } |
---|
| 1727 | |
---|
| 1728 | void login_auth_failed(struct login_session_data* sd, int result) |
---|
| 1729 | { |
---|
| 1730 | int fd = sd->fd; |
---|
| 1731 | |
---|
| 1732 | WFIFOHEAD(fd,23); |
---|
| 1733 | WFIFOW(fd,0) = 0x6a; |
---|
| 1734 | WFIFOB(fd,2) = (uint8)result; |
---|
| 1735 | if( result != 6 ) |
---|
| 1736 | memset(WFIFOP(fd,3), '\0', 20); |
---|
| 1737 | else |
---|
| 1738 | {// 6 = Your are Prohibited to log in until %s |
---|
| 1739 | char tmpstr[20]; |
---|
| 1740 | int i = search_account_index(sd->userid); |
---|
| 1741 | time_t unban_time = ( i >= 0 ) ? auth_dat[i].unban_time : 0; |
---|
| 1742 | strftime(tmpstr, 20, login_config.date_format, localtime(&unban_time)); |
---|
| 1743 | safestrncpy((char*)WFIFOP(fd,3), tmpstr, 20); // ban timestamp goes here |
---|
| 1744 | } |
---|
| 1745 | WFIFOSET(fd,23); |
---|
| 1746 | } |
---|
| 1747 | |
---|
| 1748 | //---------------------------------------------------------------------------------------- |
---|
| 1749 | // Default packet parsing (normal players or administation/char-server connection requests) |
---|
| 1750 | //---------------------------------------------------------------------------------------- |
---|
| 1751 | int parse_login(int fd) |
---|
| 1752 | { |
---|
| 1753 | struct login_session_data* sd = session[fd]->session_data; |
---|
| 1754 | int result; |
---|
| 1755 | uint32 ipl; |
---|
| 1756 | char ip[16]; |
---|
| 1757 | |
---|
| 1758 | if( session[fd]->flag.eof ) |
---|
| 1759 | { |
---|
| 1760 | do_close(fd); |
---|
| 1761 | return 0; |
---|
| 1762 | } |
---|
| 1763 | |
---|
| 1764 | if( sd == NULL ) { |
---|
| 1765 | sd = CREATE(session[fd]->session_data, struct login_session_data, 1); |
---|
| 1766 | sd->fd = fd; |
---|
| 1767 | } |
---|
| 1768 | |
---|
| 1769 | ipl = session[fd]->client_addr; |
---|
| 1770 | ip2str(ipl, ip); |
---|
| 1771 | |
---|
| 1772 | while( RFIFOREST(fd) >= 2 ) |
---|
| 1773 | { |
---|
| 1774 | uint16 command = RFIFOW(fd,0); |
---|
| 1775 | |
---|
| 1776 | switch( command ) |
---|
| 1777 | { |
---|
| 1778 | |
---|
| 1779 | case 0x0200: // New alive packet: structure: 0x200 <account.userid>.24B. used to verify if client is always alive. |
---|
| 1780 | if (RFIFOREST(fd) < 26) |
---|
| 1781 | return 0; |
---|
| 1782 | RFIFOSKIP(fd,26); |
---|
| 1783 | break; |
---|
| 1784 | |
---|
| 1785 | case 0x0204: // New alive packet: structure: 0x204 <encrypted.account.userid>.16B. (new ragexe from 22 june 2004) |
---|
| 1786 | if (RFIFOREST(fd) < 18) |
---|
| 1787 | return 0; |
---|
| 1788 | RFIFOSKIP(fd,18); |
---|
| 1789 | break; |
---|
| 1790 | |
---|
| 1791 | case 0x0064: // request client login |
---|
| 1792 | case 0x01dd: // request client login (encryption mode) |
---|
| 1793 | case 0x0277: // New login packet (kRO 2006-04-24aSakexe langtype 0) |
---|
| 1794 | case 0x02b0: // New login packet (kRO 2007-05-14aSakexe langtype 0) |
---|
| 1795 | { |
---|
| 1796 | size_t packet_len = RFIFOREST(fd); // assume no other packet was sent |
---|
| 1797 | |
---|
| 1798 | if( (command == 0x0064 && packet_len < 55) |
---|
| 1799 | || (command == 0x01dd && packet_len < 47) |
---|
| 1800 | || (command == 0x0277 && packet_len < 84) |
---|
| 1801 | || (command == 0x02b0 && packet_len < 85) ) |
---|
| 1802 | return 0; |
---|
| 1803 | |
---|
| 1804 | // S 0064 <version>.l <account name>.24B <password>.24B <version2>.B |
---|
| 1805 | // S 01dd <version>.l <account name>.24B <md5 binary>.16B <version2>.B |
---|
| 1806 | // S 0277 <version>.l <account name>.24B <password>.24B <junk?>.29B <version2>.B |
---|
| 1807 | // S 02b0 <version>.l <account name>.24B <password>.24B <junk?>.30B <version2>.B |
---|
| 1808 | |
---|
| 1809 | sd->version = RFIFOL(fd,2); |
---|
| 1810 | safestrncpy(sd->userid, (char*)RFIFOP(fd,6), NAME_LENGTH); remove_control_chars(sd->userid); |
---|
| 1811 | if (command != 0x01dd) { |
---|
| 1812 | ShowStatus("Request for connection of %s (ip: %s).\n", sd->userid, ip); |
---|
| 1813 | safestrncpy(sd->passwd, (char*)RFIFOP(fd,30), NAME_LENGTH); remove_control_chars(sd->passwd); |
---|
| 1814 | sd->passwdenc = 0; |
---|
| 1815 | } else { |
---|
| 1816 | ShowStatus("Request for connection (encryption mode) of %s (ip: %s).\n", sd->userid, ip); |
---|
| 1817 | memcpy(sd->passwd, RFIFOP(fd,30), 16); sd->passwd[16] = '\0'; // raw binary data here! |
---|
| 1818 | sd->passwdenc = PASSWORDENC; |
---|
| 1819 | } |
---|
| 1820 | RFIFOSKIP(fd,packet_len); |
---|
| 1821 | |
---|
| 1822 | result = mmo_auth(sd); |
---|
| 1823 | |
---|
| 1824 | if( result == -1 ) |
---|
| 1825 | login_auth_ok(sd); |
---|
| 1826 | else |
---|
| 1827 | login_auth_failed(sd, result); |
---|
| 1828 | } |
---|
| 1829 | break; |
---|
| 1830 | |
---|
| 1831 | case 0x01db: // Sending request of the coding key |
---|
| 1832 | case 0x791a: // Sending request of the coding key (administration packet) |
---|
| 1833 | RFIFOSKIP(fd,2); |
---|
| 1834 | { |
---|
| 1835 | unsigned int i; |
---|
| 1836 | |
---|
| 1837 | memset(sd->md5key, '\0', sizeof(sd->md5key)); |
---|
| 1838 | sd->md5keylen = (uint16)(12 + rand() % 4); |
---|
| 1839 | for( i = 0; i < sd->md5keylen; ++i ) |
---|
| 1840 | sd->md5key[i] = (char)(1 + rand() % 255); |
---|
| 1841 | |
---|
| 1842 | WFIFOHEAD(fd,4 + sd->md5keylen); |
---|
| 1843 | WFIFOW(fd,0) = 0x01dc; |
---|
| 1844 | WFIFOW(fd,2) = 4 + sd->md5keylen; |
---|
| 1845 | memcpy(WFIFOP(fd,4), sd->md5key, sd->md5keylen); |
---|
| 1846 | WFIFOSET(fd,WFIFOW(fd,2)); |
---|
| 1847 | } |
---|
| 1848 | break; |
---|
| 1849 | |
---|
| 1850 | case 0x2710: // Connection request of a char-server |
---|
| 1851 | if (RFIFOREST(fd) < 86) |
---|
| 1852 | return 0; |
---|
| 1853 | { |
---|
| 1854 | char server_name[20]; |
---|
| 1855 | uint32 server_ip; |
---|
| 1856 | uint16 server_port; |
---|
| 1857 | uint16 maintenance; |
---|
| 1858 | uint16 new_; |
---|
| 1859 | |
---|
| 1860 | safestrncpy(sd->userid, (char*)RFIFOP(fd,2), NAME_LENGTH); //remove_control_chars(account.userid); |
---|
| 1861 | safestrncpy(sd->passwd, (char*)RFIFOP(fd,26), NAME_LENGTH); //remove_control_chars(account.passwd); |
---|
| 1862 | sd->passwdenc = 0; |
---|
| 1863 | sd->version = login_config.client_version_to_connect; // hack to skip version check |
---|
| 1864 | |
---|
| 1865 | server_ip = ntohl(RFIFOL(fd,54)); |
---|
| 1866 | server_port = ntohs(RFIFOW(fd,58)); |
---|
| 1867 | |
---|
| 1868 | safestrncpy(server_name, (char*)RFIFOP(fd,60), 20); remove_control_chars(server_name); |
---|
| 1869 | maintenance = RFIFOW(fd,82); |
---|
| 1870 | new_ = RFIFOW(fd,84); |
---|
| 1871 | RFIFOSKIP(fd,86); |
---|
| 1872 | |
---|
| 1873 | ShowInfo("Connection request of the char-server '%s' @ %d.%d.%d.%d:%d (account: '%s', pass: '%s', ip: '%s')\n", server_name, CONVIP(server_ip), server_port, sd->userid, sd->passwd, ip); |
---|
| 1874 | |
---|
| 1875 | result = mmo_auth(sd); |
---|
| 1876 | if( result == -1 && sd->sex == 'S' && sd->account_id < MAX_SERVERS && server[sd->account_id].fd == -1 ) |
---|
| 1877 | { |
---|
| 1878 | ShowStatus("Connection of the char-server '%s' accepted.\n", server_name); |
---|
| 1879 | safestrncpy(server[sd->account_id].name, server_name, sizeof(server[sd->account_id].name)); |
---|
| 1880 | server[sd->account_id].fd = fd; |
---|
| 1881 | server[sd->account_id].ip = server_ip; |
---|
| 1882 | server[sd->account_id].port = server_port; |
---|
| 1883 | server[sd->account_id].users = 0; |
---|
| 1884 | server[sd->account_id].maintenance = maintenance; |
---|
| 1885 | server[sd->account_id].new_ = new_; |
---|
| 1886 | |
---|
| 1887 | session[fd]->func_parse = parse_fromchar; |
---|
| 1888 | session[fd]->flag.server = 1; |
---|
| 1889 | realloc_fifo(fd, FIFOSIZE_SERVERLINK, FIFOSIZE_SERVERLINK); |
---|
| 1890 | |
---|
| 1891 | // send connection success |
---|
| 1892 | WFIFOHEAD(fd,3); |
---|
| 1893 | WFIFOW(fd,0) = 0x2711; |
---|
| 1894 | WFIFOB(fd,2) = 0; |
---|
| 1895 | WFIFOSET(fd,3); |
---|
| 1896 | |
---|
| 1897 | // send GM account to char-server |
---|
| 1898 | send_GM_accounts(fd); |
---|
| 1899 | } |
---|
| 1900 | else |
---|
| 1901 | { |
---|
| 1902 | ShowNotice("Connection of the char-server '%s' REFUSED.\n", server_name); |
---|
| 1903 | WFIFOHEAD(fd,3); |
---|
| 1904 | WFIFOW(fd,0) = 0x2711; |
---|
| 1905 | WFIFOB(fd,2) = 3; |
---|
| 1906 | WFIFOSET(fd,3); |
---|
| 1907 | } |
---|
| 1908 | } |
---|
| 1909 | return 0; // processing will continue elsewhere |
---|
| 1910 | |
---|
| 1911 | case 0x7530: // Server version information request |
---|
| 1912 | ShowStatus("Sending server version information to ip: %s\n", ip); |
---|
| 1913 | RFIFOSKIP(fd,2); |
---|
| 1914 | WFIFOHEAD(fd,10); |
---|
| 1915 | WFIFOW(fd,0) = 0x7531; |
---|
| 1916 | WFIFOB(fd,2) = ATHENA_MAJOR_VERSION; |
---|
| 1917 | WFIFOB(fd,3) = ATHENA_MINOR_VERSION; |
---|
| 1918 | WFIFOB(fd,4) = ATHENA_REVISION; |
---|
| 1919 | WFIFOB(fd,5) = ATHENA_RELEASE_FLAG; |
---|
| 1920 | WFIFOB(fd,6) = ATHENA_OFFICIAL_FLAG; |
---|
| 1921 | WFIFOB(fd,7) = ATHENA_SERVER_LOGIN; |
---|
| 1922 | WFIFOW(fd,8) = ATHENA_MOD_VERSION; |
---|
| 1923 | WFIFOSET(fd,10); |
---|
| 1924 | break; |
---|
| 1925 | |
---|
| 1926 | case 0x7918: // Request for administation login |
---|
| 1927 | if ((int)RFIFOREST(fd) < 4 || (int)RFIFOREST(fd) < ((RFIFOW(fd,2) == 0) ? 28 : 20)) |
---|
| 1928 | return 0; |
---|
| 1929 | WFIFOW(fd,0) = 0x7919; |
---|
| 1930 | WFIFOB(fd,2) = 1; |
---|
| 1931 | if( session[fd]->client_addr != admin_allowed_ip ) { |
---|
| 1932 | ShowNotice("'ladmin'-login: Connection in administration mode refused: IP isn't authorised (ladmin_allow, ip: %s).\n", ip); |
---|
| 1933 | } else { |
---|
| 1934 | struct login_session_data *ld = (struct login_session_data*)session[fd]->session_data; |
---|
| 1935 | if (RFIFOW(fd,2) == 0) { // non encrypted password |
---|
| 1936 | char password[25]; |
---|
| 1937 | memcpy(password, RFIFOP(fd,4), 24); |
---|
| 1938 | password[24] = '\0'; |
---|
| 1939 | remove_control_chars(password); |
---|
| 1940 | if( !admin_state ) |
---|
| 1941 | ShowNotice("'ladmin'-login: Connection in administration mode REFUSED - remote administration is disabled (non encrypted password: %s, ip: %s)\n", password, ip); |
---|
| 1942 | else |
---|
| 1943 | if( strcmp(password, admin_pass) != 0) |
---|
| 1944 | ShowNotice("'ladmin'-login: Connection in administration mode REFUSED - invalid password (non encrypted password: %s, ip: %s)\n", password, ip); |
---|
| 1945 | else { |
---|
| 1946 | // If remote administration is enabled and password sent by client matches password read from login server configuration file |
---|
| 1947 | ShowNotice("'ladmin'-login: Connection in administration mode accepted (non encrypted password: %s, ip: %s)\n", password, ip); |
---|
| 1948 | WFIFOB(fd,2) = 0; |
---|
| 1949 | session[fd]->func_parse = parse_admin; |
---|
| 1950 | } |
---|
| 1951 | } else { // encrypted password |
---|
| 1952 | if (!ld) |
---|
| 1953 | ShowError("'ladmin'-login: error! MD5 key not created/requested for an administration login.\n"); |
---|
| 1954 | else { |
---|
| 1955 | char md5str[64] = "", md5bin[32]; |
---|
| 1956 | if (RFIFOW(fd,2) == 1) { |
---|
| 1957 | sprintf(md5str, "%s%s", ld->md5key, admin_pass); // 20 24 |
---|
| 1958 | } else if (RFIFOW(fd,2) == 2) { |
---|
| 1959 | sprintf(md5str, "%s%s", admin_pass, ld->md5key); // 24 20 |
---|
| 1960 | } |
---|
| 1961 | MD5_String2binary(md5str, md5bin); |
---|
| 1962 | if( !admin_state ) |
---|
| 1963 | ShowNotice("'ladmin'-login: Connection in administration mode REFUSED - remote administration is disabled (encrypted password, ip: %s)\n", ip); |
---|
| 1964 | else |
---|
| 1965 | if( memcmp(md5bin, RFIFOP(fd,4), 16) != 0 ) |
---|
| 1966 | ShowNotice("'ladmin'-login: Connection in administration mode REFUSED - invalid password (encrypted password, ip: %s)\n", ip); |
---|
| 1967 | else { |
---|
| 1968 | // If remote administration is enabled and password hash sent by client matches hash of password read from login server configuration file |
---|
| 1969 | ShowNotice("'ladmin'-login: Connection in administration mode accepted (encrypted password, ip: %s)\n", ip); |
---|
| 1970 | ShowNotice("Connection of a remote administration accepted (encrypted password).\n"); |
---|
| 1971 | WFIFOB(fd,2) = 0; |
---|
| 1972 | session[fd]->func_parse = parse_admin; |
---|
| 1973 | } |
---|
| 1974 | } |
---|
| 1975 | } |
---|
| 1976 | } |
---|
| 1977 | WFIFOSET(fd,3); |
---|
| 1978 | |
---|
| 1979 | RFIFOSKIP(fd, (RFIFOW(fd,2) == 0) ? 28 : 20); |
---|
| 1980 | break; |
---|
| 1981 | |
---|
| 1982 | default: |
---|
| 1983 | ShowNotice("Abnormal end of connection (ip: %s): Unknown packet 0x%x\n", ip, command); |
---|
| 1984 | set_eof(fd); |
---|
| 1985 | return 0; |
---|
| 1986 | } |
---|
| 1987 | } |
---|
| 1988 | |
---|
| 1989 | RFIFOSKIP(fd,RFIFOREST(fd)); |
---|
| 1990 | return 0; |
---|
| 1991 | } |
---|
| 1992 | |
---|
| 1993 | //----------------------- |
---|
| 1994 | // Console Command Parser [Wizputer] |
---|
| 1995 | //----------------------- |
---|
| 1996 | int parse_console(char* buf) |
---|
| 1997 | { |
---|
| 1998 | char command[256]; |
---|
| 1999 | |
---|
| 2000 | memset(command, 0, sizeof(command)); |
---|
| 2001 | |
---|
| 2002 | sscanf(buf, "%[^\n]", command); |
---|
| 2003 | |
---|
| 2004 | ShowInfo("Console command :%s", command); |
---|
| 2005 | |
---|
| 2006 | if( strcmpi("shutdown", command) == 0 || |
---|
| 2007 | strcmpi("exit", command) == 0 || |
---|
| 2008 | strcmpi("quit", command) == 0 || |
---|
| 2009 | strcmpi("end", command) == 0 ) |
---|
| 2010 | runflag = 0; |
---|
| 2011 | else |
---|
| 2012 | if( strcmpi("alive", command) == 0 || |
---|
| 2013 | strcmpi("status", command) == 0 ) |
---|
| 2014 | ShowInfo(CL_CYAN"Console: "CL_BOLD"I'm Alive."CL_RESET"\n"); |
---|
| 2015 | else |
---|
| 2016 | if( strcmpi("help", command) == 0 ) { |
---|
| 2017 | ShowInfo(CL_BOLD"Help of commands:"CL_RESET"\n"); |
---|
| 2018 | ShowInfo(" To shutdown the server:\n"); |
---|
| 2019 | ShowInfo(" 'shutdown|exit|quit|end'\n"); |
---|
| 2020 | ShowInfo(" To know if server is alive:\n"); |
---|
| 2021 | ShowInfo(" 'alive|status'\n"); |
---|
| 2022 | } |
---|
| 2023 | |
---|
| 2024 | return 0; |
---|
| 2025 | } |
---|
| 2026 | |
---|
| 2027 | static int online_data_cleanup_sub(DBKey key, void *data, va_list ap) |
---|
| 2028 | { |
---|
| 2029 | struct online_login_data *character= (struct online_login_data*)data; |
---|
| 2030 | if (character->char_server == -2) //Unknown server.. set them offline |
---|
| 2031 | remove_online_user(character->account_id); |
---|
| 2032 | return 0; |
---|
| 2033 | } |
---|
| 2034 | |
---|
| 2035 | static int online_data_cleanup(int tid, unsigned int tick, int id, intptr data) |
---|
| 2036 | { |
---|
| 2037 | online_db->foreach(online_db, online_data_cleanup_sub); |
---|
| 2038 | return 0; |
---|
| 2039 | } |
---|
| 2040 | |
---|
| 2041 | //---------------------------------- |
---|
| 2042 | // Reading Lan Support configuration |
---|
| 2043 | //---------------------------------- |
---|
| 2044 | int login_lan_config_read(const char *lancfgName) |
---|
| 2045 | { |
---|
| 2046 | FILE *fp; |
---|
| 2047 | int line_num = 0; |
---|
| 2048 | char line[1024], w1[64], w2[64], w3[64], w4[64]; |
---|
| 2049 | |
---|
| 2050 | if((fp = fopen(lancfgName, "r")) == NULL) { |
---|
| 2051 | ShowWarning("LAN Support configuration file is not found: %s\n", lancfgName); |
---|
| 2052 | return 1; |
---|
| 2053 | } |
---|
| 2054 | |
---|
| 2055 | ShowInfo("Reading the configuration file %s...\n", lancfgName); |
---|
| 2056 | |
---|
| 2057 | while(fgets(line, sizeof(line), fp)) |
---|
| 2058 | { |
---|
| 2059 | line_num++; |
---|
| 2060 | if ((line[0] == '/' && line[1] == '/') || line[0] == '\n' || line[1] == '\n') |
---|
| 2061 | continue; |
---|
| 2062 | |
---|
| 2063 | if(sscanf(line,"%[^:]: %[^:]:%[^:]:%[^\r\n]", w1, w2, w3, w4) != 4) |
---|
| 2064 | { |
---|
| 2065 | ShowWarning("Error syntax of configuration file %s in line %d.\n", lancfgName, line_num); |
---|
| 2066 | continue; |
---|
| 2067 | } |
---|
| 2068 | |
---|
| 2069 | if( strcmpi(w1, "subnet") == 0 ) |
---|
| 2070 | { |
---|
| 2071 | subnet[subnet_count].mask = str2ip(w2); |
---|
| 2072 | subnet[subnet_count].char_ip = str2ip(w3); |
---|
| 2073 | subnet[subnet_count].map_ip = str2ip(w4); |
---|
| 2074 | |
---|
| 2075 | if( (subnet[subnet_count].char_ip & subnet[subnet_count].mask) != (subnet[subnet_count].map_ip & subnet[subnet_count].mask) ) |
---|
| 2076 | { |
---|
| 2077 | ShowError("%s: Configuration Error: The char server (%s) and map server (%s) belong to different subnetworks!\n", lancfgName, w3, w4); |
---|
| 2078 | continue; |
---|
| 2079 | } |
---|
| 2080 | |
---|
| 2081 | subnet_count++; |
---|
| 2082 | } |
---|
| 2083 | } |
---|
| 2084 | |
---|
| 2085 | ShowStatus("Read information about %d subnetworks.\n", subnet_count); |
---|
| 2086 | |
---|
| 2087 | fclose(fp); |
---|
| 2088 | return 0; |
---|
| 2089 | } |
---|
| 2090 | |
---|
| 2091 | //----------------------------------- |
---|
| 2092 | // Reading main configuration file |
---|
| 2093 | //----------------------------------- |
---|
| 2094 | int login_config_read(const char* cfgName) |
---|
| 2095 | { |
---|
| 2096 | char line[1024], w1[1024], w2[1024]; |
---|
| 2097 | FILE* fp = fopen(cfgName, "r"); |
---|
| 2098 | if (fp == NULL) { |
---|
| 2099 | ShowError("Configuration file (%s) not found.\n", cfgName); |
---|
| 2100 | return 1; |
---|
| 2101 | } |
---|
| 2102 | ShowInfo("Reading configuration file %s...\n", cfgName); |
---|
| 2103 | while(fgets(line, sizeof(line), fp)) |
---|
| 2104 | { |
---|
| 2105 | if (line[0] == '/' && line[1] == '/') |
---|
| 2106 | continue; |
---|
| 2107 | |
---|
| 2108 | if (sscanf(line, "%[^:]: %[^\r\n]", w1, w2) < 2) |
---|
| 2109 | continue; |
---|
| 2110 | |
---|
| 2111 | if(!strcmpi(w1,"timestamp_format")) |
---|
| 2112 | strncpy(timestamp_format, w2, 20); |
---|
| 2113 | else if(!strcmpi(w1,"stdout_with_ansisequence")) |
---|
| 2114 | stdout_with_ansisequence = config_switch(w2); |
---|
| 2115 | else if(!strcmpi(w1,"console_silent")) { |
---|
| 2116 | ShowInfo("Console Silent Setting: %d\n", atoi(w2)); |
---|
| 2117 | msg_silent = atoi(w2); |
---|
| 2118 | } |
---|
| 2119 | else if( !strcmpi(w1, "bind_ip") ) { |
---|
| 2120 | char ip_str[16]; |
---|
| 2121 | login_config.login_ip = host2ip(w2); |
---|
| 2122 | if( login_config.login_ip ) |
---|
| 2123 | ShowStatus("Login server binding IP address : %s -> %s\n", w2, ip2str(login_config.login_ip, ip_str)); |
---|
| 2124 | } |
---|
| 2125 | else if( !strcmpi(w1, "login_port") ) { |
---|
| 2126 | login_config.login_port = (uint16)atoi(w2); |
---|
| 2127 | ShowStatus("set login_port : %s\n",w2); |
---|
| 2128 | } |
---|
| 2129 | else if(!strcmpi(w1, "log_login")) |
---|
| 2130 | login_config.log_login = (bool)config_switch(w2); |
---|
| 2131 | |
---|
| 2132 | else if (strcmpi(w1, "admin_state") == 0) { |
---|
| 2133 | admin_state = (bool)config_switch(w2); |
---|
| 2134 | } else if (strcmpi(w1, "admin_pass") == 0) { |
---|
| 2135 | memset(admin_pass, 0, sizeof(admin_pass)); |
---|
| 2136 | strncpy(admin_pass, w2, sizeof(admin_pass)); |
---|
| 2137 | admin_pass[sizeof(admin_pass)-1] = '\0'; |
---|
| 2138 | } else if (strcmpi(w1, "admin_allowed_ip") == 0) |
---|
| 2139 | admin_allowed_ip = host2ip(w2); |
---|
| 2140 | else if (strcmpi(w1, "account_filename") == 0) { |
---|
| 2141 | memset(account_filename, 0, sizeof(account_filename)); |
---|
| 2142 | strncpy(account_filename, w2, sizeof(account_filename)); |
---|
| 2143 | account_filename[sizeof(account_filename)-1] = '\0'; |
---|
| 2144 | } else if (strcmpi(w1, "gm_account_filename") == 0) { |
---|
| 2145 | memset(GM_account_filename, 0, sizeof(GM_account_filename)); |
---|
| 2146 | strncpy(GM_account_filename, w2, sizeof(GM_account_filename)); |
---|
| 2147 | GM_account_filename[sizeof(GM_account_filename)-1] = '\0'; |
---|
| 2148 | } |
---|
| 2149 | else if (strcmpi(w1, "gm_account_filename_check_timer") == 0) |
---|
| 2150 | gm_account_filename_check_timer = atoi(w2); |
---|
| 2151 | |
---|
| 2152 | else if(!strcmpi(w1, "new_account")) |
---|
| 2153 | login_config.new_account_flag = (bool)config_switch(w2); |
---|
| 2154 | else if(!strcmpi(w1, "start_limited_time")) |
---|
| 2155 | login_config.start_limited_time = atoi(w2); |
---|
| 2156 | else if(!strcmpi(w1, "check_client_version")) |
---|
| 2157 | login_config.check_client_version = (bool)config_switch(w2); |
---|
| 2158 | else if(!strcmpi(w1, "client_version_to_connect")) |
---|
| 2159 | login_config.client_version_to_connect = atoi(w2); |
---|
| 2160 | else if(!strcmpi(w1, "use_MD5_passwords")) |
---|
| 2161 | login_config.use_md5_passwds = (bool)config_switch(w2); |
---|
| 2162 | else if(!strcmpi(w1, "min_level_to_connect")) |
---|
| 2163 | login_config.min_level_to_connect = atoi(w2); |
---|
| 2164 | else if(!strcmpi(w1, "date_format")) |
---|
| 2165 | safestrncpy(login_config.date_format, w2, sizeof(login_config.date_format)); |
---|
| 2166 | else if(!strcmpi(w1, "console")) |
---|
| 2167 | login_config.console = (bool)config_switch(w2); |
---|
| 2168 | // else if(!strcmpi(w1, "case_sensitive")) |
---|
| 2169 | // login_config.case_sensitive = config_switch(w2); |
---|
| 2170 | else if(!strcmpi(w1, "allowed_regs")) //account flood protection system |
---|
| 2171 | allowed_regs = atoi(w2); |
---|
| 2172 | else if(!strcmpi(w1, "time_allowed")) |
---|
| 2173 | time_allowed = atoi(w2); |
---|
| 2174 | else if(!strcmpi(w1, "online_check")) |
---|
| 2175 | login_config.online_check = (bool)config_switch(w2); |
---|
| 2176 | else if(!strcmpi(w1, "use_dnsbl")) |
---|
| 2177 | login_config.use_dnsbl = (bool)config_switch(w2); |
---|
| 2178 | else if(!strcmpi(w1, "dnsbl_servers")) |
---|
| 2179 | safestrncpy(login_config.dnsbl_servs, w2, sizeof(login_config.dnsbl_servs)); |
---|
| 2180 | else if(!strcmpi(w1, "ip_sync_interval")) |
---|
| 2181 | login_config.ip_sync_interval = (unsigned int)1000*60*atoi(w2); //w2 comes in minutes. |
---|
| 2182 | else if(!strcmpi(w1, "import")) |
---|
| 2183 | login_config_read(w2); |
---|
| 2184 | } |
---|
| 2185 | fclose(fp); |
---|
| 2186 | ShowInfo("Finished reading %s.\n", cfgName); |
---|
| 2187 | return 0; |
---|
| 2188 | } |
---|
| 2189 | |
---|
| 2190 | //------------------------------------- |
---|
| 2191 | // Displaying of configuration warnings |
---|
| 2192 | //------------------------------------- |
---|
| 2193 | void display_conf_warnings(void) |
---|
| 2194 | { |
---|
| 2195 | if( admin_state ) { |
---|
| 2196 | if (admin_pass[0] == '\0') { |
---|
| 2197 | ShowWarning("Administrator password is void (admin_pass).\n"); |
---|
| 2198 | } else if (strcmp(admin_pass, "admin") == 0) { |
---|
| 2199 | ShowWarning("You are using the default administrator password (admin_pass).\n"); |
---|
| 2200 | ShowWarning(" We highly recommend that you change it.\n"); |
---|
| 2201 | } |
---|
| 2202 | } |
---|
| 2203 | |
---|
| 2204 | if (gm_account_filename_check_timer < 0) { |
---|
| 2205 | ShowWarning("Invalid value for gm_account_filename_check_timer parameter. Setting to 15 sec (default).\n"); |
---|
| 2206 | gm_account_filename_check_timer = 15; |
---|
| 2207 | } else if (gm_account_filename_check_timer == 1) { |
---|
| 2208 | ShowWarning("Invalid value for gm_account_filename_check_timer parameter. Setting to 2 sec (minimum value).\n"); |
---|
| 2209 | gm_account_filename_check_timer = 2; |
---|
| 2210 | } |
---|
| 2211 | |
---|
| 2212 | if (login_config.min_level_to_connect < 0) { // 0: all players, 1-99 at least gm level x |
---|
| 2213 | ShowWarning("Invalid value for min_level_to_connect (%d) parameter -> setting 0 (any player).\n", login_config.min_level_to_connect); |
---|
| 2214 | login_config.min_level_to_connect = 0; |
---|
| 2215 | } else if (login_config.min_level_to_connect > 99) { // 0: all players, 1-99 at least gm level x |
---|
| 2216 | ShowWarning("Invalid value for min_level_to_connect (%d) parameter -> setting to 99 (only GM level 99)\n", login_config.min_level_to_connect); |
---|
| 2217 | login_config.min_level_to_connect = 99; |
---|
| 2218 | } |
---|
| 2219 | |
---|
| 2220 | if (login_config.start_limited_time < -1) { // -1: create unlimited account, 0 or more: additionnal sec from now to create limited time |
---|
| 2221 | ShowWarning("Invalid value for start_limited_time parameter\n"); |
---|
| 2222 | ShowWarning(" -> setting to -1 (new accounts are created with unlimited time).\n"); |
---|
| 2223 | login_config.start_limited_time = -1; |
---|
| 2224 | } |
---|
| 2225 | |
---|
| 2226 | return; |
---|
| 2227 | } |
---|
| 2228 | |
---|
| 2229 | void login_set_defaults() |
---|
| 2230 | { |
---|
| 2231 | login_config.login_ip = INADDR_ANY; |
---|
| 2232 | login_config.login_port = 6900; |
---|
| 2233 | login_config.ip_sync_interval = 0; |
---|
| 2234 | login_config.log_login = true; |
---|
| 2235 | safestrncpy(login_config.date_format, "%Y-%m-%d %H:%M:%S", sizeof(login_config.date_format)); |
---|
| 2236 | login_config.console = false; |
---|
| 2237 | login_config.new_account_flag = true; |
---|
| 2238 | // login_config.case_sensitive = true; |
---|
| 2239 | login_config.use_md5_passwds = false; |
---|
| 2240 | // login_config.login_gm_read = true; |
---|
| 2241 | login_config.min_level_to_connect = 0; |
---|
| 2242 | login_config.online_check = true; |
---|
| 2243 | login_config.check_client_version = false; |
---|
| 2244 | login_config.client_version_to_connect = 20; |
---|
| 2245 | |
---|
| 2246 | // login_config.ipban = true; |
---|
| 2247 | // login_config.dynamic_pass_failure_ban = true; |
---|
| 2248 | // login_config.dynamic_pass_failure_ban_interval = 5; |
---|
| 2249 | // login_config.dynamic_pass_failure_ban_limit = 7; |
---|
| 2250 | // login_config.dynamic_pass_failure_ban_duration = 5; |
---|
| 2251 | login_config.use_dnsbl = false; |
---|
| 2252 | safestrncpy(login_config.dnsbl_servs, "", sizeof(login_config.dnsbl_servs)); |
---|
| 2253 | } |
---|
| 2254 | |
---|
| 2255 | //-------------------------------------- |
---|
| 2256 | // Function called at exit of the server |
---|
| 2257 | //-------------------------------------- |
---|
| 2258 | void do_final(void) |
---|
| 2259 | { |
---|
| 2260 | int i, fd; |
---|
| 2261 | ShowStatus("Terminating...\n"); |
---|
| 2262 | |
---|
| 2263 | mmo_auth_sync(); |
---|
| 2264 | online_db->destroy(online_db, NULL); |
---|
| 2265 | auth_db->destroy(auth_db, NULL); |
---|
| 2266 | |
---|
| 2267 | if(auth_dat) aFree(auth_dat); |
---|
| 2268 | if(gm_account_db) aFree(gm_account_db); |
---|
| 2269 | |
---|
| 2270 | for (i = 0; i < MAX_SERVERS; i++) { |
---|
| 2271 | if ((fd = server[i].fd) >= 0) { |
---|
| 2272 | memset(&server[i], 0, sizeof(struct mmo_char_server)); |
---|
| 2273 | server[i].fd = -1; |
---|
| 2274 | do_close(fd); |
---|
| 2275 | } |
---|
| 2276 | } |
---|
| 2277 | do_close(login_fd); |
---|
| 2278 | |
---|
| 2279 | ShowStatus("Finished.\n"); |
---|
| 2280 | } |
---|
| 2281 | |
---|
| 2282 | //------------------------------ |
---|
| 2283 | // Function called when the server |
---|
| 2284 | // has received a crash signal. |
---|
| 2285 | //------------------------------ |
---|
| 2286 | void do_abort(void) |
---|
| 2287 | { |
---|
| 2288 | } |
---|
| 2289 | |
---|
| 2290 | void set_server_type(void) |
---|
| 2291 | { |
---|
| 2292 | SERVER_TYPE = ATHENA_SERVER_LOGIN; |
---|
| 2293 | } |
---|
| 2294 | |
---|
| 2295 | //------------------------------ |
---|
| 2296 | // Login server initialization |
---|
| 2297 | //------------------------------ |
---|
| 2298 | int do_init(int argc, char** argv) |
---|
| 2299 | { |
---|
| 2300 | int i; |
---|
| 2301 | |
---|
| 2302 | login_set_defaults(); |
---|
| 2303 | |
---|
| 2304 | // read login-server configuration |
---|
| 2305 | login_config_read((argc > 1) ? argv[1] : LOGIN_CONF_NAME); |
---|
| 2306 | display_conf_warnings(); // not in login_config_read, because we can use 'import' option, and display same message twice or more |
---|
| 2307 | login_lan_config_read((argc > 2) ? argv[2] : LAN_CONF_NAME); |
---|
| 2308 | |
---|
| 2309 | srand((unsigned int)time(NULL)); |
---|
| 2310 | |
---|
| 2311 | for( i = 0; i < MAX_SERVERS; i++ ) |
---|
| 2312 | server[i].fd = -1; |
---|
| 2313 | |
---|
| 2314 | // Accounts database init |
---|
| 2315 | mmo_auth_init(); |
---|
| 2316 | |
---|
| 2317 | // Online user database init |
---|
| 2318 | online_db = idb_alloc(DB_OPT_RELEASE_DATA); |
---|
| 2319 | add_timer_func_list(waiting_disconnect_timer, "waiting_disconnect_timer"); |
---|
| 2320 | |
---|
| 2321 | // Interserver auth init |
---|
| 2322 | auth_db = idb_alloc(DB_OPT_RELEASE_DATA); |
---|
| 2323 | |
---|
| 2324 | // Read account information. |
---|
| 2325 | read_gm_account(); |
---|
| 2326 | |
---|
| 2327 | // set default parser as parse_login function |
---|
| 2328 | set_defaultparse(parse_login); |
---|
| 2329 | |
---|
| 2330 | add_timer_func_list(check_auth_sync, "check_auth_sync"); |
---|
| 2331 | add_timer_interval(gettick() + 60000, check_auth_sync, 0, 0, 60000); // every 60 sec we check if we must save accounts file (only if necessary to save) |
---|
| 2332 | |
---|
| 2333 | // every x sec we check if gm file has been changed |
---|
| 2334 | if( gm_account_filename_check_timer ) { |
---|
| 2335 | add_timer_func_list(check_GM_file, "check_GM_file"); |
---|
| 2336 | add_timer_interval(gettick() + gm_account_filename_check_timer * 1000, check_GM_file, 0, 0, gm_account_filename_check_timer * 1000); |
---|
| 2337 | } |
---|
| 2338 | |
---|
| 2339 | // every 10 minutes cleanup online account db. |
---|
| 2340 | add_timer_func_list(online_data_cleanup, "online_data_cleanup"); |
---|
| 2341 | add_timer_interval(gettick() + 600*1000, online_data_cleanup, 0, 0, 600*1000); |
---|
| 2342 | |
---|
| 2343 | // add timer to detect ip address change and perform update |
---|
| 2344 | if (login_config.ip_sync_interval) { |
---|
| 2345 | add_timer_func_list(sync_ip_addresses, "sync_ip_addresses"); |
---|
| 2346 | add_timer_interval(gettick() + login_config.ip_sync_interval, sync_ip_addresses, 0, 0, login_config.ip_sync_interval); |
---|
| 2347 | } |
---|
| 2348 | |
---|
| 2349 | if( login_config.console ) |
---|
| 2350 | { |
---|
| 2351 | //##TODO invoke a CONSOLE_START plugin event |
---|
| 2352 | } |
---|
| 2353 | |
---|
| 2354 | new_reg_tick = gettick(); |
---|
| 2355 | |
---|
| 2356 | // server port open & binding |
---|
| 2357 | login_fd = make_listen_bind(login_config.login_ip, login_config.login_port); |
---|
| 2358 | |
---|
| 2359 | ShowStatus("The login-server is "CL_GREEN"ready"CL_RESET" (Server is listening on the port %u).\n\n", login_config.login_port); |
---|
| 2360 | |
---|
| 2361 | return 0; |
---|
| 2362 | } |
---|