3 Copyright (C) 2015 nerzhul, Loic Blot <loic.blot@unix-experience.fr>
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU Lesser General Public License as published by
7 the Free Software Foundation; either version 2.1 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU Lesser General Public License for more details.
15 You should have received a copy of the GNU Lesser General Public License along
16 with this program; if not, write to the Free Software Foundation, Inc.,
17 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
20 #include "chatmessage.h"
25 #include "modchannels.h"
27 #include "remoteplayer.h"
28 #include "rollback_interface.h"
29 #include "scripting_server.h"
33 #include "network/connection.h"
34 #include "network/networkprotocol.h"
35 #include "network/serveropcodes.h"
36 #include "server/player_sao.h"
37 #include "server/serverinventorymgr.h"
38 #include "util/auth.h"
39 #include "util/base64.h"
40 #include "util/pointedthing.h"
41 #include "util/serialize.h"
44 void Server::handleCommand_Deprecated(NetworkPacket* pkt)
46 infostream << "Server: " << toServerCommandTable[pkt->getCommand()].name
47 << " not supported anymore" << std::endl;
50 void Server::handleCommand_Init(NetworkPacket* pkt)
53 if(pkt->getSize() < 1)
56 session_t peer_id = pkt->getPeerId();
57 RemoteClient *client = getClient(peer_id, CS_Created);
61 Address address = getPeerAddress(peer_id);
62 addr_s = address.serializeString();
64 catch (con::PeerNotFoundException &e) {
66 * no peer for this packet found
67 * most common reason is peer timeout, e.g. peer didn't
68 * respond for some time, your server was overloaded or
71 infostream << "Server::ProcessData(): Canceling: peer " << peer_id <<
72 " not found" << std::endl;
76 // If net_proto_version is set, this client has already been handled
77 if (client->getState() > CS_Created) {
78 verbosestream << "Server: Ignoring multiple TOSERVER_INITs from " <<
79 addr_s << " (peer_id=" << peer_id << ")" << std::endl;
83 verbosestream << "Server: Got TOSERVER_INIT from " << addr_s <<
84 " (peer_id=" << peer_id << ")" << std::endl;
86 // Do not allow multiple players in simple singleplayer mode.
87 // This isn't a perfect way to do it, but will suffice for now
88 if (m_simple_singleplayer_mode && m_clients.getClientIDs().size() > 1) {
89 infostream << "Server: Not allowing another client (" << addr_s <<
90 ") to connect in simple singleplayer mode" << std::endl;
91 DenyAccess(peer_id, SERVER_ACCESSDENIED_SINGLEPLAYER);
95 // First byte after command is maximum supported
96 // serialization version
99 u16 min_net_proto_version = 0;
100 u16 max_net_proto_version;
101 std::string playerName;
103 *pkt >> client_max >> supp_compr_modes >> min_net_proto_version
104 >> max_net_proto_version >> playerName;
106 u8 our_max = SER_FMT_VER_HIGHEST_READ;
107 // Use the highest version supported by both
108 u8 depl_serial_v = std::min(client_max, our_max);
109 // If it's lower than the lowest supported, give up.
110 if (depl_serial_v < SER_FMT_VER_LOWEST_READ)
111 depl_serial_v = SER_FMT_VER_INVALID;
113 if (depl_serial_v == SER_FMT_VER_INVALID) {
114 actionstream << "Server: A mismatched client tried to connect from " <<
115 addr_s << " ser_fmt_max=" << (int)client_max << std::endl;
116 DenyAccess(peer_id, SERVER_ACCESSDENIED_WRONG_VERSION);
120 client->setPendingSerializationVersion(depl_serial_v);
123 Read and check network protocol version
126 u16 net_proto_version = 0;
128 // Figure out a working version if it is possible at all
129 if (max_net_proto_version >= SERVER_PROTOCOL_VERSION_MIN ||
130 min_net_proto_version <= SERVER_PROTOCOL_VERSION_MAX) {
131 // If maximum is larger than our maximum, go with our maximum
132 if (max_net_proto_version > SERVER_PROTOCOL_VERSION_MAX)
133 net_proto_version = SERVER_PROTOCOL_VERSION_MAX;
134 // Else go with client's maximum
136 net_proto_version = max_net_proto_version;
139 verbosestream << "Server: " << addr_s << ": Protocol version: min: "
140 << min_net_proto_version << ", max: " << max_net_proto_version
141 << ", chosen: " << net_proto_version << std::endl;
143 client->net_proto_version = net_proto_version;
145 if ((g_settings->getBool("strict_protocol_version_checking") &&
146 net_proto_version != LATEST_PROTOCOL_VERSION) ||
147 net_proto_version < SERVER_PROTOCOL_VERSION_MIN ||
148 net_proto_version > SERVER_PROTOCOL_VERSION_MAX) {
149 actionstream << "Server: A mismatched client tried to connect from " <<
150 addr_s << " proto_max=" << (int)max_net_proto_version << std::endl;
151 DenyAccess(peer_id, SERVER_ACCESSDENIED_WRONG_VERSION);
158 const char* playername = playerName.c_str();
160 size_t pns = playerName.size();
161 if (pns == 0 || pns > PLAYERNAME_SIZE) {
162 actionstream << "Server: Player with " <<
163 ((pns > PLAYERNAME_SIZE) ? "a too long" : "an empty") <<
164 " name tried to connect from " << addr_s << std::endl;
165 DenyAccess(peer_id, SERVER_ACCESSDENIED_WRONG_NAME);
169 if (!string_allowed(playerName, PLAYERNAME_ALLOWED_CHARS)) {
170 actionstream << "Server: Player with an invalid name tried to connect "
171 "from " << addr_s << std::endl;
172 DenyAccess(peer_id, SERVER_ACCESSDENIED_WRONG_CHARS_IN_NAME);
176 m_clients.setPlayerName(peer_id, playername);
177 //TODO (later) case insensitivity
179 std::string legacyPlayerNameCasing = playerName;
181 if (!isSingleplayer() && strcasecmp(playername, "singleplayer") == 0) {
182 actionstream << "Server: Player with the name \"singleplayer\" tried "
183 "to connect from " << addr_s << std::endl;
184 DenyAccess(peer_id, SERVER_ACCESSDENIED_WRONG_NAME);
190 if (m_script->on_prejoinplayer(playername, addr_s, &reason)) {
191 actionstream << "Server: Player with the name \"" << playerName <<
192 "\" tried to connect from " << addr_s <<
193 " but it was disallowed for the following reason: " << reason <<
195 DenyAccess(peer_id, SERVER_ACCESSDENIED_CUSTOM_STRING, reason);
200 infostream << "Server: New connection: \"" << playerName << "\" from " <<
201 addr_s << " (peer_id=" << peer_id << ")" << std::endl;
203 // Enforce user limit.
204 // Don't enforce for users that have some admin right or mod permits it.
205 if (m_clients.isUserLimitReached() &&
206 playername != g_settings->get("name") &&
207 !m_script->can_bypass_userlimit(playername, addr_s)) {
208 actionstream << "Server: " << playername << " tried to join from " <<
209 addr_s << ", but there are already max_users=" <<
210 g_settings->getU16("max_users") << " players." << std::endl;
211 DenyAccess(peer_id, SERVER_ACCESSDENIED_TOO_MANY_USERS);
216 Compose auth methods for answer
218 std::string encpwd; // encrypted Password field for the user
219 bool has_auth = m_script->getAuth(playername, &encpwd, NULL);
222 client->chosen_mech = AUTH_MECHANISM_NONE;
225 std::vector<std::string> pwd_components = str_split(encpwd, '#');
226 if (pwd_components.size() == 4) {
227 if (pwd_components[1] == "1") { // 1 means srp
228 auth_mechs |= AUTH_MECHANISM_SRP;
229 client->enc_pwd = encpwd;
231 actionstream << "User " << playername << " tried to log in, "
232 "but password field was invalid (unknown mechcode)." <<
234 DenyAccess(peer_id, SERVER_ACCESSDENIED_SERVER_FAIL);
237 } else if (base64_is_valid(encpwd)) {
238 auth_mechs |= AUTH_MECHANISM_LEGACY_PASSWORD;
239 client->enc_pwd = encpwd;
241 actionstream << "User " << playername << " tried to log in, but "
242 "password field was invalid (invalid base64)." << std::endl;
243 DenyAccess(peer_id, SERVER_ACCESSDENIED_SERVER_FAIL);
247 std::string default_password = g_settings->get("default_password");
248 if (default_password.length() == 0) {
249 auth_mechs |= AUTH_MECHANISM_FIRST_SRP;
251 // Take care of default passwords.
252 client->enc_pwd = get_encoded_srp_verifier(playerName, default_password);
253 auth_mechs |= AUTH_MECHANISM_SRP;
254 // Allocate player in db, but only on successful login.
255 client->create_player_on_auth_success = true;
260 Answer with a TOCLIENT_HELLO
263 verbosestream << "Sending TOCLIENT_HELLO with auth method field: "
264 << auth_mechs << std::endl;
266 NetworkPacket resp_pkt(TOCLIENT_HELLO,
267 1 + 4 + legacyPlayerNameCasing.size(), peer_id);
269 u16 depl_compress_mode = NETPROTO_COMPRESSION_NONE;
270 resp_pkt << depl_serial_v << depl_compress_mode << net_proto_version
271 << auth_mechs << legacyPlayerNameCasing;
275 client->allowed_auth_mechs = auth_mechs;
276 client->setDeployedCompressionMode(depl_compress_mode);
278 m_clients.event(peer_id, CSE_Hello);
281 void Server::handleCommand_Init2(NetworkPacket* pkt)
283 session_t peer_id = pkt->getPeerId();
284 verbosestream << "Server: Got TOSERVER_INIT2 from " << peer_id << std::endl;
286 m_clients.event(peer_id, CSE_GotInit2);
287 u16 protocol_version = m_clients.getProtocolVersion(peer_id);
290 if (pkt->getSize() > 0)
294 Send some initialization data
297 infostream << "Server: Sending content to " << getPlayerName(peer_id) <<
300 // Send item definitions
301 SendItemDef(peer_id, m_itemdef, protocol_version);
303 // Send node definitions
304 SendNodeDef(peer_id, m_nodedef, protocol_version);
306 m_clients.event(peer_id, CSE_SetDefinitionsSent);
308 // Send media announcement
309 sendMediaAnnouncement(peer_id, lang);
311 RemoteClient *client = getClient(peer_id, CS_InitDone);
313 // Keep client language for server translations
314 client->setLangCode(lang);
316 // Send active objects
318 PlayerSAO *sao = getPlayerSAO(peer_id);
320 SendActiveObjectRemoveAdd(client, sao);
323 // Send detached inventories
324 sendDetachedInventories(peer_id, false);
326 // Send player movement settings
327 SendMovement(peer_id);
330 u16 time = m_env->getTimeOfDay();
331 float time_speed = g_settings->getFloat("time_speed");
332 SendTimeOfDay(peer_id, time, time_speed);
334 SendCSMRestrictionFlags(peer_id);
336 // Warnings about protocol version can be issued here
337 if (client->net_proto_version < LATEST_PROTOCOL_VERSION) {
338 SendChatMessage(peer_id, ChatMessage(CHATMESSAGE_TYPE_SYSTEM,
339 L"# Server: WARNING: YOUR CLIENT'S VERSION MAY NOT BE FULLY COMPATIBLE "
340 L"WITH THIS SERVER!"));
344 void Server::handleCommand_RequestMedia(NetworkPacket* pkt)
346 std::vector<std::string> tosend;
351 session_t peer_id = pkt->getPeerId();
352 infostream << "Sending " << numfiles << " files to " <<
353 getPlayerName(peer_id) << std::endl;
354 verbosestream << "TOSERVER_REQUEST_MEDIA: " << std::endl;
356 for (u16 i = 0; i < numfiles; i++) {
361 tosend.push_back(name);
362 verbosestream << "TOSERVER_REQUEST_MEDIA: requested file "
363 << name << std::endl;
366 sendRequestedMedia(peer_id, tosend);
369 void Server::handleCommand_ClientReady(NetworkPacket* pkt)
371 session_t peer_id = pkt->getPeerId();
373 PlayerSAO* playersao = StageTwoClientInit(peer_id);
375 if (playersao == NULL) {
376 errorstream << "TOSERVER_CLIENT_READY stage 2 client init failed "
377 "peer_id=" << peer_id << std::endl;
378 DisconnectPeer(peer_id);
383 if (pkt->getSize() < 8) {
384 errorstream << "TOSERVER_CLIENT_READY client sent inconsistent data, "
385 "disconnecting peer_id: " << peer_id << std::endl;
386 DisconnectPeer(peer_id);
390 u8 major_ver, minor_ver, patch_ver, reserved;
391 std::string full_ver;
392 *pkt >> major_ver >> minor_ver >> patch_ver >> reserved >> full_ver;
394 m_clients.setClientVersion(peer_id, major_ver, minor_ver, patch_ver,
397 if (pkt->getRemainingBytes() >= 2)
398 *pkt >> playersao->getPlayer()->formspec_version;
400 const std::vector<std::string> &players = m_clients.getPlayerNames();
401 NetworkPacket list_pkt(TOCLIENT_UPDATE_PLAYER_LIST, 0, peer_id);
402 list_pkt << (u8) PLAYER_LIST_INIT << (u16) players.size();
403 for (const std::string &player: players) {
406 m_clients.send(peer_id, 0, &list_pkt, true);
408 NetworkPacket notice_pkt(TOCLIENT_UPDATE_PLAYER_LIST, 0, PEER_ID_INEXISTENT);
409 // (u16) 1 + std::string represents a pseudo vector serialization representation
410 notice_pkt << (u8) PLAYER_LIST_ADD << (u16) 1 << std::string(playersao->getPlayer()->getName());
411 m_clients.sendToAll(¬ice_pkt);
412 m_clients.event(peer_id, CSE_SetClientReady);
415 m_script->getAuth(playersao->getPlayer()->getName(), nullptr, nullptr, &last_login);
416 m_script->on_joinplayer(playersao, last_login);
418 // Send shutdown timer if shutdown has been scheduled
419 if (m_shutdown_state.isTimerRunning()) {
420 SendChatMessage(peer_id, m_shutdown_state.getShutdownTimerMessage());
424 void Server::handleCommand_GotBlocks(NetworkPacket* pkt)
426 if (pkt->getSize() < 1)
440 RemoteClient *client = getClient(pkt->getPeerId());
442 if ((s16)pkt->getSize() < 1 + (int)count * 6) {
443 throw con::InvalidIncomingDataException
444 ("GOTBLOCKS length is too short");
447 for (u16 i = 0; i < count; i++) {
454 void Server::process_PlayerPos(RemotePlayer *player, PlayerSAO *playersao,
457 if (pkt->getRemainingBytes() < 12 + 12 + 4 + 4 + 4 + 1 + 1)
461 s32 f32pitch, f32yaw;
469 f32 pitch = (f32)f32pitch / 100.0f;
470 f32 yaw = (f32)f32yaw / 100.0f;
473 // default behavior (in case an old client doesn't send these)
479 fov = (f32)f32fov / 80.0f;
480 *pkt >> wanted_range;
482 v3f position((f32)ps.X / 100.0f, (f32)ps.Y / 100.0f, (f32)ps.Z / 100.0f);
483 v3f speed((f32)ss.X / 100.0f, (f32)ss.Y / 100.0f, (f32)ss.Z / 100.0f);
485 pitch = modulo360f(pitch);
486 yaw = wrapDegrees_0_360(yaw);
488 playersao->setBasePosition(position);
489 player->setSpeed(speed);
490 playersao->setLookPitch(pitch);
491 playersao->setPlayerYaw(yaw);
492 playersao->setFov(fov);
493 playersao->setWantedRange(wanted_range);
495 player->keyPressed = keyPressed;
496 player->control.up = (keyPressed & (0x1 << 0));
497 player->control.down = (keyPressed & (0x1 << 1));
498 player->control.left = (keyPressed & (0x1 << 2));
499 player->control.right = (keyPressed & (0x1 << 3));
500 player->control.jump = (keyPressed & (0x1 << 4));
501 player->control.aux1 = (keyPressed & (0x1 << 5));
502 player->control.sneak = (keyPressed & (0x1 << 6));
503 player->control.dig = (keyPressed & (0x1 << 7));
504 player->control.place = (keyPressed & (0x1 << 8));
505 player->control.zoom = (keyPressed & (0x1 << 9));
507 if (playersao->checkMovementCheat()) {
509 m_script->on_cheat(playersao, "moved_too_fast");
510 SendMovePlayer(pkt->getPeerId());
514 void Server::handleCommand_PlayerPos(NetworkPacket* pkt)
516 session_t peer_id = pkt->getPeerId();
517 RemotePlayer *player = m_env->getPlayer(peer_id);
518 if (player == NULL) {
520 "Server::ProcessData(): Canceling: No player for peer_id=" <<
521 peer_id << " disconnecting peer!" << std::endl;
522 DisconnectPeer(peer_id);
526 PlayerSAO *playersao = player->getPlayerSAO();
527 if (playersao == NULL) {
529 "Server::ProcessData(): Canceling: No player object for peer_id=" <<
530 peer_id << " disconnecting peer!" << std::endl;
531 DisconnectPeer(peer_id);
535 // If player is dead we don't care of this packet
536 if (playersao->isDead()) {
537 verbosestream << "TOSERVER_PLAYERPOS: " << player->getName()
538 << " is dead. Ignoring packet";
542 process_PlayerPos(player, playersao, pkt);
545 void Server::handleCommand_DeletedBlocks(NetworkPacket* pkt)
547 if (pkt->getSize() < 1)
561 RemoteClient *client = getClient(pkt->getPeerId());
563 if ((s16)pkt->getSize() < 1 + (int)count * 6) {
564 throw con::InvalidIncomingDataException
565 ("DELETEDBLOCKS length is too short");
568 for (u16 i = 0; i < count; i++) {
571 client->SetBlockNotSent(p);
575 void Server::handleCommand_InventoryAction(NetworkPacket* pkt)
577 session_t peer_id = pkt->getPeerId();
578 RemotePlayer *player = m_env->getPlayer(peer_id);
580 if (player == NULL) {
582 "Server::ProcessData(): Canceling: No player for peer_id=" <<
583 peer_id << " disconnecting peer!" << std::endl;
584 DisconnectPeer(peer_id);
588 PlayerSAO *playersao = player->getPlayerSAO();
589 if (playersao == NULL) {
591 "Server::ProcessData(): Canceling: No player object for peer_id=" <<
592 peer_id << " disconnecting peer!" << std::endl;
593 DisconnectPeer(peer_id);
597 // Strip command and create a stream
598 std::string datastring(pkt->getString(0), pkt->getSize());
599 verbosestream << "TOSERVER_INVENTORY_ACTION: data=" << datastring
601 std::istringstream is(datastring, std::ios_base::binary);
603 InventoryAction *a = InventoryAction::deSerialize(is);
605 infostream << "TOSERVER_INVENTORY_ACTION: "
606 << "InventoryAction::deSerialize() returned NULL"
611 // If something goes wrong, this player is to blame
612 RollbackScopeActor rollback_scope(m_rollback,
613 std::string("player:")+player->getName());
616 Note: Always set inventory not sent, to repair cases
617 where the client made a bad prediction.
621 Handle restrictions and special cases of the move action
623 if (a->getType() == IAction::Move) {
624 IMoveAction *ma = (IMoveAction*)a;
626 ma->from_inv.applyCurrentPlayer(player->getName());
627 ma->to_inv.applyCurrentPlayer(player->getName());
629 m_inventory_mgr->setInventoryModified(ma->from_inv);
630 if (ma->from_inv != ma->to_inv)
631 m_inventory_mgr->setInventoryModified(ma->to_inv);
633 bool from_inv_is_current_player = false;
634 if (ma->from_inv.type == InventoryLocation::PLAYER) {
635 if (ma->from_inv.name != player->getName())
637 from_inv_is_current_player = true;
640 bool to_inv_is_current_player = false;
641 if (ma->to_inv.type == InventoryLocation::PLAYER) {
642 if (ma->to_inv.name != player->getName())
644 to_inv_is_current_player = true;
647 InventoryLocation *remote = from_inv_is_current_player ?
648 &ma->to_inv : &ma->from_inv;
650 // Check for out-of-range interaction
651 if (remote->type == InventoryLocation::NODEMETA) {
652 v3f node_pos = intToFloat(remote->p, BS);
653 v3f player_pos = player->getPlayerSAO()->getEyePosition();
654 f32 d = player_pos.getDistanceFrom(node_pos);
655 if (!checkInteractDistance(player, d, "inventory"))
660 Disable moving items out of craftpreview
662 if (ma->from_list == "craftpreview") {
663 infostream << "Ignoring IMoveAction from "
664 << (ma->from_inv.dump()) << ":" << ma->from_list
665 << " to " << (ma->to_inv.dump()) << ":" << ma->to_list
666 << " because src is " << ma->from_list << std::endl;
672 Disable moving items into craftresult and craftpreview
674 if (ma->to_list == "craftpreview" || ma->to_list == "craftresult") {
675 infostream << "Ignoring IMoveAction from "
676 << (ma->from_inv.dump()) << ":" << ma->from_list
677 << " to " << (ma->to_inv.dump()) << ":" << ma->to_list
678 << " because dst is " << ma->to_list << std::endl;
683 // Disallow moving items in elsewhere than player's inventory
684 // if not allowed to interact
685 if (!checkPriv(player->getName(), "interact") &&
686 (!from_inv_is_current_player ||
687 !to_inv_is_current_player)) {
688 infostream << "Cannot move outside of player's inventory: "
689 << "No interact privilege" << std::endl;
695 Handle restrictions and special cases of the drop action
697 else if (a->getType() == IAction::Drop) {
698 IDropAction *da = (IDropAction*)a;
700 da->from_inv.applyCurrentPlayer(player->getName());
702 m_inventory_mgr->setInventoryModified(da->from_inv);
705 Disable dropping items out of craftpreview
707 if (da->from_list == "craftpreview") {
708 infostream << "Ignoring IDropAction from "
709 << (da->from_inv.dump()) << ":" << da->from_list
710 << " because src is " << da->from_list << std::endl;
715 // Disallow dropping items if not allowed to interact
716 if (!checkPriv(player->getName(), "interact")) {
721 // Disallow dropping items if dead
722 if (playersao->isDead()) {
723 infostream << "Ignoring IDropAction from "
724 << (da->from_inv.dump()) << ":" << da->from_list
725 << " because player is dead." << std::endl;
731 Handle restrictions and special cases of the craft action
733 else if (a->getType() == IAction::Craft) {
734 ICraftAction *ca = (ICraftAction*)a;
736 ca->craft_inv.applyCurrentPlayer(player->getName());
738 m_inventory_mgr->setInventoryModified(ca->craft_inv);
740 //bool craft_inv_is_current_player =
741 // (ca->craft_inv.type == InventoryLocation::PLAYER) &&
742 // (ca->craft_inv.name == player->getName());
744 // Disallow crafting if not allowed to interact
745 if (!checkPriv(player->getName(), "interact")) {
746 infostream << "Cannot craft: "
747 << "No interact privilege" << std::endl;
754 a->apply(m_inventory_mgr.get(), playersao, this);
759 void Server::handleCommand_ChatMessage(NetworkPacket* pkt)
769 std::wstring message;
770 for (u16 i = 0; i < len; i++) {
774 message += (wchar_t)tmp_wchar;
777 session_t peer_id = pkt->getPeerId();
778 RemotePlayer *player = m_env->getPlayer(peer_id);
779 if (player == NULL) {
781 "Server::ProcessData(): Canceling: No player for peer_id=" <<
782 peer_id << " disconnecting peer!" << std::endl;
783 DisconnectPeer(peer_id);
787 // Get player name of this client
788 std::string name = player->getName();
789 std::wstring wname = narrow_to_wide(name);
791 std::wstring answer_to_sender = handleChat(name, wname, message, true, player);
792 if (!answer_to_sender.empty()) {
793 // Send the answer to sender
794 SendChatMessage(peer_id, ChatMessage(CHATMESSAGE_TYPE_NORMAL,
795 answer_to_sender, wname));
799 void Server::handleCommand_Damage(NetworkPacket* pkt)
805 session_t peer_id = pkt->getPeerId();
806 RemotePlayer *player = m_env->getPlayer(peer_id);
808 if (player == NULL) {
810 "Server::ProcessData(): Canceling: No player for peer_id=" <<
811 peer_id << " disconnecting peer!" << std::endl;
812 DisconnectPeer(peer_id);
816 PlayerSAO *playersao = player->getPlayerSAO();
817 if (playersao == NULL) {
819 "Server::ProcessData(): Canceling: No player object for peer_id=" <<
820 peer_id << " disconnecting peer!" << std::endl;
821 DisconnectPeer(peer_id);
825 if (!playersao->isImmortal()) {
826 if (playersao->isDead()) {
827 verbosestream << "Server::ProcessData(): Info: "
828 "Ignoring damage as player " << player->getName()
829 << " is already dead." << std::endl;
833 actionstream << player->getName() << " damaged by "
834 << (int)damage << " hp at " << PP(playersao->getBasePosition() / BS)
837 PlayerHPChangeReason reason(PlayerHPChangeReason::FALL);
838 playersao->setHP((s32)playersao->getHP() - (s32)damage, reason);
839 SendPlayerHPOrDie(playersao, reason);
843 void Server::handleCommand_PlayerItem(NetworkPacket* pkt)
845 if (pkt->getSize() < 2)
848 session_t peer_id = pkt->getPeerId();
849 RemotePlayer *player = m_env->getPlayer(peer_id);
851 if (player == NULL) {
853 "Server::ProcessData(): Canceling: No player for peer_id=" <<
854 peer_id << " disconnecting peer!" << std::endl;
855 DisconnectPeer(peer_id);
859 PlayerSAO *playersao = player->getPlayerSAO();
860 if (playersao == NULL) {
862 "Server::ProcessData(): Canceling: No player object for peer_id=" <<
863 peer_id << " disconnecting peer!" << std::endl;
864 DisconnectPeer(peer_id);
872 playersao->getPlayer()->setWieldIndex(item);
875 void Server::handleCommand_Respawn(NetworkPacket* pkt)
877 session_t peer_id = pkt->getPeerId();
878 RemotePlayer *player = m_env->getPlayer(peer_id);
879 if (player == NULL) {
881 "Server::ProcessData(): Canceling: No player for peer_id=" <<
882 peer_id << " disconnecting peer!" << std::endl;
883 DisconnectPeer(peer_id);
887 PlayerSAO *playersao = player->getPlayerSAO();
890 if (!playersao->isDead())
893 RespawnPlayer(peer_id);
895 actionstream << player->getName() << " respawns at "
896 << PP(playersao->getBasePosition() / BS) << std::endl;
898 // ActiveObject is added to environment in AsyncRunStep after
899 // the previous addition has been successfully removed
902 bool Server::checkInteractDistance(RemotePlayer *player, const f32 d, const std::string &what)
904 ItemStack selected_item, hand_item;
905 player->getWieldedItem(&selected_item, &hand_item);
906 f32 max_d = BS * getToolRange(selected_item.getDefinition(m_itemdef),
907 hand_item.getDefinition(m_itemdef));
909 // Cube diagonal * 1.5 for maximal supported node extents:
910 // sqrt(3) * 1.5 ≅ 2.6
911 if (d > max_d + 2.6f * BS) {
912 actionstream << "Player " << player->getName()
913 << " tried to access " << what
915 << "d=" << d << ", max_d=" << max_d
916 << "; ignoring." << std::endl;
918 m_script->on_cheat(player->getPlayerSAO(), "interacted_too_far");
924 void Server::handleCommand_Interact(NetworkPacket *pkt)
930 [5] u32 length of the next item (plen)
931 [9] serialized PointedThing
932 [9 + plen] player position information
935 InteractAction action;
938 *pkt >> (u8 &)action;
941 std::istringstream tmp_is(pkt->readLongString(), std::ios::binary);
942 PointedThing pointed;
943 pointed.deSerialize(tmp_is);
945 verbosestream << "TOSERVER_INTERACT: action=" << (int)action << ", item="
946 << item_i << ", pointed=" << pointed.dump() << std::endl;
948 session_t peer_id = pkt->getPeerId();
949 RemotePlayer *player = m_env->getPlayer(peer_id);
951 if (player == NULL) {
953 "Server::ProcessData(): Canceling: No player for peer_id=" <<
954 peer_id << " disconnecting peer!" << std::endl;
955 DisconnectPeer(peer_id);
959 PlayerSAO *playersao = player->getPlayerSAO();
960 if (playersao == NULL) {
962 "Server::ProcessData(): Canceling: No player object for peer_id=" <<
963 peer_id << " disconnecting peer!" << std::endl;
964 DisconnectPeer(peer_id);
968 if (playersao->isDead()) {
969 actionstream << "Server: " << player->getName()
970 << " tried to interact while dead; ignoring." << std::endl;
971 if (pointed.type == POINTEDTHING_NODE) {
972 // Re-send block to revert change on client-side
973 RemoteClient *client = getClient(peer_id);
974 v3s16 blockpos = getNodeBlockPos(pointed.node_undersurface);
975 client->SetBlockNotSent(blockpos);
978 m_script->on_cheat(playersao, "interacted_while_dead");
982 process_PlayerPos(player, playersao, pkt);
984 v3f player_pos = playersao->getLastGoodPosition();
986 // Update wielded item
987 playersao->getPlayer()->setWieldIndex(item_i);
989 // Get pointed to object (NULL if not POINTEDTYPE_OBJECT)
990 ServerActiveObject *pointed_object = NULL;
991 if (pointed.type == POINTEDTHING_OBJECT) {
992 pointed_object = m_env->getActiveObject(pointed.object_id);
993 if (pointed_object == NULL) {
994 verbosestream << "TOSERVER_INTERACT: "
995 "pointed object is NULL" << std::endl;
1002 Make sure the player is allowed to do it
1004 if (!checkPriv(player->getName(), "interact")) {
1005 actionstream << player->getName() << " attempted to interact with " <<
1006 pointed.dump() << " without 'interact' privilege" << std::endl;
1008 if (pointed.type != POINTEDTHING_NODE)
1011 // Re-send block to revert change on client-side
1012 RemoteClient *client = getClient(peer_id);
1013 // Digging completed -> under
1014 if (action == INTERACT_DIGGING_COMPLETED) {
1015 v3s16 blockpos = getNodeBlockPos(pointed.node_undersurface);
1016 client->SetBlockNotSent(blockpos);
1018 // Placement -> above
1019 else if (action == INTERACT_PLACE) {
1020 v3s16 blockpos = getNodeBlockPos(pointed.node_abovesurface);
1021 client->SetBlockNotSent(blockpos);
1027 Check that target is reasonably close
1029 static thread_local const bool enable_anticheat =
1030 !g_settings->getBool("disable_anticheat");
1032 if ((action == INTERACT_START_DIGGING || action == INTERACT_DIGGING_COMPLETED ||
1033 action == INTERACT_PLACE || action == INTERACT_USE) &&
1034 enable_anticheat && !isSingleplayer()) {
1035 v3f target_pos = player_pos;
1036 if (pointed.type == POINTEDTHING_NODE) {
1037 target_pos = intToFloat(pointed.node_undersurface, BS);
1038 } else if (pointed.type == POINTEDTHING_OBJECT) {
1039 target_pos = pointed_object->getBasePosition();
1041 float d = playersao->getEyePosition().getDistanceFrom(target_pos);
1043 if (!checkInteractDistance(player, d, pointed.dump())
1044 && pointed.type == POINTEDTHING_NODE) {
1045 // Re-send block to revert change on client-side
1046 RemoteClient *client = getClient(peer_id);
1047 v3s16 blockpos = getNodeBlockPos(pointed.node_undersurface);
1048 client->SetBlockNotSent(blockpos);
1054 If something goes wrong, this player is to blame
1056 RollbackScopeActor rollback_scope(m_rollback,
1057 std::string("player:")+player->getName());
1060 // Start digging or punch object
1061 case INTERACT_START_DIGGING: {
1062 if (pointed.type == POINTEDTHING_NODE) {
1063 MapNode n(CONTENT_IGNORE);
1066 v3s16 p_under = pointed.node_undersurface;
1067 n = m_env->getMap().getNode(p_under, &pos_ok);
1069 infostream << "Server: Not punching: Node not found. "
1070 "Adding block to emerge queue." << std::endl;
1071 m_emerge->enqueueBlockEmerge(peer_id,
1072 getNodeBlockPos(pointed.node_abovesurface), false);
1075 if (n.getContent() != CONTENT_IGNORE)
1076 m_script->node_on_punch(p_under, n, playersao, pointed);
1079 playersao->noCheatDigStart(p_under);
1084 // Skip if the object can't be interacted with anymore
1085 if (pointed.type != POINTEDTHING_OBJECT || pointed_object->isGone())
1088 ItemStack selected_item, hand_item;
1089 ItemStack tool_item = playersao->getWieldedItem(&selected_item, &hand_item);
1090 ToolCapabilities toolcap =
1091 tool_item.getToolCapabilities(m_itemdef);
1092 v3f dir = (pointed_object->getBasePosition() -
1093 (playersao->getBasePosition() + playersao->getEyeOffset())
1095 float time_from_last_punch =
1096 playersao->resetTimeFromLastPunch();
1098 u16 src_original_hp = pointed_object->getHP();
1099 u16 dst_origin_hp = playersao->getHP();
1101 u16 wear = pointed_object->punch(dir, &toolcap, playersao,
1102 time_from_last_punch);
1104 // Callback may have changed item, so get it again
1105 playersao->getWieldedItem(&selected_item);
1106 bool changed = selected_item.addWear(wear, m_itemdef);
1108 playersao->setWieldedItem(selected_item);
1110 // If the object is a player and its HP changed
1111 if (src_original_hp != pointed_object->getHP() &&
1112 pointed_object->getType() == ACTIVEOBJECT_TYPE_PLAYER) {
1113 SendPlayerHPOrDie((PlayerSAO *)pointed_object,
1114 PlayerHPChangeReason(PlayerHPChangeReason::PLAYER_PUNCH, playersao));
1117 // If the puncher is a player and its HP changed
1118 if (dst_origin_hp != playersao->getHP())
1119 SendPlayerHPOrDie(playersao,
1120 PlayerHPChangeReason(PlayerHPChangeReason::PLAYER_PUNCH, pointed_object));
1123 } // action == INTERACT_START_DIGGING
1125 case INTERACT_STOP_DIGGING:
1129 case INTERACT_DIGGING_COMPLETED: {
1130 // Only digging of nodes
1131 if (pointed.type != POINTEDTHING_NODE)
1134 v3s16 p_under = pointed.node_undersurface;
1135 MapNode n = m_env->getMap().getNode(p_under, &pos_ok);
1137 infostream << "Server: Not finishing digging: Node not found. "
1138 "Adding block to emerge queue." << std::endl;
1139 m_emerge->enqueueBlockEmerge(peer_id,
1140 getNodeBlockPos(pointed.node_abovesurface), false);
1143 /* Cheat prevention */
1144 bool is_valid_dig = true;
1145 if (enable_anticheat && !isSingleplayer()) {
1146 v3s16 nocheat_p = playersao->getNoCheatDigPos();
1147 float nocheat_t = playersao->getNoCheatDigTime();
1148 playersao->noCheatDigEnd();
1149 // If player didn't start digging this, ignore dig
1150 if (nocheat_p != p_under) {
1151 infostream << "Server: " << player->getName()
1152 << " started digging "
1153 << PP(nocheat_p) << " and completed digging "
1154 << PP(p_under) << "; not digging." << std::endl;
1155 is_valid_dig = false;
1157 m_script->on_cheat(playersao, "finished_unknown_dig");
1160 // Get player's wielded item
1161 // See also: Game::handleDigging
1162 ItemStack selected_item, hand_item;
1163 playersao->getPlayer()->getWieldedItem(&selected_item, &hand_item);
1165 // Get diggability and expected digging time
1166 DigParams params = getDigParams(m_nodedef->get(n).groups,
1167 &selected_item.getToolCapabilities(m_itemdef));
1168 // If can't dig, try hand
1169 if (!params.diggable) {
1170 params = getDigParams(m_nodedef->get(n).groups,
1171 &hand_item.getToolCapabilities(m_itemdef));
1173 // If can't dig, ignore dig
1174 if (!params.diggable) {
1175 infostream << "Server: " << player->getName()
1176 << " completed digging " << PP(p_under)
1177 << ", which is not diggable with tool; not digging."
1179 is_valid_dig = false;
1181 m_script->on_cheat(playersao, "dug_unbreakable");
1183 // Check digging time
1184 // If already invalidated, we don't have to
1185 if (!is_valid_dig) {
1186 // Well not our problem then
1188 // Clean and long dig
1189 else if (params.time > 2.0 && nocheat_t * 1.2 > params.time) {
1190 // All is good, but grab time from pool; don't care if
1191 // it's actually available
1192 playersao->getDigPool().grab(params.time);
1194 // Short or laggy dig
1195 // Try getting the time from pool
1196 else if (playersao->getDigPool().grab(params.time)) {
1201 infostream << "Server: " << player->getName()
1202 << " completed digging " << PP(p_under)
1203 << "too fast; not digging." << std::endl;
1204 is_valid_dig = false;
1206 m_script->on_cheat(playersao, "dug_too_fast");
1210 /* Actually dig node */
1212 if (is_valid_dig && n.getContent() != CONTENT_IGNORE)
1213 m_script->node_on_dig(p_under, n, playersao);
1215 v3s16 blockpos = getNodeBlockPos(p_under);
1216 RemoteClient *client = getClient(peer_id);
1217 // Send unusual result (that is, node not being removed)
1218 if (m_env->getMap().getNode(p_under).getContent() != CONTENT_AIR)
1219 // Re-send block to revert change on client-side
1220 client->SetBlockNotSent(blockpos);
1222 client->ResendBlockIfOnWire(blockpos);
1225 } // action == INTERACT_DIGGING_COMPLETED
1227 // Place block or right-click object
1228 case INTERACT_PLACE: {
1229 ItemStack selected_item;
1230 playersao->getWieldedItem(&selected_item, nullptr);
1232 // Reset build time counter
1233 if (pointed.type == POINTEDTHING_NODE &&
1234 selected_item.getDefinition(m_itemdef).type == ITEM_NODE)
1235 getClient(peer_id)->m_time_from_building = 0.0;
1237 if (pointed.type == POINTEDTHING_OBJECT) {
1238 // Right click object
1240 // Skip if object can't be interacted with anymore
1241 if (pointed_object->isGone())
1244 actionstream << player->getName() << " right-clicks object "
1245 << pointed.object_id << ": "
1246 << pointed_object->getDescription() << std::endl;
1249 if (m_script->item_OnSecondaryUse(
1250 selected_item, playersao, pointed)) {
1251 if (playersao->setWieldedItem(selected_item)) {
1252 SendInventory(playersao, true);
1256 pointed_object->rightClick(playersao);
1257 } else if (m_script->item_OnPlace(selected_item, playersao, pointed)) {
1258 // Placement was handled in lua
1260 // Apply returned ItemStack
1261 if (playersao->setWieldedItem(selected_item))
1262 SendInventory(playersao, true);
1265 if (pointed.type != POINTEDTHING_NODE)
1268 // If item has node placement prediction, always send the
1269 // blocks to make sure the client knows what exactly happened
1270 RemoteClient *client = getClient(peer_id);
1271 v3s16 blockpos = getNodeBlockPos(pointed.node_abovesurface);
1272 v3s16 blockpos2 = getNodeBlockPos(pointed.node_undersurface);
1273 if (!selected_item.getDefinition(m_itemdef
1274 ).node_placement_prediction.empty()) {
1275 client->SetBlockNotSent(blockpos);
1276 if (blockpos2 != blockpos)
1277 client->SetBlockNotSent(blockpos2);
1279 client->ResendBlockIfOnWire(blockpos);
1280 if (blockpos2 != blockpos)
1281 client->ResendBlockIfOnWire(blockpos2);
1285 } // action == INTERACT_PLACE
1287 case INTERACT_USE: {
1288 ItemStack selected_item;
1289 playersao->getWieldedItem(&selected_item, nullptr);
1291 actionstream << player->getName() << " uses " << selected_item.name
1292 << ", pointing at " << pointed.dump() << std::endl;
1294 if (m_script->item_OnUse(selected_item, playersao, pointed)) {
1295 // Apply returned ItemStack
1296 if (playersao->setWieldedItem(selected_item))
1297 SendInventory(playersao, true);
1304 case INTERACT_ACTIVATE: {
1305 ItemStack selected_item;
1306 playersao->getWieldedItem(&selected_item, nullptr);
1308 actionstream << player->getName() << " activates "
1309 << selected_item.name << std::endl;
1311 pointed.type = POINTEDTHING_NOTHING; // can only ever be NOTHING
1313 if (m_script->item_OnSecondaryUse(selected_item, playersao, pointed)) {
1314 if (playersao->setWieldedItem(selected_item))
1315 SendInventory(playersao, true);
1322 warningstream << "Server: Invalid action " << action << std::endl;
1327 void Server::handleCommand_RemovedSounds(NetworkPacket* pkt)
1331 for (u16 k = 0; k < num; k++) {
1336 std::unordered_map<s32, ServerPlayingSound>::iterator i =
1337 m_playing_sounds.find(id);
1338 if (i == m_playing_sounds.end())
1341 ServerPlayingSound &psound = i->second;
1342 psound.clients.erase(pkt->getPeerId());
1343 if (psound.clients.empty())
1344 m_playing_sounds.erase(i++);
1348 void Server::handleCommand_NodeMetaFields(NetworkPacket* pkt)
1351 std::string formname;
1354 *pkt >> p >> formname >> num;
1357 for (u16 k = 0; k < num; k++) {
1358 std::string fieldname;
1360 fields[fieldname] = pkt->readLongString();
1363 session_t peer_id = pkt->getPeerId();
1364 RemotePlayer *player = m_env->getPlayer(peer_id);
1366 if (player == NULL) {
1368 "Server::ProcessData(): Canceling: No player for peer_id=" <<
1369 peer_id << " disconnecting peer!" << std::endl;
1370 DisconnectPeer(peer_id);
1374 PlayerSAO *playersao = player->getPlayerSAO();
1375 if (playersao == NULL) {
1377 "Server::ProcessData(): Canceling: No player object for peer_id=" <<
1378 peer_id << " disconnecting peer!" << std::endl;
1379 DisconnectPeer(peer_id);
1383 // If something goes wrong, this player is to blame
1384 RollbackScopeActor rollback_scope(m_rollback,
1385 std::string("player:")+player->getName());
1387 // Check the target node for rollback data; leave others unnoticed
1388 RollbackNode rn_old(&m_env->getMap(), p, this);
1390 m_script->node_on_receive_fields(p, formname, fields, playersao);
1392 // Report rollback data
1393 RollbackNode rn_new(&m_env->getMap(), p, this);
1394 if (rollback() && rn_new != rn_old) {
1395 RollbackAction action;
1396 action.setSetNode(p, rn_old, rn_new);
1397 rollback()->reportAction(action);
1401 void Server::handleCommand_InventoryFields(NetworkPacket* pkt)
1403 std::string client_formspec_name;
1406 *pkt >> client_formspec_name >> num;
1409 for (u16 k = 0; k < num; k++) {
1410 std::string fieldname;
1412 fields[fieldname] = pkt->readLongString();
1415 session_t peer_id = pkt->getPeerId();
1416 RemotePlayer *player = m_env->getPlayer(peer_id);
1418 if (player == NULL) {
1420 "Server::ProcessData(): Canceling: No player for peer_id=" <<
1421 peer_id << " disconnecting peer!" << std::endl;
1422 DisconnectPeer(peer_id);
1426 PlayerSAO *playersao = player->getPlayerSAO();
1427 if (playersao == NULL) {
1429 "Server::ProcessData(): Canceling: No player object for peer_id=" <<
1430 peer_id << " disconnecting peer!" << std::endl;
1431 DisconnectPeer(peer_id);
1435 if (client_formspec_name.empty()) { // pass through inventory submits
1436 m_script->on_playerReceiveFields(playersao, client_formspec_name, fields);
1440 // verify that we displayed the formspec to the user
1441 const auto peer_state_iterator = m_formspec_state_data.find(peer_id);
1442 if (peer_state_iterator != m_formspec_state_data.end()) {
1443 const std::string &server_formspec_name = peer_state_iterator->second;
1444 if (client_formspec_name == server_formspec_name) {
1445 auto it = fields.find("quit");
1446 if (it != fields.end() && it->second == "true")
1447 m_formspec_state_data.erase(peer_state_iterator);
1449 m_script->on_playerReceiveFields(playersao, client_formspec_name, fields);
1452 actionstream << "'" << player->getName()
1453 << "' submitted formspec ('" << client_formspec_name
1454 << "') but the name of the formspec doesn't match the"
1455 " expected name ('" << server_formspec_name << "')";
1458 actionstream << "'" << player->getName()
1459 << "' submitted formspec ('" << client_formspec_name
1460 << "') but server hasn't sent formspec to client";
1462 actionstream << ", possible exploitation attempt" << std::endl;
1465 void Server::handleCommand_FirstSrp(NetworkPacket* pkt)
1467 session_t peer_id = pkt->getPeerId();
1468 RemoteClient *client = getClient(peer_id, CS_Invalid);
1469 ClientState cstate = client->getState();
1471 std::string playername = client->getName();
1474 std::string verification_key;
1476 std::string addr_s = getPeerAddress(peer_id).serializeString();
1479 *pkt >> salt >> verification_key >> is_empty;
1481 verbosestream << "Server: Got TOSERVER_FIRST_SRP from " << addr_s
1482 << ", with is_empty=" << (is_empty == 1) << std::endl;
1484 // Either this packet is sent because the user is new or to change the password
1485 if (cstate == CS_HelloSent) {
1486 if (!client->isMechAllowed(AUTH_MECHANISM_FIRST_SRP)) {
1487 actionstream << "Server: Client from " << addr_s
1488 << " tried to set password without being "
1489 << "authenticated, or the username being new." << std::endl;
1490 DenyAccess(peer_id, SERVER_ACCESSDENIED_UNEXPECTED_DATA);
1494 if (!isSingleplayer() &&
1495 g_settings->getBool("disallow_empty_password") &&
1497 actionstream << "Server: " << playername
1498 << " supplied empty password from " << addr_s << std::endl;
1499 DenyAccess(peer_id, SERVER_ACCESSDENIED_EMPTY_PASSWORD);
1503 std::string initial_ver_key;
1505 initial_ver_key = encode_srp_verifier(verification_key, salt);
1506 m_script->createAuth(playername, initial_ver_key);
1507 m_script->on_authplayer(playername, addr_s, true);
1509 acceptAuth(peer_id, false);
1511 if (cstate < CS_SudoMode) {
1512 infostream << "Server::ProcessData(): Ignoring TOSERVER_FIRST_SRP from "
1513 << addr_s << ": " << "Client has wrong state " << cstate << "."
1517 m_clients.event(peer_id, CSE_SudoLeave);
1518 std::string pw_db_field = encode_srp_verifier(verification_key, salt);
1519 bool success = m_script->setPassword(playername, pw_db_field);
1521 actionstream << playername << " changes password" << std::endl;
1522 SendChatMessage(peer_id, ChatMessage(CHATMESSAGE_TYPE_SYSTEM,
1523 L"Password change successful."));
1525 actionstream << playername <<
1526 " tries to change password but it fails" << std::endl;
1527 SendChatMessage(peer_id, ChatMessage(CHATMESSAGE_TYPE_SYSTEM,
1528 L"Password change failed or unavailable."));
1533 void Server::handleCommand_SrpBytesA(NetworkPacket* pkt)
1535 session_t peer_id = pkt->getPeerId();
1536 RemoteClient *client = getClient(peer_id, CS_Invalid);
1537 ClientState cstate = client->getState();
1539 bool wantSudo = (cstate == CS_Active);
1541 if (!((cstate == CS_HelloSent) || (cstate == CS_Active))) {
1542 actionstream << "Server: got SRP _A packet in wrong state " << cstate <<
1543 " from " << getPeerAddress(peer_id).serializeString() <<
1544 ". Ignoring." << std::endl;
1548 if (client->chosen_mech != AUTH_MECHANISM_NONE) {
1549 actionstream << "Server: got SRP _A packet, while auth is already "
1550 "going on with mech " << client->chosen_mech << " from " <<
1551 getPeerAddress(peer_id).serializeString() <<
1552 " (wantSudo=" << wantSudo << "). Ignoring." << std::endl;
1554 DenySudoAccess(peer_id);
1558 DenyAccess(peer_id, SERVER_ACCESSDENIED_UNEXPECTED_DATA);
1562 std::string bytes_A;
1564 *pkt >> bytes_A >> based_on;
1566 infostream << "Server: TOSERVER_SRP_BYTES_A received with "
1567 << "based_on=" << int(based_on) << " and len_A="
1568 << bytes_A.length() << "." << std::endl;
1570 AuthMechanism chosen = (based_on == 0) ?
1571 AUTH_MECHANISM_LEGACY_PASSWORD : AUTH_MECHANISM_SRP;
1574 if (!client->isSudoMechAllowed(chosen)) {
1575 actionstream << "Server: Player \"" << client->getName() <<
1576 "\" at " << getPeerAddress(peer_id).serializeString() <<
1577 " tried to change password using unallowed mech " << chosen <<
1579 DenySudoAccess(peer_id);
1583 if (!client->isMechAllowed(chosen)) {
1584 actionstream << "Server: Client tried to authenticate from " <<
1585 getPeerAddress(peer_id).serializeString() <<
1586 " using unallowed mech " << chosen << "." << std::endl;
1587 DenyAccess(peer_id, SERVER_ACCESSDENIED_UNEXPECTED_DATA);
1592 client->chosen_mech = chosen;
1595 std::string verifier;
1597 if (based_on == 0) {
1599 generate_srp_verifier_and_salt(client->getName(), client->enc_pwd,
1601 } else if (!decode_srp_verifier_and_salt(client->enc_pwd, &verifier, &salt)) {
1602 // Non-base64 errors should have been catched in the init handler
1603 actionstream << "Server: User " << client->getName() <<
1604 " tried to log in, but srp verifier field was invalid (most likely "
1605 "invalid base64)." << std::endl;
1606 DenyAccess(peer_id, SERVER_ACCESSDENIED_SERVER_FAIL);
1613 client->auth_data = srp_verifier_new(SRP_SHA256, SRP_NG_2048,
1614 client->getName().c_str(),
1615 (const unsigned char *) salt.c_str(), salt.size(),
1616 (const unsigned char *) verifier.c_str(), verifier.size(),
1617 (const unsigned char *) bytes_A.c_str(), bytes_A.size(),
1619 (unsigned char **) &bytes_B, &len_B, NULL, NULL);
1622 actionstream << "Server: User " << client->getName()
1623 << " tried to log in, SRP-6a safety check violated in _A handler."
1626 DenySudoAccess(peer_id);
1630 DenyAccess(peer_id, SERVER_ACCESSDENIED_UNEXPECTED_DATA);
1634 NetworkPacket resp_pkt(TOCLIENT_SRP_BYTES_S_B, 0, peer_id);
1635 resp_pkt << salt << std::string(bytes_B, len_B);
1639 void Server::handleCommand_SrpBytesM(NetworkPacket* pkt)
1641 session_t peer_id = pkt->getPeerId();
1642 RemoteClient *client = getClient(peer_id, CS_Invalid);
1643 ClientState cstate = client->getState();
1644 std::string addr_s = getPeerAddress(pkt->getPeerId()).serializeString();
1645 std::string playername = client->getName();
1647 bool wantSudo = (cstate == CS_Active);
1649 verbosestream << "Server: Received TOCLIENT_SRP_BYTES_M." << std::endl;
1651 if (!((cstate == CS_HelloSent) || (cstate == CS_Active))) {
1652 actionstream << "Server: got SRP _M packet in wrong state "
1653 << cstate << " from " << addr_s
1654 << ". Ignoring." << std::endl;
1658 if (client->chosen_mech != AUTH_MECHANISM_SRP &&
1659 client->chosen_mech != AUTH_MECHANISM_LEGACY_PASSWORD) {
1660 actionstream << "Server: got SRP _M packet, while auth"
1661 << "is going on with mech " << client->chosen_mech << " from "
1662 << addr_s << " (wantSudo=" << wantSudo << "). Denying." << std::endl;
1664 DenySudoAccess(peer_id);
1668 DenyAccess(peer_id, SERVER_ACCESSDENIED_UNEXPECTED_DATA);
1672 std::string bytes_M;
1675 if (srp_verifier_get_session_key_length((SRPVerifier *) client->auth_data)
1676 != bytes_M.size()) {
1677 actionstream << "Server: User " << playername << " at " << addr_s
1678 << " sent bytes_M with invalid length " << bytes_M.size() << std::endl;
1679 DenyAccess(peer_id, SERVER_ACCESSDENIED_UNEXPECTED_DATA);
1683 unsigned char *bytes_HAMK = 0;
1685 srp_verifier_verify_session((SRPVerifier *) client->auth_data,
1686 (unsigned char *)bytes_M.c_str(), &bytes_HAMK);
1690 actionstream << "Server: User " << playername << " at " << addr_s
1691 << " tried to change their password, but supplied wrong"
1692 << " (SRP) password for authentication." << std::endl;
1693 DenySudoAccess(peer_id);
1697 actionstream << "Server: User " << playername << " at " << addr_s
1698 << " supplied wrong password (auth mechanism: SRP)." << std::endl;
1699 m_script->on_authplayer(playername, addr_s, false);
1700 DenyAccess(peer_id, SERVER_ACCESSDENIED_WRONG_PASSWORD);
1704 if (client->create_player_on_auth_success) {
1705 m_script->createAuth(playername, client->enc_pwd);
1707 std::string checkpwd; // not used, but needed for passing something
1708 if (!m_script->getAuth(playername, &checkpwd, NULL)) {
1709 actionstream << "Server: " << playername <<
1710 " cannot be authenticated (auth handler does not work?)" <<
1712 DenyAccess(peer_id, SERVER_ACCESSDENIED_SERVER_FAIL);
1715 client->create_player_on_auth_success = false;
1718 m_script->on_authplayer(playername, addr_s, true);
1719 acceptAuth(peer_id, wantSudo);
1726 void Server::handleCommand_ModChannelJoin(NetworkPacket *pkt)
1728 std::string channel_name;
1729 *pkt >> channel_name;
1731 session_t peer_id = pkt->getPeerId();
1732 NetworkPacket resp_pkt(TOCLIENT_MODCHANNEL_SIGNAL,
1733 1 + 2 + channel_name.size(), peer_id);
1735 // Send signal to client to notify join succeed or not
1736 if (g_settings->getBool("enable_mod_channels") &&
1737 m_modchannel_mgr->joinChannel(channel_name, peer_id)) {
1738 resp_pkt << (u8) MODCHANNEL_SIGNAL_JOIN_OK;
1739 infostream << "Peer " << peer_id << " joined channel " <<
1740 channel_name << std::endl;
1743 resp_pkt << (u8)MODCHANNEL_SIGNAL_JOIN_FAILURE;
1744 infostream << "Peer " << peer_id << " tried to join channel " <<
1745 channel_name << ", but was already registered." << std::endl;
1747 resp_pkt << channel_name;
1751 void Server::handleCommand_ModChannelLeave(NetworkPacket *pkt)
1753 std::string channel_name;
1754 *pkt >> channel_name;
1756 session_t peer_id = pkt->getPeerId();
1757 NetworkPacket resp_pkt(TOCLIENT_MODCHANNEL_SIGNAL,
1758 1 + 2 + channel_name.size(), peer_id);
1760 // Send signal to client to notify join succeed or not
1761 if (g_settings->getBool("enable_mod_channels") &&
1762 m_modchannel_mgr->leaveChannel(channel_name, peer_id)) {
1763 resp_pkt << (u8)MODCHANNEL_SIGNAL_LEAVE_OK;
1764 infostream << "Peer " << peer_id << " left channel " << channel_name <<
1767 resp_pkt << (u8) MODCHANNEL_SIGNAL_LEAVE_FAILURE;
1768 infostream << "Peer " << peer_id << " left channel " << channel_name <<
1769 ", but was not registered." << std::endl;
1771 resp_pkt << channel_name;
1775 void Server::handleCommand_ModChannelMsg(NetworkPacket *pkt)
1777 std::string channel_name, channel_msg;
1778 *pkt >> channel_name >> channel_msg;
1780 session_t peer_id = pkt->getPeerId();
1781 verbosestream << "Mod channel message received from peer " << peer_id <<
1782 " on channel " << channel_name << " message: " << channel_msg <<
1785 // If mod channels are not enabled, discard message
1786 if (!g_settings->getBool("enable_mod_channels")) {
1790 // If channel not registered, signal it and ignore message
1791 if (!m_modchannel_mgr->channelRegistered(channel_name)) {
1792 NetworkPacket resp_pkt(TOCLIENT_MODCHANNEL_SIGNAL,
1793 1 + 2 + channel_name.size(), peer_id);
1794 resp_pkt << (u8)MODCHANNEL_SIGNAL_CHANNEL_NOT_REGISTERED << channel_name;
1799 // @TODO: filter, rate limit
1801 broadcastModChannelMessage(channel_name, channel_msg, peer_id);