// $Id: login.c,v 1.6 2004/09/19 21:12:07 Valaris Exp $ // original : login2.c 2003/01/28 02:29:17 Rev.1.1.1.1 // txt version 1.100 #include #ifdef LCCWIN32 #include #pragma lib #else #include #include #include #include #include #endif #include #include #include #include #include #include #include // for stat/lstat/fstat #include #include #include #include #include //add include for DBMS(mysql) #include #include "strlib.h" #include "timer.h" /* #include "timer.h" #include "core.h" #include "socket.h" #include "login.h" #include "mmo.h" #include "version.h" #include "db.h" */ #include "../common/core.h" #include "../common/socket.h" #include "login.h" #include "../common/mmo.h" #include "../common/version.h" #include "../common/db.h" #include "../common/timer.h" #ifdef PASSWORDENC #include "md5calc.h" #endif #ifdef MEMWATCH #include "memwatch.h" #endif #define J_MAX_MALLOC_SIZE 65535 //----------------------------------------------------- // global variable //----------------------------------------------------- int account_id_count = START_ACCOUNT_NUM; int server_num; int new_account_flag = 0; int login_port = 6900; char lan_char_ip[128]; // Lan char ip added by kashy int subnetmaski[4]; // Subnetmask added by kashy struct mmo_char_server server[MAX_SERVERS]; int server_fd[MAX_SERVERS]; int server_freezeflag[MAX_SERVERS]; // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed int anti_freeze_enable = 0; int ANTI_FREEZE_INTERVAL = 15; int login_fd; char date_format[32] = "%Y-%m-%d %H:%M:%S"; int auth_num = 0, auth_max = 0; int min_level_to_connect = 0; // minimum level of player/GM (0: player, 1-99: gm) to connect on the server int check_ip_flag = 1; // It's to check IP of a player between login-server and char-server (part of anti-hacking system) MYSQL mysql_handle; int ipban = 1; int dynamic_account_ban = 1; int dynamic_account_ban_class = 0; int dynamic_pass_failure_ban = 1; int dynamic_pass_failure_ban_time = 5; int dynamic_pass_failure_ban_how_many = 3; int dynamic_pass_failure_ban_how_long = 60; int login_server_port = 3306; char login_server_ip[32] = "127.0.0.1"; char login_server_id[32] = "ragnarok"; char login_server_pw[32] = "ragnarok"; char login_server_db[32] = "ragnarok"; int use_md5_passwds = 0; char login_db[256] = "login"; char loginlog_db[256] = "loginlog"; // added to help out custom login tables, without having to recompile // source so options are kept in the login_athena.conf or the inter_athena.conf char login_db_account_id[256] = "account_id"; char login_db_userid[256] = "userid"; char login_db_user_pass[256] = "user_pass"; char login_db_level[256] = "level"; char tmpsql[65535], tmp_sql[65535]; //----------------------------------------------------- #define AUTH_FIFO_SIZE 256 struct { int account_id, login_id1, login_id2; int ip, sex, delflag; } auth_fifo[AUTH_FIFO_SIZE]; int auth_fifo_pos = 0; //----------------------------------------------------- static char md5key[20], md5keylen = 16; //----------------------------------------------------- // check user level //----------------------------------------------------- int isGM (int account_id) { int level; MYSQL_RES *sql_res; MYSQL_ROW sql_row; level = 0; sprintf (tmpsql, "SELECT `%s` FROM `%s` WHERE `%s`='%d'", login_db_level, login_db, login_db_account_id, account_id); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error (select GM Level to Memory)- %s\n", mysql_error (&mysql_handle)); } sql_res = mysql_store_result (&mysql_handle); if (sql_res) { sql_row = mysql_fetch_row (sql_res); level = atoi (sql_row[0]); if (level > 99) level = 99; } if (level == 0) { return 0; //not GM } mysql_free_result (sql_res); return level; } //----------------------------------------------------- // Function to suppress control characters in a string. //----------------------------------------------------- int remove_control_chars (unsigned char *str) { int i; int change = 0; for (i = 0; str[i]; i++) { if (str[i] < 32) { str[i] = '_'; change = 1; } } return change; } //--------------------------------------------------- // E-mail check: return 0 (not correct) or 1 (valid). //--------------------------------------------------- int e_mail_check (unsigned char *email) { char ch; unsigned char *last_arobas; // athena limits if (strlen (email) < 3 || strlen (email) > 39) return 0; // part of RFC limits (official reference of e-mail description) if (strchr (email, '@') == NULL || email[strlen (email) - 1] == '@') return 0; if (email[strlen (email) - 1] == '.') return 0; last_arobas = strrchr (email, '@'); if (strstr (last_arobas, "@.") != NULL || strstr (last_arobas, "..") != NULL) return 0; for (ch = 1; ch < 32; ch++) { if (strchr (last_arobas, ch) != NULL) { return 0; break; } } if (strchr (last_arobas, ' ') != NULL || strchr (last_arobas, ';') != NULL) return 0; // all correct return 1; } //----------------------------------------------------- // Read Account database - mysql db //----------------------------------------------------- int mmo_auth_sqldb_init (void) { printf ("Login server init....\n"); // memory initialize printf ("memory initialize....\n"); mysql_init (&mysql_handle); // DB connection start printf ("Connect Login Database Server....\n"); if (!mysql_real_connect (&mysql_handle, login_server_ip, login_server_id, login_server_pw, login_server_db, login_server_port, (char *) NULL, 0)) { // pointer check printf ("%s\n", mysql_error (&mysql_handle)); exit (1); } else { printf ("connect success!\n"); } sprintf (tmpsql, "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '', 'lserver', '100','login server started')", loginlog_db); //query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } return 0; } //----------------------------------------------------- // DB server connect check //----------------------------------------------------- void mmo_auth_sqldb_sync (void) { // db connect check? or close? // ping pong DB server -if losted? then connect try. else crash. } //----------------------------------------------------- // close DB //----------------------------------------------------- void mmo_db_close (void) { //set log. sprintf (tmpsql, "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '', 'lserver','100', 'login server shutdown')", loginlog_db); //query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } //delete all server status sprintf (tmpsql, "DELETE FROM `sstatus`"); //query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } mysql_close (&mysql_handle); printf ("close DB connect....\n"); int i, fd; for (i = 0; i < MAX_SERVERS; i++) { if ((fd = server_fd[i]) >= 0) delete_session (fd); } delete_session (login_fd); } //----------------------------------------------------- // Make new account //----------------------------------------------------- int mmo_auth_sqldb_new (struct mmo_account *account, const char *tmpstr, char sex) { //no need on DB version printf ("Request new account.... - not support on this version\n"); return 0; } //----------------------------------------------------- // Make new account //----------------------------------------------------- int mmo_auth_new (struct mmo_account *account, const char *tmpstr, char sex) { return 0; } #ifdef LCCWIN32 extern void gettimeofday (struct timeval *t, struct timezone *dummy); #endif //----------------------------------------------------- // Auth //----------------------------------------------------- int mmo_auth (struct mmo_account *account, int fd) { struct timeval tv; time_t ban_until_time; char tmpstr[256]; char t_uid[256], t_pass[256]; char user_password[256]; MYSQL_RES *sql_res; MYSQL_ROW sql_row; //int sql_fields, sql_cnt; char md5str[64], md5bin[32]; char ip[16]; unsigned char *sin_addr = (unsigned char *) &session[fd]->client_addr.sin_addr; printf ("auth start...\n"); sprintf (ip, "%d.%d.%d.%d", sin_addr[0], sin_addr[1], sin_addr[2], sin_addr[3]); // auth start : time seed gettimeofday (&tv, NULL); strftime (tmpstr, 24, "%Y-%m-%d %H:%M:%S", gmtime (&(tv.tv_sec))); sprintf (tmpstr + 19, ".%03d", (int) tv.tv_usec / 1000); jstrescapecpy (t_uid, account->userid); jstrescapecpy (t_pass, account->passwd); // make query sprintf (tmpsql, "SELECT `%s`,`%s`,`%s`,`lastlogin`,`logincount`,`sex`,`connect_until`,`last_ip`,`ban_until`,`state`,`%s`" " FROM `%s` WHERE `%s`='%s'", login_db_account_id, login_db_userid, login_db_user_pass, login_db_level, login_db, login_db_userid, t_uid); //login {0-account_id/1-userid/2-user_pass/3-lastlogin/4-logincount/5-sex/6-connect_untl/7-last_ip/8-ban_until/9-state} // query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } sql_res = mysql_store_result (&mysql_handle); if (sql_res) { sql_row = mysql_fetch_row (sql_res); //row fetching if (!sql_row) { //there's no id. printf ("auth failed no account %s %s %s\n", tmpstr, account->userid, account->passwd); mysql_free_result (sql_res); return 0; } } else { printf ("mmo_auth DB result error ! \n"); return 0; } // Documented by CLOWNISIUS || LLRO || Gunstar lead this one with me // IF changed to diferent returns~ you get diferent responses from your msgstringtable.txt //Ireturn 2 == line 9 //Ireturn 5 == line 311 //Ireturn 6 == line 450 //Ireturn 7 == line 440 //Ireturn 8 == line 682 //Ireturn 9 == line 704 //Ireturn 10 == line 705 //Ireturn 11 == line 706 //Ireturn 12 == line 707 //Ireturn 13 == line 708 //Ireturn 14 == line 709 //Ireturn 15 == line 710 //Ireturn -1 == line 010 // Check status { if (atoi (sql_row[9]) == -3) { //id is banned mysql_free_result (sql_res); return -3; } else if (atoi (sql_row[9]) == -2) { //dynamic ban //id is banned mysql_free_result (sql_res); //add IP list. return -2; } if (use_md5_passwds) { MD5_String (account->passwd, user_password); } else { jstrescapecpy (user_password, account->passwd); } printf ("account id ok encval:%d\n", account->passwdenc); int encpasswdok = 0; #ifdef PASSWORDENC if (account->passwdenc > 0) { printf ("start md5calc..\n"); int j = account->passwdenc; if (j > 2) j = 1; do { if (j == 1) { sprintf (md5str, "%s%s", md5key, sql_row[2]); } else if (j == 2) { sprintf (md5str, "%s%s", sql_row[2], md5key); } else md5str[0] = 0; printf ("j:%d mdstr:%s\n", j, md5str); MD5_String2binary (md5str, md5bin); encpasswdok = (memcmp (user_password, md5bin, 16) == 0); } while (j < 2 && !encpasswdok && (j++) != account->passwdenc); //printf("key[%s] md5 [%s] ", md5key, md5); printf ("client [%s] accountpass [%s]\n", user_password, sql_row[2]); printf ("end md5calc..\n"); } #endif if ((strcmp (user_password, sql_row[2]) && !encpasswdok)) { if (account->passwdenc == 0) { printf ("auth failed pass error %s %s %s" RETCODE, tmpstr, account->userid, user_password); #ifdef PASSWORDENC } else { char logbuf[1024], *p = logbuf; int j; p += sprintf (p, "auth failed pass error %s %s recv-md5[", tmpstr, account->userid); for (j = 0; j < 16; j++) p += sprintf (p, "%02x", ((unsigned char *) user_password)[j]); p += sprintf (p, "] calc-md5["); for (j = 0; j < 16; j++) p += sprintf (p, "%02x", ((unsigned char *) md5bin)[j]); p += sprintf (p, "] md5key["); for (j = 0; j < md5keylen; j++) p += sprintf (p, "%02x", ((unsigned char *) md5key)[j]); p += sprintf (p, "]" RETCODE); printf ("%s\n", p); #endif } return 1; } printf ("auth ok %s %s" RETCODE, tmpstr, account->userid); } if (atoi (sql_row[9])) { switch (atoi (sql_row[9])) { // packet 0x006a value + 1 case 1: // 0 = Unregistered ID case 2: // 1 = Incorrect Password case 3: // 2 = This ID is expired case 4: // 3 = Rejected from Server case 5: // 4 = You have been blocked by the GM Team case 6: // 5 = Your Game's EXE file is not the latest version case 7: // 6 = Your are Prohibited to log in until %s case 8: // 7 = Server is jammed due to over populated case 9: // 8 = No MSG (actually, all states after 9 except 99 are No MSG, use only this) case 100: // 99 = This ID has been totally erased printf ("Auth Error #%d\n", atoi (sql_row[9])); return atoi (sql_row[9]) - 1; break; default: return 99; // 99 = ID has been totally erased break; } } /* // do not remove this section. this is meant for future, and current forums usage // as a login manager and CP for login server. [CLOWNISIUS] if (atoi(sql_row[10]) == 1) { return 4; } if (atoi(sql_row[10]) >= 5) { switch(atoi(sql_row[10])) { case 5: return 5; break; case 6: return 7; break; case 7: return 9; break; case 8: return 10; break; case 9: return 11; break; default: return 10; break; } } */ ban_until_time = atol (sql_row[8]); //login {0-account_id/1-userid/2-user_pass/3-lastlogin/4-logincount/5-sex/6-connect_untl/7-last_ip/8-ban_until/9-state} if (ban_until_time != 0) { // if account is banned strftime (tmpstr, 20, date_format, gmtime (&ban_until_time)); tmpstr[19] = '\0'; if (ban_until_time > time (NULL)) { // always banned return 6; // 6 = Your are Prohibited to log in until %s } else { // ban is finished // reset the ban time sprintf (tmpsql, "UPDATE `%s` SET `ban_until`='0' WHERE `%s`='%s'", login_db, login_db_userid, t_uid); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } } } if (atol (sql_row[6]) != 0 && atol (sql_row[6]) < time (NULL)) { return 2; // 2 = This ID is expired } account->account_id = atoi (sql_row[0]); account->login_id1 = rand (); account->login_id2 = rand (); memcpy (tmpstr, sql_row[3], 19); memcpy (account->lastlogin, tmpstr, 24); account->sex = sql_row[5][0] == 'S' ? 2 : sql_row[5][0] == 'M'; sprintf (tmpsql, "UPDATE `%s` SET `lastlogin` = NOW(), `logincount`=`logincount` +1, `last_ip`='%s' WHERE `%s` = '%s'", login_db, ip, login_db_userid, sql_row[1]); mysql_free_result (sql_res); //resource free if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } return -1; } // Send to char int charif_sendallwos (int sfd, unsigned char *buf, unsigned int len) { int i, c; int fd; c = 0; for (i = 0; i < MAX_SERVERS; i++) { if ((fd = server_fd[i]) > 0 && fd != sfd) { memcpy (WFIFOP (fd, 0), buf, len); WFIFOSET (fd, len); c++; } } return c; } //-------------------------------- // Char-server anti-freeze system //-------------------------------- int char_anti_freeze_system (int tid, unsigned int tick, int id, int data) { int i; for (i = 0; i < MAX_SERVERS; i++) { if (server_fd[i] >= 0) { // if char-server is online // printf("char_anti_freeze_system: server #%d '%s', flag: %d.\n", i, server[i].name, server_freezeflag[i]); if (server_freezeflag[i]-- < 1) { // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed session[server_fd[i]]->eof = 1; } } } return 0; } //----------------------------------------------------- // char-server packet parse //----------------------------------------------------- int parse_fromchar (int fd) { int i, id; MYSQL_RES *sql_res; MYSQL_ROW sql_row = NULL; unsigned char *p = (unsigned char *) &session[fd]->client_addr.sin_addr; char ip[16]; sprintf (ip, "%d.%d.%d.%d", p[0], p[1], p[2], p[3]); for (id = 0; id < MAX_SERVERS; id++) if (server_fd[id] == fd) break; if (id == MAX_SERVERS || session[fd]->eof) { if (id < MAX_SERVERS) { printf ("Char-server '%s' has disconnected.\n", server[id].name); server_fd[id] = -1; memset (&server[id], 0, sizeof (struct mmo_char_server)); // server delete sprintf (tmpsql, "DELETE FROM `sstatus` WHERE `index`='%d'", id); // query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } } close (fd); delete_session (fd); return 0; } while (RFIFOREST (fd) >= 2) { // printf("char_parse: %d %d packet case=%x\n", fd, RFIFOREST(fd), RFIFOW(fd, 0)); switch (RFIFOW (fd, 0)) { case 0x2712: if (RFIFOREST (fd) < 19) return 0; { int account_id; account_id = RFIFOL (fd, 2); // speed up for (i = 0; i < AUTH_FIFO_SIZE; i++) { if (auth_fifo[i].account_id == account_id && auth_fifo[i].login_id1 == RFIFOL (fd, 6) && #if CMP_AUTHFIFO_LOGIN2 != 0 auth_fifo[i].login_id2 == RFIFOL (fd, 10) && // relate to the versions higher than 18 #endif auth_fifo[i].sex == RFIFOB (fd, 14) && #if CMP_AUTHFIFO_IP != 0 auth_fifo[i].ip == RFIFOL (fd, 15) && #endif !auth_fifo[i].delflag) { auth_fifo[i].delflag = 1; printf ("auth -> %d\n", i); break; } } if (i != AUTH_FIFO_SIZE) { // send account_reg int p; time_t connect_until_time = 0; char email[40] = ""; account_id = RFIFOL (fd, 2); sprintf (tmpsql, "SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'", login_db, login_db_account_id, account_id); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } sql_res = mysql_store_result (&mysql_handle); if (sql_res) { sql_row = mysql_fetch_row (sql_res); connect_until_time = atol (sql_row[1]); strcpy (email, sql_row[0]); } mysql_free_result (sql_res); if (account_id > 0) { sprintf (tmpsql, "SELECT `str`,`value` FROM `global_reg_value` WHERE `type`='1' AND `account_id`='%d'", account_id); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } sql_res = mysql_store_result (&mysql_handle); if (sql_res) { WFIFOW (fd, 0) = 0x2729; WFIFOL (fd, 4) = account_id; for (p = 8; (sql_row = mysql_fetch_row (sql_res)); p += 36) { memcpy (WFIFOP (fd, p), sql_row[0], 32); WFIFOL (fd, p + 32) = atoi (sql_row[1]); } WFIFOW (fd, 2) = p; WFIFOSET (fd, p); //printf("account_reg2 send : login->char (auth fifo)\n"); WFIFOW (fd, 0) = 0x2713; WFIFOL (fd, 2) = account_id; WFIFOB (fd, 6) = 0; memcpy (WFIFOP (fd, 7), email, 40); WFIFOL (fd, 47) = (unsigned long) connect_until_time; WFIFOSET (fd, 51); } mysql_free_result (sql_res); } } else { WFIFOW (fd, 0) = 0x2713; WFIFOL (fd, 2) = account_id; WFIFOB (fd, 6) = 1; WFIFOSET (fd, 51); } } RFIFOSKIP (fd, 19); break; case 0x2714: if (RFIFOREST (fd) < 6) return 0; // how many users on world? (update) if (server[id].users != RFIFOL (fd, 2)) printf ("set users %s : %d\n", server[id].name, RFIFOL (fd, 2)); server[id].users = RFIFOL (fd, 2); if (anti_freeze_enable) server_freezeflag[id] = 5; // Char anti-freeze system. Counter. 5 ok, 4...0 freezed sprintf (tmpsql, "UPDATE `sstatus` SET `user` = '%d' WHERE `index` = '%d'", server[id].users, id); // query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } RFIFOSKIP (fd, 6); break; // We receive an e-mail/limited time request, because a player comes back from a map-server to the char-server case 0x2716: if (RFIFOREST (fd) < 6) return 0; { int account_id; time_t connect_until_time = 0; char email[40] = ""; account_id = RFIFOL (fd, 2); sprintf (tmpsql, "SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'", login_db, login_db_account_id, account_id); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } sql_res = mysql_store_result (&mysql_handle); if (sql_res) { sql_row = mysql_fetch_row (sql_res); connect_until_time = atol (sql_row[1]); strcpy (email, sql_row[0]); } mysql_free_result (sql_res); //printf("parse_fromchar: E-mail/limited time request from '%s' server (concerned account: %d)\n", server[id].name, RFIFOL(fd,2)); WFIFOW (fd, 0) = 0x2717; WFIFOL (fd, 2) = RFIFOL (fd, 2); memcpy (WFIFOP (fd, 6), email, 40); WFIFOL (fd, 46) = (unsigned long) connect_until_time; WFIFOSET (fd, 50); } RFIFOSKIP (fd, 6); break; case 0x2720: // GM if (RFIFOREST (fd) < 4) return 0; if (RFIFOREST (fd) < RFIFOW (fd, 2)) return 0; //oldacc = RFIFOL(fd,4); printf ("change GM isn't support in this login server version.\n"); printf ("change GM error 0 %s\n", RFIFOP (fd, 8)); RFIFOSKIP (fd, RFIFOW (fd, 2)); WFIFOW (fd, 0) = 0x2721; WFIFOL (fd, 2) = RFIFOL (fd, 4); // oldacc; WFIFOL (fd, 6) = 0; // newacc; WFIFOSET (fd, 10); return 0; // Map server send information to change an email of an account via char-server case 0x2722: // 0x2722 .L .40B .40B if (RFIFOREST (fd) < 86) return 0; { int acc; char actual_email[40], new_email[40]; acc = RFIFOL (fd, 2); memcpy (actual_email, RFIFOP (fd, 6), 40); memcpy (new_email, RFIFOP (fd, 46), 40); if (e_mail_check (actual_email) == 0) printf ("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command), but actual email is invalid (account: %d, ip: %s)" RETCODE, server[id].name, acc, ip); else if (e_mail_check (new_email) == 0) printf ("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a invalid new e-mail (account: %d, ip: %s)" RETCODE, server[id].name, acc, ip); else if (strcmpi (new_email, "a@a.com") == 0) printf ("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a default e-mail (account: %d, ip: %s)" RETCODE, server[id].name, acc, ip); else { sprintf (tmpsql, "SELECT `%s`,`email` FROM `%s` WHERE `%s` = '%d'", login_db_userid, login_db, login_db_account_id, acc); if (mysql_query (&mysql_handle, tmpsql)) printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); sql_res = mysql_store_result (&mysql_handle); if (sql_res) { sql_row = mysql_fetch_row (sql_res); //row fetching if (strcmpi (sql_row[1], actual_email) == 0) { sprintf (tmpsql, "UPDATE `%s` SET `email` = '%s' WHERE `%s` = '%d'", login_db, new_email, login_db_account_id, acc); // query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } printf ("Char-server '%s': Modify an e-mail on an account (@email GM command) (account: %d (%s), new e-mail: %s, ip: %s)." RETCODE, server[id].name, acc, sql_row[0], actual_email, ip); } } } } RFIFOSKIP (fd, 86); break; case 0x2724: // Receiving of map-server via char-server a status change resquest (by Yor) if (RFIFOREST (fd) < 10) return 0; { int acc, statut; acc = RFIFOL (fd, 2); statut = RFIFOL (fd, 6); sprintf (tmpsql, "SELECT `state` FROM `%s` WHERE `%s` = '%d'", login_db, login_db_account_id, acc); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } sql_res = mysql_store_result (&mysql_handle); if (sql_res) { sql_row = mysql_fetch_row (sql_res); // row fetching } if (atoi (sql_row[0]) != statut && statut != 0) { unsigned char buf[16]; WBUFW (buf, 0) = 0x2731; WBUFL (buf, 2) = acc; WBUFB (buf, 6) = 0; // 0: change of statut, 1: ban WBUFL (buf, 7) = statut; // status or final date of a banishment charif_sendallwos (-1, buf, 11); } sprintf (tmpsql, "UPDATE `%s` SET `state` = '%d' WHERE `%s` = '%d'", login_db, statut, login_db_account_id, acc); //query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } RFIFOSKIP (fd, 10); } return 0; case 0x2725: // Receiving of map-server via char-server a ban resquest (by Yor) if (RFIFOREST (fd) < 18) return 0; { int acc; struct tm *tmtime; time_t timestamp, tmptime; acc = RFIFOL (fd, 2); sprintf (tmpsql, "SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'", login_db, login_db_account_id, acc); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } sql_res = mysql_store_result (&mysql_handle); if (sql_res) { sql_row = mysql_fetch_row (sql_res); // row fetching } tmptime = atol (sql_row[0]); if (tmptime == 0 || tmptime < time (NULL)) timestamp = time (NULL); else timestamp = tmptime; tmtime = gmtime (×tamp); tmtime->tm_year = tmtime->tm_year + (short) RFIFOW (fd, 6); tmtime->tm_mon = tmtime->tm_mon + (short) RFIFOW (fd, 8); tmtime->tm_mday = tmtime->tm_mday + (short) RFIFOW (fd, 10); tmtime->tm_hour = tmtime->tm_hour + (short) RFIFOW (fd, 12); tmtime->tm_min = tmtime->tm_min + (short) RFIFOW (fd, 14); tmtime->tm_sec = tmtime->tm_sec + (short) RFIFOW (fd, 16); timestamp = timegm (tmtime); if (timestamp != -1) { if (timestamp <= time (NULL)) timestamp = 0; if (tmptime != timestamp) { if (timestamp != 0) { unsigned char buf[16]; WBUFW (buf, 0) = 0x2731; WBUFL (buf, 2) = acc; WBUFB (buf, 6) = 1; // 0: change of statut, 1: ban WBUFL (buf, 7) = timestamp; // status or final date of a banishment charif_sendallwos (-1, buf, 11); } printf ("Account: %d Banned until: %ld\n", acc, timestamp); sprintf (tmpsql, "UPDATE `%s` SET `ban_until` = '%ld', `state`='7' WHERE `%s` = '%d'", login_db, timestamp, login_db_account_id, acc); // query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } } } RFIFOSKIP (fd, 18); break; } return 0; case 0x2727: if (RFIFOREST (fd) < 6) return 0; { int acc, sex; unsigned char buf[16]; acc = RFIFOL (fd, 4); sprintf (tmpsql, "SELECT `sex` FROM `%s` WHERE `%s` = '%d'", login_db, login_db_account_id, acc); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); return 0; } sql_res = mysql_store_result (&mysql_handle); if (sql_res) { if (mysql_num_rows (sql_res) == 0) { mysql_free_result (sql_res); return 0; } sql_row = mysql_fetch_row (sql_res); //row fetching } if (strcmpi (sql_row[0], "M") == 0) sex = 1; else sex = 0; sprintf (tmpsql, "UPDATE `%s` SET `sex` = '%c' WHERE `%s` = '%d'", login_db, (sex == 0 ? 'M' : 'F'), login_db_account_id, acc); //query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } WBUFW (buf, 0) = 0x2723; WBUFL (buf, 2) = acc; WBUFB (buf, 6) = sex; charif_sendallwos (-1, buf, 7); RFIFOSKIP (fd, 6); } return 0; case 0x2728: // save account_reg if (RFIFOREST (fd) < 4 || RFIFOREST (fd) < RFIFOW (fd, 2)) return 0; { int acc, p, j; char str[32]; char temp_str[32]; int value; acc = RFIFOL (fd, 4); if (acc > 0) { unsigned char buf[RFIFOW (fd, 2) + 1]; for (p = 8, j = 0; p < RFIFOW (fd, 2) && j < ACCOUNT_REG2_NUM; p += 36, j++) { memcpy (str, RFIFOP (fd, p), 32); value = RFIFOL (fd, p + 32); sprintf (tmpsql, "DELETE FROM `global_reg_value` WHERE `type`='1' AND `account_id`='%d' AND `str`='%s';", acc, jstrescapecpy (temp_str, str)); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } sprintf (tmpsql, "INSERT INTO `global_reg_value` (`type`, `account_id`, `str`, `value`) VALUES ( 1 , '%d' , '%s' , '%d');", acc, jstrescapecpy (temp_str, str), value); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } } // Send to char memcpy (WBUFP (buf, 0), RFIFOP (fd, 0), RFIFOW (fd, 2)); WBUFW (buf, 0) = 0x2729; charif_sendallwos (fd, buf, WBUFW (buf, 2)); } } RFIFOSKIP (fd, RFIFOW (fd, 2)); //printf("login: save account_reg (from char)\n"); break; case 0x272a: // Receiving of map-server via char-server a unban resquest (by Yor) if (RFIFOREST (fd) < 6) return 0; { int acc; acc = RFIFOL (fd, 2); sprintf (tmpsql, "SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'", login_db, login_db_account_id, acc); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } sql_res = mysql_store_result (&mysql_handle); if (sql_res) { sql_row = mysql_fetch_row (sql_res); //row fetching } if (atol (sql_row[0]) != 0) { sprintf (tmpsql, "UPDATE `%s` SET `ban_until` = '0', `state`='0' WHERE `%s` = '%d'", login_db, login_db_account_id, acc); //query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } break; } RFIFOSKIP (fd, 6); } return 0; default: printf ("login: unknown packet %x! (from char).\n", RFIFOW (fd, 0)); session[fd]->eof = 1; return 0; } } return 0; } //Lan ip check added by Kashy int lan_ip_check (unsigned char *p) { int y; int lancheck = 1; int lancharip[4]; unsigned int k0, k1, k2, k3; sscanf (lan_char_ip, "%d.%d.%d.%d", &k0, &k1, &k2, &k3); lancharip[0] = k0; lancharip[1] = k1; lancharip[2] = k2; lancharip[3] = k3; for (y = 0; y < 4; y++) { if ((lancharip[y] & subnetmaski[y]) != (p[y])) lancheck = 0; break; } printf ("LAN check: %s.\n", (lancheck) ? "\033[1;32mLAN\033[0m" : "\033[1;31mWAN\033[0m"); return lancheck; } //---------------------------------------------------------------------------------------- // Default packet parsing (normal players or administation/char-server connection requests) //---------------------------------------------------------------------------------------- int parse_login (int fd) { //int len; MYSQL_RES *sql_res; MYSQL_ROW sql_row = NULL; char t_uid[100]; //int sql_fields, sql_cnt; struct mmo_account account; int result, i; unsigned char *p = (unsigned char *) &session[fd]->client_addr.sin_addr; char ip[16]; sprintf (ip, "%d.%d.%d.%d", p[0], p[1], p[2], p[3]); if (ipban > 0) { //ip ban //p[0], p[1], p[2], p[3] //request DB connection //check sprintf (tmpsql, "SELECT count(*) FROM `ipbanlist` WHERE `list` = '%d.*.*.*' OR `list` = '%d.%d.*.*' OR `list` = '%d.%d.%d.*' OR `list` = '%d.%d.%d.%d'", p[0], p[0], p[1], p[0], p[1], p[2], p[0], p[1], p[2], p[3]); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } sql_res = mysql_store_result (&mysql_handle); sql_row = mysql_fetch_row (sql_res); //row fetching if (atoi (sql_row[0]) > 0) { // ip ban ok. printf ("packet from banned ip : %d.%d.%d.%d" RETCODE, p[0], p[1], p[2], p[3]); sprintf (tmpsql, "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', 'unknown','-3', 'ip banned')", loginlog_db, p[0], p[1], p[2], p[3]); // query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } printf ("close session connection...\n"); // close connection session[fd]->eof = 1; } else { printf ("packet from ip (ban check ok) : %d.%d.%d.%d" RETCODE, p[0], p[1], p[2], p[3]); } mysql_free_result (sql_res); } if (session[fd]->eof) { for (i = 0; i < MAX_SERVERS; i++) if (server_fd[i] == fd) server_fd[i] = -1; close (fd); delete_session (fd); return 0; } while (RFIFOREST (fd) >= 2) { printf ("parse_login : %d %d packet case=%x\n", fd, RFIFOREST (fd), RFIFOW (fd, 0)); switch (RFIFOW (fd, 0)) { case 0x200: // New alive packet: structure: 0x200 .24B. used to verify if client is always alive. if (RFIFOREST (fd) < 26) return 0; RFIFOSKIP (fd, 26); break; case 0x204: // New alive packet: structure: 0x204 .16B. (new ragexe from 22 june 2004) if (RFIFOREST (fd) < 18) return 0; RFIFOSKIP (fd, 18); break; case 0x64: // request client login case 0x01dd: // request client login with encrypt if (RFIFOREST (fd) < ((RFIFOW (fd, 0) == 0x64) ? 55 : 47)) return 0; printf ("client connection request %s from %d.%d.%d.%d\n", RFIFOP (fd, 6), p[0], p[1], p[2], p[3]); account.userid = RFIFOP (fd, 6); account.passwd = RFIFOP (fd, 30); #ifdef PASSWORDENC account.passwdenc = (RFIFOW (fd, 0) == 0x64) ? 0 : PASSWORDENC; #else account.passwdenc = 0; #endif result = mmo_auth (&account, fd); jstrescapecpy (t_uid, RFIFOP (fd, 6)); if (result == -1) { int gm_level = isGM (account.account_id); if (min_level_to_connect > gm_level) { WFIFOW (fd, 0) = 0x81; WFIFOL (fd, 2) = 1; // 01 = Server closed WFIFOSET (fd, 3); } else { if (p[0] != 127) { sprintf (tmpsql, "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s','100', 'login ok')", loginlog_db, p[0], p[1], p[2], p[3], t_uid); //query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } } if (gm_level) printf ("Connection of the GM (level:%d) account '%s' accepted.\n", gm_level, account.userid); else printf ("Connection of the account '%s' accepted.\n", account.userid); server_num = 0; for (i = 0; i < MAX_SERVERS; i++) { if (server_fd[i] >= 0) { //Lan check added by Kashy if (lan_ip_check (p)) WFIFOL (fd, 47 + server_num * 32) = inet_addr (lan_char_ip); else WFIFOL (fd, 47 + server_num * 32) = server[i].ip; WFIFOW (fd, 47 + server_num * 32 + 4) = server[i].port; memcpy (WFIFOP (fd, 47 + server_num * 32 + 6), server[i].name, 20); WFIFOW (fd, 47 + server_num * 32 + 26) = server[i].users; WFIFOW (fd, 47 + server_num * 32 + 28) = server[i].maintenance; WFIFOW (fd, 47 + server_num * 32 + 30) = server[i].new; server_num++; } } // if at least 1 char-server if (server_num > 0) { WFIFOW (fd, 0) = 0x69; WFIFOW (fd, 2) = 47 + 32 * server_num; WFIFOL (fd, 4) = account.login_id1; WFIFOL (fd, 8) = account.account_id; WFIFOL (fd, 12) = account.login_id2; WFIFOL (fd, 16) = 0; memcpy (WFIFOP (fd, 20), account.lastlogin, 24); WFIFOB (fd, 46) = account.sex; WFIFOSET (fd, 47 + 32 * server_num); if (auth_fifo_pos >= AUTH_FIFO_SIZE) auth_fifo_pos = 0; auth_fifo[auth_fifo_pos].account_id = account.account_id; auth_fifo[auth_fifo_pos].login_id1 = account.login_id1; auth_fifo[auth_fifo_pos].login_id2 = account.login_id2; auth_fifo[auth_fifo_pos].sex = account.sex; auth_fifo[auth_fifo_pos].delflag = 0; auth_fifo[auth_fifo_pos].ip = session[fd]->client_addr.sin_addr.s_addr; auth_fifo_pos++; } else { WFIFOW (fd, 0) = 0x81; WFIFOL (fd, 2) = 1; // 01 = Server closed WFIFOSET (fd, 3); } } } else { char tmp_sql[512]; char error[64]; sprintf (tmp_sql, "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s', '%d','login failed : %%s')", loginlog_db, p[0], p[1], p[2], p[3], t_uid, result); switch ((result + 1)) { case -2: //-3 = Account Banned sprintf (tmpsql, tmp_sql, "Account banned."); sprintf (error, "Account banned."); break; case -1: //-2 = Dynamic Ban sprintf (tmpsql, tmp_sql, "dynamic ban (ip and account)."); sprintf (error, "dynamic ban (ip and account)."); break; case 1: // 0 = Unregistered ID sprintf (tmpsql, tmp_sql, "Unregisterd ID."); sprintf (error, "Unregisterd ID."); break; case 2: // 1 = Incorrect Password sprintf (tmpsql, tmp_sql, "Incorrect Password."); sprintf (error, "Incorrect Password."); break; case 3: // 2 = This ID is expired sprintf (tmpsql, tmp_sql, "Account Expired."); sprintf (error, "Account Expired."); break; case 4: // 3 = Rejected from Server sprintf (tmpsql, tmp_sql, "Rejected from server."); sprintf (error, "Rejected from server."); break; case 5: // 4 = You have been blocked by the GM Team sprintf (tmpsql, tmp_sql, "Blocked by GM."); sprintf (error, "Blocked by GM."); break; case 6: // 5 = Your Game's EXE file is not the latest version sprintf (tmpsql, tmp_sql, "Not latest game EXE."); sprintf (error, "Not latest game EXE."); break; case 7: // 6 = Your are Prohibited to log in until %s sprintf (tmpsql, tmp_sql, "Banned."); sprintf (error, "Banned."); break; case 8: // 7 = Server is jammed due to over populated sprintf (tmpsql, tmp_sql, "Server Over-population."); sprintf (error, "Server Over-population."); break; case 9: // 8 = No MSG (actually, all states after 9 except 99 are No MSG, use only this) sprintf (tmpsql, tmp_sql, " "); sprintf (error, " "); break; case 100: // 99 = This ID has been totally erased sprintf (tmpsql, tmp_sql, "Account gone."); sprintf (error, "Account gone."); break; default: sprintf (tmpsql, tmp_sql, "Uknown Error."); sprintf (error, "Uknown Error."); break; } //query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } if ((result == 1) && (dynamic_pass_failure_ban != 0)) { // failed password sprintf (tmpsql, "SELECT count(*) FROM `%s` WHERE `ip` = '%d.%d.%d.%d' AND `rcode` = '1' AND `time` > NOW() - INTERVAL %d MINUTE", loginlog_db, p[0], p[1], p[2], p[3], dynamic_pass_failure_ban_time); //how many times filed account? in one ip. if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } //check query result sql_res = mysql_store_result (&mysql_handle); sql_row = mysql_fetch_row (sql_res); //row fetching if (atoi (sql_row[0]) >= dynamic_pass_failure_ban_how_many) { sprintf (tmpsql, "INSERT INTO `ipbanlist`(`list`,`btime`,`rtime`,`reason`) VALUES ('%d.%d.%d.*', NOW() , NOW() + INTERVAL %d MINUTE ,'Password error ban: %s')", p[0], p[1], p[2], dynamic_pass_failure_ban_how_long, t_uid); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } } mysql_free_result (sql_res); } else if (result == -2) { //dynamic banned - add ip to ban list. sprintf (tmpsql, "INSERT INTO `ipbanlist`(`list`,`btime`,`rtime`,`reason`) VALUES ('%d.%d.%d.*', NOW() , NOW() + INTERVAL 1 MONTH ,'Dynamic banned user id : %s')", p[0], p[1], p[2], t_uid); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } result = -3; } sprintf (tmpsql, "SELECT `ban_until` FROM `%s` WHERE `%s` = '%s'", login_db, login_db_userid, t_uid); if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } sql_res = mysql_store_result (&mysql_handle); if (sql_res) { sql_row = mysql_fetch_row (sql_res); //row fetching } //cannot connect login failed memset (WFIFOP (fd, 0), '\0', 23); WFIFOW (fd, 0) = 0x6a; WFIFOB (fd, 2) = result; if (result == 6) { // 6 = Your are Prohibited to log in until %s if (atol (sql_row[0]) != 0) { // if account is banned, we send ban timestamp char tmpstr[256]; time_t ban_until_time; ban_until_time = atol (sql_row[0]); strftime (tmpstr, 20, date_format, gmtime (&ban_until_time)); tmpstr[19] = '\0'; memcpy (WFIFOP (fd, 3), tmpstr, 20); } else { // we send error message memcpy (WFIFOP (fd, 3), error, 20); } } WFIFOSET (fd, 23); } RFIFOSKIP (fd, (RFIFOW (fd, 0) == 0x64) ? 55 : 47); break; case 0x01db: // request password key if (session[fd]->session_data) { printf ("login: abnormal request of MD5 key (already opened session).\n"); session[fd]->eof = 1; return 0; } printf ("Request Password key -%s\n", md5key); RFIFOSKIP (fd, 2); WFIFOW (fd, 0) = 0x01dc; WFIFOW (fd, 2) = 4 + md5keylen; memcpy (WFIFOP (fd, 4), md5key, md5keylen); WFIFOSET (fd, WFIFOW (fd, 2)); break; case 0x2710: // request Char-server connection if (RFIFOREST (fd) < 86) return 0; { sprintf (tmpsql, "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s@%s','100', 'charserver - %s@%d.%d.%d.%d:%d')", loginlog_db, p[0], p[1], p[2], p[3], RFIFOP (fd, 2), RFIFOP (fd, 60), RFIFOP (fd, 60), RFIFOB (fd, 54), RFIFOB (fd, 55), RFIFOB (fd, 56), RFIFOB (fd, 57), RFIFOW (fd, 58)); //query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } printf ("server connection request %s @ %d.%d.%d.%d:%d (%d.%d.%d.%d)\n", RFIFOP (fd, 60), RFIFOB (fd, 54), RFIFOB (fd, 55), RFIFOB (fd, 56), RFIFOB (fd, 57), RFIFOW (fd, 58), p[0], p[1], p[2], p[3]); unsigned char *server_name; account.userid = RFIFOP (fd, 2); account.passwd = RFIFOP (fd, 26); account.passwdenc = 0; server_name = RFIFOP (fd, 60); result = mmo_auth (&account, fd); //printf("Result: %d - Sex: %d - Account ID: %d\n",result,account.sex,(int) account.account_id); if (result == -1 && account.sex == 2 && account.account_id < MAX_SERVERS && server_fd[account.account_id] == -1) { printf ("Connection of the char-server '%s' accepted.\n", server_name); memset (&server[account.account_id], 0, sizeof (struct mmo_char_server)); server[account.account_id].ip = RFIFOL (fd, 54); server[account.account_id].port = RFIFOW (fd, 58); memcpy (server[account.account_id].name, RFIFOP (fd, 60), 20); server[account.account_id].users = 0; server[account.account_id].maintenance = RFIFOW (fd, 82); server[account.account_id].new = RFIFOW (fd, 84); server_fd[account.account_id] = fd; if (anti_freeze_enable) server_freezeflag[account.account_id] = 5; // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed sprintf (tmpsql, "DELETE FROM `sstatus` WHERE `index`='%ld'", account.account_id); //query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } jstrescapecpy (t_uid, server[account.account_id].name); sprintf (tmpsql, "INSERT INTO `sstatus`(`index`,`name`,`user`) VALUES ( '%ld', '%s', '%d')", account.account_id, server[account.account_id].name, 0); //query if (mysql_query (&mysql_handle, tmpsql)) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } WFIFOW (fd, 0) = 0x2711; WFIFOB (fd, 2) = 0; WFIFOSET (fd, 3); session[fd]->func_parse = parse_fromchar; realloc_fifo (fd, FIFOSIZE_SERVERLINK, FIFOSIZE_SERVERLINK); } else { WFIFOW (fd, 0) = 0x2711; WFIFOB (fd, 2) = 3; WFIFOSET (fd, 3); } } RFIFOSKIP (fd, 86); return 0; case 0x7530: // request Athena information WFIFOW (fd, 0) = 0x7531; WFIFOB (fd, 2) = ATHENA_MAJOR_VERSION; WFIFOB (fd, 3) = ATHENA_MINOR_VERSION; WFIFOB (fd, 4) = ATHENA_REVISION; WFIFOB (fd, 5) = ATHENA_RELEASE_FLAG; WFIFOB (fd, 6) = ATHENA_OFFICIAL_FLAG; WFIFOB (fd, 7) = ATHENA_SERVER_LOGIN; WFIFOW (fd, 8) = ATHENA_MOD_VERSION; WFIFOSET (fd, 10); RFIFOSKIP (fd, 2); printf ("Athena version check...\n"); break; case 0x7532: default: printf ("End of connection (ip: %s)" RETCODE, ip); session[fd]->eof = 1; return 0; } } return 0; } //------------------------------------------------- // Return numerical value of a switch configuration // on/off, english, français, deutsch, español //------------------------------------------------- int config_switch (const char *str) { if (strcmpi (str, "on") == 0 || strcmpi (str, "yes") == 0 || strcmpi (str, "oui") == 0 || strcmpi (str, "ja") == 0 || strcmpi (str, "si") == 0) return 1; if (strcmpi (str, "off") == 0 || strcmpi (str, "no") == 0 || strcmpi (str, "non") == 0 || strcmpi (str, "nein") == 0) return 0; return atoi (str); } //Lan Support conf reading added by Kashy int login_lan_config_read (const char *lancfgName) { int i; char subnetmask[128]; char line[1024], w1[1024], w2[1024]; FILE *fp; fp = fopen_ (lancfgName, "r"); if (fp == NULL) { printf ("file not found: %s\n", lancfgName); return 1; } printf ("Start reading of Lan Support configuration file\n"); while (fgets (line, sizeof (line) - 1, fp)) { if (line[0] == '/' && line[1] == '/') continue; i = sscanf (line, "%[^:]: %[^\r\n]", w1, w2); if (i != 2) continue; else if (strcmpi (w1, "lan_char_ip") == 0) { strcpy (lan_char_ip, w2); printf ("set Lan_Char_IP : %s\n", w2); } else if (strcmpi (w1, "subnetmask") == 0) { strcpy (subnetmask, w2); unsigned int k0, k1, k2, k3; sscanf (subnetmask, "%d.%d.%d.%d", &k0, &k1, &k2, &k3); subnetmaski[0] = k0; subnetmaski[1] = k1; subnetmaski[2] = k2; subnetmaski[3] = k3; printf ("set subnetmask : %s\n", w2); } } fclose_ (fp); { unsigned int a0, a1, a2, a3; unsigned char p[4]; sscanf (lan_char_ip, "%d.%d.%d.%d", &a0, &a1, &a2, &a3); p[0] = a0; p[1] = a1; p[2] = a2; p[3] = a3; printf ("LAN test of LAN IP of the char-server: "); if (lan_ip_check (p) == 0) { printf ("\033[1;31m***ERROR: LAN IP of the char-server doesn't belong to the specified Sub-network\033[0m\n"); } } printf ("End reading of Lan Support configuration file\n"); return 0; } //----------------------------------------------------- //BANNED IP CHECK. //----------------------------------------------------- int ip_ban_check (int tid, unsigned int tick, int id, int data) { //query if (mysql_query (&mysql_handle, "DELETE FROM `ipbanlist` WHERE `rtime` <= NOW()")) { printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); } return 0; } //----------------------------------------------------- // reading configuration //----------------------------------------------------- int login_config_read (const char *cfgName) { int i; char line[1024], w1[1024], w2[1024]; FILE *fp; fp = fopen_ (cfgName, "r"); if (fp == NULL) { printf ("Configuration file (%s) not found.\n", cfgName); return 1; } printf ("start reading configuration...\n"); while (fgets (line, sizeof (line) - 1, fp)) { if (line[0] == '/' && line[1] == '/') continue; i = sscanf (line, "%[^:]: %[^\r\n]", w1, w2); if (i != 2) continue; else if (strcmpi (w1, "login_port") == 0) { login_port = atoi (w2); printf ("set login_port : %s\n", w2); } else if (strcmpi (w1, "ipban") == 0) { ipban = atoi (w2); printf ("set ipban : %d\n", ipban); } //account ban -> ip ban else if (strcmpi (w1, "dynamic_account_ban") == 0) { dynamic_account_ban = atoi (w2); printf ("set dynamic_account_ban : %d\n", dynamic_account_ban); } else if (strcmpi (w1, "dynamic_account_ban_class") == 0) { dynamic_account_ban_class = atoi (w2); printf ("set dynamic_account_ban_class : %d\n", dynamic_account_ban_class); } //dynamic password error ban else if (strcmpi (w1, "dynamic_pass_failure_ban") == 0) { dynamic_pass_failure_ban = atoi (w2); printf ("set dynamic_pass_failure_ban : %d\n", dynamic_pass_failure_ban); } else if (strcmpi (w1, "dynamic_pass_failure_ban_time") == 0) { dynamic_pass_failure_ban_time = atoi (w2); printf ("set dynamic_pass_failure_ban_time : %d\n", dynamic_pass_failure_ban_time); } else if (strcmpi (w1, "dynamic_pass_failure_ban_how_many") == 0) { dynamic_pass_failure_ban_how_many = atoi (w2); printf ("set dynamic_pass_failure_ban_how_many : %d\n", dynamic_pass_failure_ban_how_many); } else if (strcmpi (w1, "dynamic_pass_failure_ban_how_long") == 0) { dynamic_pass_failure_ban_how_long = atoi (w2); printf ("set dynamic_pass_failure_ban_how_long : %d\n", dynamic_pass_failure_ban_how_long); } else if (strcmpi (w1, "anti_freeze_enable") == 0) { anti_freeze_enable = config_switch (w2); } else if (strcmpi (w1, "anti_freeze_interval") == 0) { ANTI_FREEZE_INTERVAL = atoi (w2); if (ANTI_FREEZE_INTERVAL < 5) ANTI_FREEZE_INTERVAL = 5; // minimum 5 seconds } else if (strcmpi (w1, "import") == 0) { login_config_read (w2); } else if (strcmpi (w1, "use_MD5_passwords") == 0) { if (!strcmpi (w2, "yes")) { use_md5_passwds = 1; } else if (!strcmpi (w2, "no")) { use_md5_passwds = 0; } printf ("Using MD5 Passwords: %s \n", w2); } else if (strcmpi (w1, "date_format") == 0) { // note: never have more than 19 char for the date! switch (atoi (w2)) { case 0: strcpy (date_format, "%d-%m-%Y %H:%M:%S"); // 31-12-2004 23:59:59 break; case 1: strcpy (date_format, "%m-%d-%Y %H:%M:%S"); // 12-31-2004 23:59:59 break; case 2: strcpy (date_format, "%Y-%d-%m %H:%M:%S"); // 2004-31-12 23:59:59 break; case 3: strcpy (date_format, "%Y-%m-%d %H:%M:%S"); // 2004-12-31 23:59:59 break; } } else if (strcmpi (w1, "min_level_to_connect") == 0) { min_level_to_connect = atoi (w2); } else if (strcmpi (w1, "check_ip_flag") == 0) { check_ip_flag = config_switch (w2); } } fclose_ (fp); printf ("End reading configuration...\n"); return 0; } void sql_config_read (const char *cfgName) { /* Kalaspuff, to get login_db */ int i; char line[1024], w1[1024], w2[1024]; printf ("reading configure: %s\n", cfgName); FILE *fp = fopen_ (cfgName, "r"); if (fp == NULL) { printf ("file not found: %s\n", cfgName); exit (1); } while (fgets (line, sizeof (line) - 1, fp)) { if (line[0] == '/' && line[1] == '/') continue; i = sscanf (line, "%[^:]: %[^\r\n]", w1, w2); if (i != 2) continue; if (strcmpi (w1, "login_db") == 0) { strcpy (login_db, w2); } //add for DB connection else if (strcmpi (w1, "login_server_ip") == 0) { strcpy (login_server_ip, w2); printf ("set login_server_ip : %s\n", w2); } else if (strcmpi (w1, "login_server_port") == 0) { login_server_port = atoi (w2); printf ("set login_server_port : %s\n", w2); } else if (strcmpi (w1, "login_server_id") == 0) { strcpy (login_server_id, w2); printf ("set login_server_id : %s\n", w2); } else if (strcmpi (w1, "login_server_pw") == 0) { strcpy (login_server_pw, w2); printf ("set login_server_pw : %s\n", w2); } else if (strcmpi (w1, "login_server_db") == 0) { strcpy (login_server_db, w2); printf ("set login_server_db : %s\n", w2); } //added for custom column names for custom login table else if (strcmpi (w1, "login_db_account_id") == 0) { strcpy (login_db_account_id, w2); } else if (strcmpi (w1, "login_db_userid") == 0) { strcpy (login_db_userid, w2); } else if (strcmpi (w1, "login_db_user_pass") == 0) { strcpy (login_db_user_pass, w2); } else if (strcmpi (w1, "login_db_level") == 0) { strcpy (login_db_level, w2); } //end of custom table config else if (strcmpi (w1, "loginlog_db") == 0) { strcpy (loginlog_db, w2); } } fclose_ (fp); printf ("reading configure done.....\n"); } int do_init (int argc, char **argv) { //initialize login server int i; //read login configue login_config_read ((argc > 1) ? argv[1] : LOGIN_CONF_NAME); sql_config_read (SQL_CONF_NAME); login_lan_config_read ((argc > 1) ? argv[1] : LAN_CONF_NAME); //Generate Passworded Key. printf ("memset md5key \n"); memset (md5key, 0, sizeof (md5key)); printf ("memset md5key complete\n"); printf ("memset keyleng\n"); md5keylen = rand () % 4 + 12; for (i = 0; i < md5keylen; i++) md5key[i] = rand () % 255 + 1; printf ("memset keyleng complete\n"); printf ("set FIFO Size\n"); for (i = 0; i < AUTH_FIFO_SIZE; i++) auth_fifo[i].delflag = 1; printf ("set FIFO Size complete\n"); printf ("set max servers\n"); for (i = 0; i < MAX_SERVERS; i++) server_fd[i] = -1; printf ("set max servers complete\n"); //server port open & binding login_fd = make_listen_port (login_port); //Auth start printf ("Running mmo_auth_sqldb_init()\n"); mmo_auth_sqldb_init (); printf ("finished mmo_auth_sqldb_init()\n"); //sync account when terminating. //but no need when you using DBMS (mysql) set_termfunc (mmo_db_close); //set default parser as parse_login function set_defaultparse (parse_login); if (anti_freeze_enable > 0) { add_timer_func_list (char_anti_freeze_system, "char_anti_freeze_system"); i = add_timer_interval (gettick () + 1000, char_anti_freeze_system, 0, 0, ANTI_FREEZE_INTERVAL * 1000); } // ban deleter timer - 1 minute term printf ("add interval tic (ip_ban_check)....\n"); i = add_timer_interval (gettick () + 10, ip_ban_check, 0, 0, 60 * 1000); printf ("The login-server is \033[1;32mready\033[0m (Server is listening on the port %d).\n\n", login_port); return 0; }