3 Copyright (C) 2015 nerzhul, Loic Blot <loic.blot@unix-experience.fr>
5 This program is free software; you can redistribute it and/or modify
6 it under the terms of the GNU Lesser General Public License as published by
7 the Free Software Foundation; either version 2.1 of the License, or
8 (at your option) any later version.
10 This program is distributed in the hope that it will be useful,
11 but WITHOUT ANY WARRANTY; without even the implied warranty of
12 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 GNU Lesser General Public License for more details.
15 You should have received a copy of the GNU Lesser General Public License along
16 with this program; if not, write to the Free Software Foundation, Inc.,
17 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
23 #include "content_abm.h"
24 #include "content_sao.h"
28 #include "rollback_interface.h"
29 #include "scripting_game.h"
33 #include "network/networkprotocol.h"
34 #include "network/serveropcodes.h"
35 #include "util/auth.h"
36 #include "util/base64.h"
37 #include "util/pointedthing.h"
38 #include "util/serialize.h"
41 void Server::handleCommand_Deprecated(NetworkPacket* pkt)
43 infostream << "Server: " << toServerCommandTable[pkt->getCommand()].name
44 << " not supported anymore" << std::endl;
47 void Server::handleCommand_Init(NetworkPacket* pkt)
50 if(pkt->getSize() < 1)
53 RemoteClient* client = getClient(pkt->getPeerId(), CS_Created);
57 Address address = getPeerAddress(pkt->getPeerId());
58 addr_s = address.serializeString();
60 catch (con::PeerNotFoundException &e) {
62 * no peer for this packet found
63 * most common reason is peer timeout, e.g. peer didn't
64 * respond for some time, your server was overloaded or
67 infostream << "Server::ProcessData(): Canceling: peer "
68 << pkt->getPeerId() << " not found" << std::endl;
72 // If net_proto_version is set, this client has already been handled
73 if (client->getState() > CS_Created) {
74 verbosestream << "Server: Ignoring multiple TOSERVER_INITs from "
75 << addr_s << " (peer_id=" << pkt->getPeerId() << ")" << std::endl;
79 verbosestream << "Server: Got TOSERVER_INIT from " << addr_s << " (peer_id="
80 << pkt->getPeerId() << ")" << std::endl;
82 // Do not allow multiple players in simple singleplayer mode.
83 // This isn't a perfect way to do it, but will suffice for now
84 if (m_simple_singleplayer_mode && m_clients.getClientIDs().size() > 1) {
85 infostream << "Server: Not allowing another client (" << addr_s
86 << ") to connect in simple singleplayer mode" << std::endl;
87 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_SINGLEPLAYER);
91 // First byte after command is maximum supported
92 // serialization version
95 u16 min_net_proto_version = 0;
96 u16 max_net_proto_version;
97 std::string playerName;
99 *pkt >> client_max >> supp_compr_modes >> min_net_proto_version
100 >> max_net_proto_version >> playerName;
102 u8 our_max = SER_FMT_VER_HIGHEST_READ;
103 // Use the highest version supported by both
104 u8 depl_serial_v = std::min(client_max, our_max);
105 // If it's lower than the lowest supported, give up.
106 if (depl_serial_v < SER_FMT_VER_LOWEST)
107 depl_serial_v = SER_FMT_VER_INVALID;
109 if (depl_serial_v == SER_FMT_VER_INVALID) {
110 actionstream << "Server: A mismatched client tried to connect from "
111 << addr_s << std::endl;
112 infostream<<"Server: Cannot negotiate serialization version with "
113 << addr_s << std::endl;
114 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_WRONG_VERSION);
118 client->setPendingSerializationVersion(depl_serial_v);
121 Read and check network protocol version
124 u16 net_proto_version = 0;
126 // Figure out a working version if it is possible at all
127 if (max_net_proto_version >= SERVER_PROTOCOL_VERSION_MIN ||
128 min_net_proto_version <= SERVER_PROTOCOL_VERSION_MAX) {
129 // If maximum is larger than our maximum, go with our maximum
130 if (max_net_proto_version > SERVER_PROTOCOL_VERSION_MAX)
131 net_proto_version = SERVER_PROTOCOL_VERSION_MAX;
132 // Else go with client's maximum
134 net_proto_version = max_net_proto_version;
137 verbosestream << "Server: " << addr_s << ": Protocol version: min: "
138 << min_net_proto_version << ", max: " << max_net_proto_version
139 << ", chosen: " << net_proto_version << std::endl;
141 client->net_proto_version = net_proto_version;
143 // On this handler at least protocol version 25 is required
144 if (net_proto_version < 25 ||
145 net_proto_version < SERVER_PROTOCOL_VERSION_MIN ||
146 net_proto_version > SERVER_PROTOCOL_VERSION_MAX) {
147 actionstream << "Server: A mismatched client tried to connect from "
148 << addr_s << std::endl;
149 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_WRONG_VERSION);
153 if (g_settings->getBool("strict_protocol_version_checking")) {
154 if (net_proto_version != LATEST_PROTOCOL_VERSION) {
155 actionstream << "Server: A mismatched (strict) client tried to "
156 << "connect from " << addr_s << std::endl;
157 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_WRONG_VERSION);
165 const char* playername = playerName.c_str();
167 size_t pns = playerName.size();
168 if (pns == 0 || pns > PLAYERNAME_SIZE) {
169 actionstream << "Server: Player with "
170 << ((pns > PLAYERNAME_SIZE) ? "a too long" : "an empty")
171 << " name tried to connect from " << addr_s << std::endl;
172 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_WRONG_NAME);
176 if (string_allowed(playerName, PLAYERNAME_ALLOWED_CHARS) == false) {
177 actionstream << "Server: Player with an invalid name "
178 << "tried to connect from " << addr_s << std::endl;
179 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_WRONG_CHARS_IN_NAME);
183 m_clients.setPlayerName(pkt->getPeerId(), playername);
184 //TODO (later) case insensitivity
186 std::string legacyPlayerNameCasing = playerName;
188 if (!isSingleplayer() && strcasecmp(playername, "singleplayer") == 0) {
189 actionstream << "Server: Player with the name \"singleplayer\" "
190 << "tried to connect from " << addr_s << std::endl;
191 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_WRONG_NAME);
197 if (m_script->on_prejoinplayer(playername, addr_s, &reason)) {
198 actionstream << "Server: Player with the name \"" << playerName << "\" "
199 << "tried to connect from " << addr_s << " "
200 << "but it was disallowed for the following reason: "
201 << reason << std::endl;
202 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_CUSTOM_STRING,
208 infostream << "Server: New connection: \"" << playerName << "\" from "
209 << addr_s << " (peer_id=" << pkt->getPeerId() << ")" << std::endl;
211 // Enforce user limit.
212 // Don't enforce for users that have some admin right
213 if (m_clients.getClientIDs(CS_Created).size() >= g_settings->getU16("max_users") &&
214 !checkPriv(playername, "server") &&
215 !checkPriv(playername, "ban") &&
216 !checkPriv(playername, "privs") &&
217 !checkPriv(playername, "password") &&
218 playername != g_settings->get("name")) {
219 actionstream << "Server: " << playername << " tried to join from "
220 << addr_s << ", but there" << " are already max_users="
221 << g_settings->getU16("max_users") << " players." << std::endl;
222 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_TOO_MANY_USERS);
227 Compose auth methods for answer
229 std::string encpwd; // encrypted Password field for the user
230 bool has_auth = m_script->getAuth(playername, &encpwd, NULL);
233 client->chosen_mech = AUTH_MECHANISM_NONE;
236 std::vector<std::string> pwd_components = str_split(encpwd, '#');
237 if (pwd_components.size() == 4) {
238 if (pwd_components[1] == "1") { // 1 means srp
239 auth_mechs |= AUTH_MECHANISM_SRP;
240 client->enc_pwd = encpwd;
242 actionstream << "User " << playername
243 << " tried to log in, but password field"
244 << " was invalid (unknown mechcode)." << std::endl;
245 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_SERVER_FAIL);
248 } else if (base64_is_valid(encpwd)) {
249 auth_mechs |= AUTH_MECHANISM_LEGACY_PASSWORD;
250 client->enc_pwd = encpwd;
252 actionstream << "User " << playername
253 << " tried to log in, but password field"
254 << " was invalid (invalid base64)." << std::endl;
255 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_SERVER_FAIL);
259 std::string default_password = g_settings->get("default_password");
260 if (default_password.length() == 0) {
261 auth_mechs |= AUTH_MECHANISM_FIRST_SRP;
263 // Take care of default passwords.
264 client->enc_pwd = getSRPVerifier(playerName, default_password);
265 auth_mechs |= AUTH_MECHANISM_SRP;
270 Answer with a TOCLIENT_HELLO
273 verbosestream << "Sending TOCLIENT_HELLO with auth method field: "
274 << auth_mechs << std::endl;
276 NetworkPacket resp_pkt(TOCLIENT_HELLO, 1 + 4
277 + legacyPlayerNameCasing.size(), pkt->getPeerId());
279 u16 depl_compress_mode = NETPROTO_COMPRESSION_NONE;
280 resp_pkt << depl_serial_v << depl_compress_mode << net_proto_version
281 << auth_mechs << legacyPlayerNameCasing;
285 client->allowed_auth_mechs = auth_mechs;
286 client->setDeployedCompressionMode(depl_compress_mode);
288 m_clients.event(pkt->getPeerId(), CSE_Hello);
291 void Server::handleCommand_Init_Legacy(NetworkPacket* pkt)
293 // [0] u8 SER_FMT_VER_HIGHEST_READ
294 // [1] u8[20] player_name
295 // [21] u8[28] password <--- can be sent without this, from old versions
297 if (pkt->getSize() < 1+PLAYERNAME_SIZE)
300 RemoteClient* client = getClient(pkt->getPeerId(), CS_Created);
304 Address address = getPeerAddress(pkt->getPeerId());
305 addr_s = address.serializeString();
307 catch (con::PeerNotFoundException &e) {
309 * no peer for this packet found
310 * most common reason is peer timeout, e.g. peer didn't
311 * respond for some time, your server was overloaded or
314 infostream << "Server::ProcessData(): Canceling: peer "
315 << pkt->getPeerId() << " not found" << std::endl;
319 // If net_proto_version is set, this client has already been handled
320 if (client->getState() > CS_Created) {
321 verbosestream << "Server: Ignoring multiple TOSERVER_INITs from "
322 << addr_s << " (peer_id=" << pkt->getPeerId() << ")" << std::endl;
326 verbosestream << "Server: Got TOSERVER_INIT_LEGACY from " << addr_s << " (peer_id="
327 << pkt->getPeerId() << ")" << std::endl;
329 // Do not allow multiple players in simple singleplayer mode.
330 // This isn't a perfect way to do it, but will suffice for now
331 if (m_simple_singleplayer_mode && m_clients.getClientIDs().size() > 1) {
332 infostream << "Server: Not allowing another client (" << addr_s
333 << ") to connect in simple singleplayer mode" << std::endl;
334 DenyAccess_Legacy(pkt->getPeerId(), L"Running in simple singleplayer mode.");
338 // First byte after command is maximum supported
339 // serialization version
344 u8 our_max = SER_FMT_VER_HIGHEST_READ;
345 // Use the highest version supported by both
346 int deployed = std::min(client_max, our_max);
347 // If it's lower than the lowest supported, give up.
348 if (deployed < SER_FMT_VER_LOWEST)
349 deployed = SER_FMT_VER_INVALID;
351 if (deployed == SER_FMT_VER_INVALID) {
352 actionstream << "Server: A mismatched client tried to connect from "
353 << addr_s << std::endl;
354 infostream<<"Server: Cannot negotiate serialization version with "
355 << addr_s << std::endl;
356 DenyAccess_Legacy(pkt->getPeerId(), std::wstring(
357 L"Your client's version is not supported.\n"
358 L"Server version is ")
359 + narrow_to_wide(g_version_string) + L"."
364 client->setPendingSerializationVersion(deployed);
367 Read and check network protocol version
370 u16 min_net_proto_version = 0;
371 if (pkt->getSize() >= 1 + PLAYERNAME_SIZE + PASSWORD_SIZE + 2)
372 min_net_proto_version = pkt->getU16(1 + PLAYERNAME_SIZE + PASSWORD_SIZE);
374 // Use same version as minimum and maximum if maximum version field
375 // doesn't exist (backwards compatibility)
376 u16 max_net_proto_version = min_net_proto_version;
377 if (pkt->getSize() >= 1 + PLAYERNAME_SIZE + PASSWORD_SIZE + 2 + 2)
378 max_net_proto_version = pkt->getU16(1 + PLAYERNAME_SIZE + PASSWORD_SIZE + 2);
380 // Start with client's maximum version
381 u16 net_proto_version = max_net_proto_version;
383 // Figure out a working version if it is possible at all
384 if (max_net_proto_version >= SERVER_PROTOCOL_VERSION_MIN ||
385 min_net_proto_version <= SERVER_PROTOCOL_VERSION_MAX) {
386 // If maximum is larger than our maximum, go with our maximum
387 if (max_net_proto_version > SERVER_PROTOCOL_VERSION_MAX)
388 net_proto_version = SERVER_PROTOCOL_VERSION_MAX;
389 // Else go with client's maximum
391 net_proto_version = max_net_proto_version;
394 // The client will send up to date init packet, ignore this one
395 if (net_proto_version >= 25)
398 verbosestream << "Server: " << addr_s << ": Protocol version: min: "
399 << min_net_proto_version << ", max: " << max_net_proto_version
400 << ", chosen: " << net_proto_version << std::endl;
402 client->net_proto_version = net_proto_version;
404 if (net_proto_version < SERVER_PROTOCOL_VERSION_MIN ||
405 net_proto_version > SERVER_PROTOCOL_VERSION_MAX) {
406 actionstream << "Server: A mismatched client tried to connect from "
407 << addr_s << std::endl;
408 DenyAccess_Legacy(pkt->getPeerId(), std::wstring(
409 L"Your client's version is not supported.\n"
410 L"Server version is ")
411 + narrow_to_wide(g_version_string) + L",\n"
412 + L"server's PROTOCOL_VERSION is "
413 + narrow_to_wide(itos(SERVER_PROTOCOL_VERSION_MIN))
415 + narrow_to_wide(itos(SERVER_PROTOCOL_VERSION_MAX))
416 + L", client's PROTOCOL_VERSION is "
417 + narrow_to_wide(itos(min_net_proto_version))
419 + narrow_to_wide(itos(max_net_proto_version))
424 if (g_settings->getBool("strict_protocol_version_checking")) {
425 if (net_proto_version != LATEST_PROTOCOL_VERSION) {
426 actionstream << "Server: A mismatched (strict) client tried to "
427 << "connect from " << addr_s << std::endl;
428 DenyAccess_Legacy(pkt->getPeerId(), std::wstring(
429 L"Your client's version is not supported.\n"
430 L"Server version is ")
431 + narrow_to_wide(g_version_string) + L",\n"
432 + L"server's PROTOCOL_VERSION (strict) is "
433 + narrow_to_wide(itos(LATEST_PROTOCOL_VERSION))
434 + L", client's PROTOCOL_VERSION is "
435 + narrow_to_wide(itos(min_net_proto_version))
437 + narrow_to_wide(itos(max_net_proto_version))
446 char playername[PLAYERNAME_SIZE];
447 unsigned int playername_length = 0;
448 for (; playername_length < PLAYERNAME_SIZE; playername_length++ ) {
449 playername[playername_length] = pkt->getChar(1+playername_length);
450 if (pkt->getChar(1+playername_length) == 0)
454 if (playername_length == PLAYERNAME_SIZE) {
455 actionstream << "Server: Player with name exceeding max length "
456 << "tried to connect from " << addr_s << std::endl;
457 DenyAccess_Legacy(pkt->getPeerId(), L"Name too long");
462 if (playername[0]=='\0') {
463 actionstream << "Server: Player with an empty name "
464 << "tried to connect from " << addr_s << std::endl;
465 DenyAccess_Legacy(pkt->getPeerId(), L"Empty name");
469 if (string_allowed(playername, PLAYERNAME_ALLOWED_CHARS) == false) {
470 actionstream << "Server: Player with an invalid name "
471 << "tried to connect from " << addr_s << std::endl;
472 DenyAccess_Legacy(pkt->getPeerId(), L"Name contains unallowed characters");
476 if (!isSingleplayer() && strcasecmp(playername, "singleplayer") == 0) {
477 actionstream << "Server: Player with the name \"singleplayer\" "
478 << "tried to connect from " << addr_s << std::endl;
479 DenyAccess_Legacy(pkt->getPeerId(), L"Name is not allowed");
485 if (m_script->on_prejoinplayer(playername, addr_s, &reason)) {
486 actionstream << "Server: Player with the name \"" << playername << "\" "
487 << "tried to connect from " << addr_s << " "
488 << "but it was disallowed for the following reason: "
489 << reason << std::endl;
490 DenyAccess_Legacy(pkt->getPeerId(), narrow_to_wide(reason.c_str()));
495 infostream<<"Server: New connection: \""<<playername<<"\" from "
496 <<addr_s<<" (peer_id="<<pkt->getPeerId()<<")"<<std::endl;
499 char given_password[PASSWORD_SIZE];
500 if (pkt->getSize() < 1 + PLAYERNAME_SIZE + PASSWORD_SIZE) {
501 // old version - assume blank password
502 given_password[0] = 0;
505 for (u16 i = 0; i < PASSWORD_SIZE - 1; i++) {
506 given_password[i] = pkt->getChar(21 + i);
508 given_password[PASSWORD_SIZE - 1] = 0;
511 if (!base64_is_valid(given_password)) {
512 actionstream << "Server: " << playername
513 << " supplied invalid password hash" << std::endl;
514 DenyAccess_Legacy(pkt->getPeerId(), L"Invalid password hash");
518 // Enforce user limit.
519 // Don't enforce for users that have some admin right
520 if (m_clients.getClientIDs(CS_Created).size() >= g_settings->getU16("max_users") &&
521 !checkPriv(playername, "server") &&
522 !checkPriv(playername, "ban") &&
523 !checkPriv(playername, "privs") &&
524 !checkPriv(playername, "password") &&
525 playername != g_settings->get("name")) {
526 actionstream << "Server: " << playername << " tried to join, but there"
527 << " are already max_users="
528 << g_settings->getU16("max_users") << " players." << std::endl;
529 DenyAccess_Legacy(pkt->getPeerId(), L"Too many users.");
533 std::string checkpwd; // Password hash to check against
534 bool has_auth = m_script->getAuth(playername, &checkpwd, NULL);
536 // If no authentication info exists for user, create it
538 if (!isSingleplayer() &&
539 g_settings->getBool("disallow_empty_password") &&
540 std::string(given_password) == "") {
541 actionstream << "Server: " << playername
542 << " supplied empty password" << std::endl;
543 DenyAccess_Legacy(pkt->getPeerId(), L"Empty passwords are "
544 L"disallowed. Set a password and try again.");
547 std::string raw_default_password =
548 g_settings->get("default_password");
549 std::string initial_password =
550 translatePassword(playername, raw_default_password);
552 // If default_password is empty, allow any initial password
553 if (raw_default_password.length() == 0)
554 initial_password = given_password;
556 m_script->createAuth(playername, initial_password);
559 has_auth = m_script->getAuth(playername, &checkpwd, NULL);
562 actionstream << "Server: " << playername << " cannot be authenticated"
563 << " (auth handler does not work?)" << std::endl;
564 DenyAccess_Legacy(pkt->getPeerId(), L"Not allowed to login");
568 if (given_password != checkpwd) {
569 actionstream << "Server: " << playername << " supplied wrong password"
571 DenyAccess_Legacy(pkt->getPeerId(), L"Wrong password");
575 RemotePlayer *player =
576 static_cast<RemotePlayer*>(m_env->getPlayer(playername));
578 if (player && player->peer_id != 0) {
579 actionstream << "Server: " << playername << ": Failed to emerge player"
580 << " (player allocated to an another client)" << std::endl;
581 DenyAccess_Legacy(pkt->getPeerId(), L"Another client is connected with this "
582 L"name. If your client closed unexpectedly, try again in "
586 m_clients.setPlayerName(pkt->getPeerId(), playername);
589 Answer with a TOCLIENT_INIT
592 NetworkPacket resp_pkt(TOCLIENT_INIT_LEGACY, 1 + 6 + 8 + 4,
595 resp_pkt << (u8) deployed << (v3s16) floatToInt(v3f(0,0,0), BS)
596 << (u64) m_env->getServerMap().getSeed()
597 << g_settings->getFloat("dedicated_server_step");
600 m_clients.event(pkt->getPeerId(), CSE_InitLegacy);
603 void Server::handleCommand_Init2(NetworkPacket* pkt)
605 verbosestream << "Server: Got TOSERVER_INIT2 from "
606 << pkt->getPeerId() << std::endl;
608 m_clients.event(pkt->getPeerId(), CSE_GotInit2);
609 u16 protocol_version = m_clients.getProtocolVersion(pkt->getPeerId());
612 ///// begin compatibility code
613 PlayerSAO* playersao = NULL;
614 if (protocol_version <= 22) {
615 playersao = StageTwoClientInit(pkt->getPeerId());
617 if (playersao == NULL) {
619 << "TOSERVER_INIT2 stage 2 client init failed for peer "
620 << pkt->getPeerId() << std::endl;
624 ///// end compatibility code
627 Send some initialization data
630 infostream << "Server: Sending content to "
631 << getPlayerName(pkt->getPeerId()) << std::endl;
633 // Send player movement settings
634 SendMovement(pkt->getPeerId());
636 // Send item definitions
637 SendItemDef(pkt->getPeerId(), m_itemdef, protocol_version);
639 // Send node definitions
640 SendNodeDef(pkt->getPeerId(), m_nodedef, protocol_version);
642 m_clients.event(pkt->getPeerId(), CSE_SetDefinitionsSent);
644 // Send media announcement
645 sendMediaAnnouncement(pkt->getPeerId());
647 // Send detached inventories
648 sendDetachedInventories(pkt->getPeerId());
651 u16 time = m_env->getTimeOfDay();
652 float time_speed = g_settings->getFloat("time_speed");
653 SendTimeOfDay(pkt->getPeerId(), time, time_speed);
655 ///// begin compatibility code
656 if (protocol_version <= 22) {
657 m_clients.event(pkt->getPeerId(), CSE_SetClientReady);
658 m_script->on_joinplayer(playersao);
660 ///// end compatibility code
662 // Warnings about protocol version can be issued here
663 if (getClient(pkt->getPeerId())->net_proto_version < LATEST_PROTOCOL_VERSION) {
664 SendChatMessage(pkt->getPeerId(), L"# Server: WARNING: YOUR CLIENT'S "
665 L"VERSION MAY NOT BE FULLY COMPATIBLE WITH THIS SERVER!");
669 void Server::handleCommand_RequestMedia(NetworkPacket* pkt)
671 std::vector<std::string> tosend;
676 infostream << "Sending " << numfiles << " files to "
677 << getPlayerName(pkt->getPeerId()) << std::endl;
678 verbosestream << "TOSERVER_REQUEST_MEDIA: " << std::endl;
680 for (u16 i = 0; i < numfiles; i++) {
685 tosend.push_back(name);
686 verbosestream << "TOSERVER_REQUEST_MEDIA: requested file "
687 << name << std::endl;
690 sendRequestedMedia(pkt->getPeerId(), tosend);
693 void Server::handleCommand_ReceivedMedia(NetworkPacket* pkt)
697 void Server::handleCommand_ClientReady(NetworkPacket* pkt)
699 u16 peer_id = pkt->getPeerId();
700 u16 peer_proto_ver = getClient(peer_id, CS_InitDone)->net_proto_version;
702 // clients <= protocol version 22 did not send ready message,
703 // they're already initialized
704 if (peer_proto_ver <= 22) {
705 infostream << "Client sent message not expected by a "
706 << "client using protocol version <= 22,"
707 << "disconnecting peer_id: " << peer_id << std::endl;
708 m_con.DisconnectPeer(peer_id);
712 PlayerSAO* playersao = StageTwoClientInit(peer_id);
714 if (playersao == NULL) {
716 << "TOSERVER_CLIENT_READY stage 2 client init failed for peer_id: "
717 << peer_id << std::endl;
718 m_con.DisconnectPeer(peer_id);
723 if (pkt->getSize() < 8) {
725 << "TOSERVER_CLIENT_READY client sent inconsistent data, disconnecting peer_id: "
726 << peer_id << std::endl;
727 m_con.DisconnectPeer(peer_id);
731 u8 major_ver, minor_ver, patch_ver, reserved;
732 std::string full_ver;
733 *pkt >> major_ver >> minor_ver >> patch_ver >> reserved >> full_ver;
735 m_clients.setClientVersion(
736 peer_id, major_ver, minor_ver, patch_ver,
739 m_clients.event(peer_id, CSE_SetClientReady);
740 m_script->on_joinplayer(playersao);
743 void Server::handleCommand_GotBlocks(NetworkPacket* pkt)
745 if (pkt->getSize() < 1)
759 RemoteClient *client = getClient(pkt->getPeerId());
761 for (u16 i = 0; i < count; i++) {
762 if ((s16)pkt->getSize() < 1 + (i + 1) * 6)
763 throw con::InvalidIncomingDataException
764 ("GOTBLOCKS length is too short");
773 void Server::handleCommand_PlayerPos(NetworkPacket* pkt)
775 if (pkt->getSize() < 12 + 12 + 4 + 4)
779 s32 f32pitch, f32yaw;
786 f32 pitch = (f32)f32pitch / 100.0;
787 f32 yaw = (f32)f32yaw / 100.0;
790 if (pkt->getSize() >= 12 + 12 + 4 + 4 + 4)
793 v3f position((f32)ps.X / 100.0, (f32)ps.Y / 100.0, (f32)ps.Z / 100.0);
794 v3f speed((f32)ss.X / 100.0, (f32)ss.Y / 100.0, (f32)ss.Z / 100.0);
796 pitch = modulo360f(pitch);
797 yaw = modulo360f(yaw);
799 Player *player = m_env->getPlayer(pkt->getPeerId());
800 if (player == NULL) {
801 errorstream << "Server::ProcessData(): Canceling: "
802 "No player for peer_id=" << pkt->getPeerId()
803 << " disconnecting peer!" << std::endl;
804 m_con.DisconnectPeer(pkt->getPeerId());
808 // If player is dead we don't care of this packet
809 if (player->isDead()) {
810 verbosestream << "TOSERVER_PLAYERPOS: " << player->getName()
811 << " is dead. Ignoring packet";
815 PlayerSAO *playersao = player->getPlayerSAO();
816 if (playersao == NULL) {
817 errorstream << "Server::ProcessData(): Canceling: "
818 "No player object for peer_id=" << pkt->getPeerId()
819 << " disconnecting peer!" << std::endl;
820 m_con.DisconnectPeer(pkt->getPeerId());
824 player->setPosition(position);
825 player->setSpeed(speed);
826 player->setPitch(pitch);
828 player->keyPressed = keyPressed;
829 player->control.up = (keyPressed & 1);
830 player->control.down = (keyPressed & 2);
831 player->control.left = (keyPressed & 4);
832 player->control.right = (keyPressed & 8);
833 player->control.jump = (keyPressed & 16);
834 player->control.aux1 = (keyPressed & 32);
835 player->control.sneak = (keyPressed & 64);
836 player->control.LMB = (keyPressed & 128);
837 player->control.RMB = (keyPressed & 256);
839 if (playersao->checkMovementCheat()) {
841 m_script->on_cheat(playersao, "moved_too_fast");
842 SendMovePlayer(pkt->getPeerId());
846 void Server::handleCommand_DeletedBlocks(NetworkPacket* pkt)
848 if (pkt->getSize() < 1)
862 RemoteClient *client = getClient(pkt->getPeerId());
864 for (u16 i = 0; i < count; i++) {
865 if ((s16)pkt->getSize() < 1 + (i + 1) * 6)
866 throw con::InvalidIncomingDataException
867 ("DELETEDBLOCKS length is too short");
871 client->SetBlockNotSent(p);
875 void Server::handleCommand_InventoryAction(NetworkPacket* pkt)
877 Player *player = m_env->getPlayer(pkt->getPeerId());
878 if (player == NULL) {
879 errorstream << "Server::ProcessData(): Canceling: "
880 "No player for peer_id=" << pkt->getPeerId()
881 << " disconnecting peer!" << std::endl;
882 m_con.DisconnectPeer(pkt->getPeerId());
886 PlayerSAO *playersao = player->getPlayerSAO();
887 if (playersao == NULL) {
888 errorstream << "Server::ProcessData(): Canceling: "
889 "No player object for peer_id=" << pkt->getPeerId()
890 << " disconnecting peer!" << std::endl;
891 m_con.DisconnectPeer(pkt->getPeerId());
895 // Strip command and create a stream
896 std::string datastring(pkt->getString(0), pkt->getSize());
897 verbosestream << "TOSERVER_INVENTORY_ACTION: data=" << datastring
899 std::istringstream is(datastring, std::ios_base::binary);
901 InventoryAction *a = InventoryAction::deSerialize(is);
903 infostream << "TOSERVER_INVENTORY_ACTION: "
904 << "InventoryAction::deSerialize() returned NULL"
909 // If something goes wrong, this player is to blame
910 RollbackScopeActor rollback_scope(m_rollback,
911 std::string("player:")+player->getName());
914 Note: Always set inventory not sent, to repair cases
915 where the client made a bad prediction.
919 Handle restrictions and special cases of the move action
921 if (a->getType() == IACTION_MOVE) {
922 IMoveAction *ma = (IMoveAction*)a;
924 ma->from_inv.applyCurrentPlayer(player->getName());
925 ma->to_inv.applyCurrentPlayer(player->getName());
927 setInventoryModified(ma->from_inv, false);
928 setInventoryModified(ma->to_inv, false);
930 bool from_inv_is_current_player =
931 (ma->from_inv.type == InventoryLocation::PLAYER) &&
932 (ma->from_inv.name == player->getName());
934 bool to_inv_is_current_player =
935 (ma->to_inv.type == InventoryLocation::PLAYER) &&
936 (ma->to_inv.name == player->getName());
939 Disable moving items out of craftpreview
941 if (ma->from_list == "craftpreview") {
942 infostream << "Ignoring IMoveAction from "
943 << (ma->from_inv.dump()) << ":" << ma->from_list
944 << " to " << (ma->to_inv.dump()) << ":" << ma->to_list
945 << " because src is " << ma->from_list << std::endl;
951 Disable moving items into craftresult and craftpreview
953 if (ma->to_list == "craftpreview" || ma->to_list == "craftresult") {
954 infostream << "Ignoring IMoveAction from "
955 << (ma->from_inv.dump()) << ":" << ma->from_list
956 << " to " << (ma->to_inv.dump()) << ":" << ma->to_list
957 << " because dst is " << ma->to_list << std::endl;
962 // Disallow moving items in elsewhere than player's inventory
963 // if not allowed to interact
964 if (!checkPriv(player->getName(), "interact") &&
965 (!from_inv_is_current_player ||
966 !to_inv_is_current_player)) {
967 infostream << "Cannot move outside of player's inventory: "
968 << "No interact privilege" << std::endl;
974 Handle restrictions and special cases of the drop action
976 else if (a->getType() == IACTION_DROP) {
977 IDropAction *da = (IDropAction*)a;
979 da->from_inv.applyCurrentPlayer(player->getName());
981 setInventoryModified(da->from_inv, false);
984 Disable dropping items out of craftpreview
986 if (da->from_list == "craftpreview") {
987 infostream << "Ignoring IDropAction from "
988 << (da->from_inv.dump()) << ":" << da->from_list
989 << " because src is " << da->from_list << std::endl;
994 // Disallow dropping items if not allowed to interact
995 if (!checkPriv(player->getName(), "interact")) {
1001 Handle restrictions and special cases of the craft action
1003 else if (a->getType() == IACTION_CRAFT) {
1004 ICraftAction *ca = (ICraftAction*)a;
1006 ca->craft_inv.applyCurrentPlayer(player->getName());
1008 setInventoryModified(ca->craft_inv, false);
1010 //bool craft_inv_is_current_player =
1011 // (ca->craft_inv.type == InventoryLocation::PLAYER) &&
1012 // (ca->craft_inv.name == player->getName());
1014 // Disallow crafting if not allowed to interact
1015 if (!checkPriv(player->getName(), "interact")) {
1016 infostream << "Cannot craft: "
1017 << "No interact privilege" << std::endl;
1024 a->apply(this, playersao, this);
1028 SendInventory(playersao);
1031 void Server::handleCommand_ChatMessage(NetworkPacket* pkt)
1041 std::wstring message;
1042 for (u16 i = 0; i < len; i++) {
1046 message += (wchar_t)tmp_wchar;
1049 Player *player = m_env->getPlayer(pkt->getPeerId());
1050 if (player == NULL) {
1051 errorstream << "Server::ProcessData(): Canceling: "
1052 "No player for peer_id=" << pkt->getPeerId()
1053 << " disconnecting peer!" << std::endl;
1054 m_con.DisconnectPeer(pkt->getPeerId());
1058 // If something goes wrong, this player is to blame
1059 RollbackScopeActor rollback_scope(m_rollback,
1060 std::string("player:")+player->getName());
1062 // Get player name of this client
1063 std::wstring name = narrow_to_wide(player->getName());
1066 bool ate = m_script->on_chat_message(player->getName(),
1067 wide_to_narrow(message));
1068 // If script ate the message, don't proceed
1072 // Line to send to players
1074 // Whether to send to the player that sent the line
1075 bool send_to_sender_only = false;
1077 // Commands are implemented in Lua, so only catch invalid
1078 // commands that were not "eaten" and send an error back
1079 if (message[0] == L'/') {
1080 message = message.substr(1);
1081 send_to_sender_only = true;
1082 if (message.length() == 0)
1083 line += L"-!- Empty command";
1085 line += L"-!- Invalid command: " + str_split(message, L' ')[0];
1088 if (checkPriv(player->getName(), "shout")) {
1094 line += L"-!- You don't have permission to shout.";
1095 send_to_sender_only = true;
1102 Send the message to sender
1104 if (send_to_sender_only) {
1105 SendChatMessage(pkt->getPeerId(), line);
1108 Send the message to others
1111 actionstream << "CHAT: " << wide_to_narrow(line)<<std::endl;
1113 std::vector<u16> clients = m_clients.getClientIDs();
1115 for (std::vector<u16>::iterator i = clients.begin();
1116 i != clients.end(); ++i) {
1117 if (*i != pkt->getPeerId())
1118 SendChatMessage(*i, line);
1124 void Server::handleCommand_Damage(NetworkPacket* pkt)
1130 Player *player = m_env->getPlayer(pkt->getPeerId());
1131 if (player == NULL) {
1132 errorstream << "Server::ProcessData(): Canceling: "
1133 "No player for peer_id=" << pkt->getPeerId()
1134 << " disconnecting peer!" << std::endl;
1135 m_con.DisconnectPeer(pkt->getPeerId());
1139 PlayerSAO *playersao = player->getPlayerSAO();
1140 if (playersao == NULL) {
1141 errorstream << "Server::ProcessData(): Canceling: "
1142 "No player object for peer_id=" << pkt->getPeerId()
1143 << " disconnecting peer!" << std::endl;
1144 m_con.DisconnectPeer(pkt->getPeerId());
1148 if (g_settings->getBool("enable_damage")) {
1149 actionstream << player->getName() << " damaged by "
1150 << (int)damage << " hp at " << PP(player->getPosition() / BS)
1153 playersao->setHP(playersao->getHP() - damage);
1154 SendPlayerHPOrDie(playersao->getPeerID(), playersao->getHP() == 0);
1158 void Server::handleCommand_Breath(NetworkPacket* pkt)
1164 Player *player = m_env->getPlayer(pkt->getPeerId());
1165 if (player == NULL) {
1166 errorstream << "Server::ProcessData(): Canceling: "
1167 "No player for peer_id=" << pkt->getPeerId()
1168 << " disconnecting peer!" << std::endl;
1169 m_con.DisconnectPeer(pkt->getPeerId());
1174 * If player is dead, we don't need to update the breath
1177 if (player->isDead()) {
1178 verbosestream << "TOSERVER_BREATH: " << player->getName()
1179 << " is dead. Ignoring packet";
1184 PlayerSAO *playersao = player->getPlayerSAO();
1185 if (playersao == NULL) {
1186 errorstream << "Server::ProcessData(): Canceling: "
1187 "No player object for peer_id=" << pkt->getPeerId()
1188 << " disconnecting peer!" << std::endl;
1189 m_con.DisconnectPeer(pkt->getPeerId());
1193 playersao->setBreath(breath);
1194 SendPlayerBreath(pkt->getPeerId());
1197 void Server::handleCommand_Password(NetworkPacket* pkt)
1199 if (pkt->getSize() != PASSWORD_SIZE * 2)
1205 // Deny for clients using the new protocol
1206 RemoteClient* client = getClient(pkt->getPeerId(), CS_Created);
1207 if (client->net_proto_version >= 25) {
1208 infostream << "Server::handleCommand_Password(): Denying change: "
1209 << " Client protocol version for peer_id=" << pkt->getPeerId()
1210 << " too new!" << std::endl;
1214 for (u16 i = 0; i < PASSWORD_SIZE - 1; i++) {
1215 char c = pkt->getChar(i);
1221 for (u16 i = 0; i < PASSWORD_SIZE - 1; i++) {
1222 char c = pkt->getChar(PASSWORD_SIZE + i);
1228 Player *player = m_env->getPlayer(pkt->getPeerId());
1229 if (player == NULL) {
1230 errorstream << "Server::ProcessData(): Canceling: "
1231 "No player for peer_id=" << pkt->getPeerId()
1232 << " disconnecting peer!" << std::endl;
1233 m_con.DisconnectPeer(pkt->getPeerId());
1237 if (!base64_is_valid(newpwd)) {
1238 infostream<<"Server: " << player->getName() <<
1239 " supplied invalid password hash" << std::endl;
1240 // Wrong old password supplied!!
1241 SendChatMessage(pkt->getPeerId(), L"Invalid new password hash supplied. Password NOT changed.");
1245 infostream << "Server: Client requests a password change from "
1246 << "'" << oldpwd << "' to '" << newpwd << "'" << std::endl;
1248 std::string playername = player->getName();
1250 std::string checkpwd;
1251 m_script->getAuth(playername, &checkpwd, NULL);
1253 if (oldpwd != checkpwd) {
1254 infostream << "Server: invalid old password" << std::endl;
1255 // Wrong old password supplied!!
1256 SendChatMessage(pkt->getPeerId(), L"Invalid old password supplied. Password NOT changed.");
1260 bool success = m_script->setPassword(playername, newpwd);
1262 actionstream << player->getName() << " changes password" << std::endl;
1263 SendChatMessage(pkt->getPeerId(), L"Password change successful.");
1265 actionstream << player->getName() << " tries to change password but "
1266 << "it fails" << std::endl;
1267 SendChatMessage(pkt->getPeerId(), L"Password change failed or unavailable.");
1271 void Server::handleCommand_PlayerItem(NetworkPacket* pkt)
1273 if (pkt->getSize() < 2)
1276 Player *player = m_env->getPlayer(pkt->getPeerId());
1277 if (player == NULL) {
1278 errorstream << "Server::ProcessData(): Canceling: "
1279 "No player for peer_id=" << pkt->getPeerId()
1280 << " disconnecting peer!" << std::endl;
1281 m_con.DisconnectPeer(pkt->getPeerId());
1285 PlayerSAO *playersao = player->getPlayerSAO();
1286 if (playersao == NULL) {
1287 errorstream << "Server::ProcessData(): Canceling: "
1288 "No player object for peer_id=" << pkt->getPeerId()
1289 << " disconnecting peer!" << std::endl;
1290 m_con.DisconnectPeer(pkt->getPeerId());
1298 playersao->setWieldIndex(item);
1301 void Server::handleCommand_Respawn(NetworkPacket* pkt)
1303 Player *player = m_env->getPlayer(pkt->getPeerId());
1304 if (player == NULL) {
1305 errorstream << "Server::ProcessData(): Canceling: "
1306 "No player for peer_id=" << pkt->getPeerId()
1307 << " disconnecting peer!" << std::endl;
1308 m_con.DisconnectPeer(pkt->getPeerId());
1312 if (!player->isDead())
1315 RespawnPlayer(pkt->getPeerId());
1317 actionstream << player->getName() << " respawns at "
1318 << PP(player->getPosition()/BS) << std::endl;
1320 // ActiveObject is added to environment in AsyncRunStep after
1321 // the previous addition has been successfully removed
1324 void Server::handleCommand_Interact(NetworkPacket* pkt)
1326 std::string datastring(pkt->getString(0), pkt->getSize());
1327 std::istringstream is(datastring, std::ios_base::binary);
1333 [5] u32 length of the next item
1334 [9] serialized PointedThing
1336 0: start digging (from undersurface) or use
1337 1: stop digging (all parameters ignored)
1338 2: digging completed
1339 3: place block or item (to abovesurface)
1342 u8 action = readU8(is);
1343 u16 item_i = readU16(is);
1344 std::istringstream tmp_is(deSerializeLongString(is), std::ios::binary);
1345 PointedThing pointed;
1346 pointed.deSerialize(tmp_is);
1348 verbosestream << "TOSERVER_INTERACT: action=" << (int)action << ", item="
1349 << item_i << ", pointed=" << pointed.dump() << std::endl;
1351 Player *player = m_env->getPlayer(pkt->getPeerId());
1352 if (player == NULL) {
1353 errorstream << "Server::ProcessData(): Canceling: "
1354 "No player for peer_id=" << pkt->getPeerId()
1355 << " disconnecting peer!" << std::endl;
1356 m_con.DisconnectPeer(pkt->getPeerId());
1360 PlayerSAO *playersao = player->getPlayerSAO();
1361 if (playersao == NULL) {
1362 errorstream << "Server::ProcessData(): Canceling: "
1363 "No player object for peer_id=" << pkt->getPeerId()
1364 << " disconnecting peer!" << std::endl;
1365 m_con.DisconnectPeer(pkt->getPeerId());
1369 if (player->isDead()) {
1370 verbosestream << "TOSERVER_INTERACT: " << player->getName()
1371 << " is dead. Ignoring packet";
1375 v3f player_pos = playersao->getLastGoodPosition();
1377 // Update wielded item
1378 playersao->setWieldIndex(item_i);
1380 // Get pointed to node (undefined if not POINTEDTYPE_NODE)
1381 v3s16 p_under = pointed.node_undersurface;
1382 v3s16 p_above = pointed.node_abovesurface;
1384 // Get pointed to object (NULL if not POINTEDTYPE_OBJECT)
1385 ServerActiveObject *pointed_object = NULL;
1386 if (pointed.type == POINTEDTHING_OBJECT) {
1387 pointed_object = m_env->getActiveObject(pointed.object_id);
1388 if (pointed_object == NULL) {
1389 verbosestream << "TOSERVER_INTERACT: "
1390 "pointed object is NULL" << std::endl;
1396 v3f pointed_pos_under = player_pos;
1397 v3f pointed_pos_above = player_pos;
1398 if (pointed.type == POINTEDTHING_NODE) {
1399 pointed_pos_under = intToFloat(p_under, BS);
1400 pointed_pos_above = intToFloat(p_above, BS);
1402 else if (pointed.type == POINTEDTHING_OBJECT) {
1403 pointed_pos_under = pointed_object->getBasePosition();
1404 pointed_pos_above = pointed_pos_under;
1408 Check that target is reasonably close
1409 (only when digging or placing things)
1411 if (action == 0 || action == 2 || action == 3) {
1412 float d = player_pos.getDistanceFrom(pointed_pos_under);
1413 float max_d = BS * 14; // Just some large enough value
1415 actionstream << "Player " << player->getName()
1416 << " tried to access " << pointed.dump()
1417 << " from too far: "
1418 << "d=" << d <<", max_d=" << max_d
1419 << ". ignoring." << std::endl;
1420 // Re-send block to revert change on client-side
1421 RemoteClient *client = getClient(pkt->getPeerId());
1422 v3s16 blockpos = getNodeBlockPos(floatToInt(pointed_pos_under, BS));
1423 client->SetBlockNotSent(blockpos);
1425 m_script->on_cheat(playersao, "interacted_too_far");
1432 Make sure the player is allowed to do it
1434 if (!checkPriv(player->getName(), "interact")) {
1435 actionstream<<player->getName()<<" attempted to interact with "
1436 <<pointed.dump()<<" without 'interact' privilege"
1438 // Re-send block to revert change on client-side
1439 RemoteClient *client = getClient(pkt->getPeerId());
1440 // Digging completed -> under
1442 v3s16 blockpos = getNodeBlockPos(floatToInt(pointed_pos_under, BS));
1443 client->SetBlockNotSent(blockpos);
1445 // Placement -> above
1447 v3s16 blockpos = getNodeBlockPos(floatToInt(pointed_pos_above, BS));
1448 client->SetBlockNotSent(blockpos);
1454 If something goes wrong, this player is to blame
1456 RollbackScopeActor rollback_scope(m_rollback,
1457 std::string("player:")+player->getName());
1460 0: start digging or punch object
1463 if (pointed.type == POINTEDTHING_NODE) {
1465 NOTE: This can be used in the future to check if
1466 somebody is cheating, by checking the timing.
1468 MapNode n(CONTENT_IGNORE);
1470 n = m_env->getMap().getNodeNoEx(p_under, &pos_ok);
1472 n = m_env->getMap().getNodeNoEx(p_under, &pos_ok);
1475 infostream << "Server: Not punching: Node not found."
1476 << " Adding block to emerge queue."
1478 m_emerge->enqueueBlockEmerge(pkt->getPeerId(), getNodeBlockPos(p_above), false);
1481 if (n.getContent() != CONTENT_IGNORE)
1482 m_script->node_on_punch(p_under, n, playersao, pointed);
1484 playersao->noCheatDigStart(p_under);
1486 else if (pointed.type == POINTEDTHING_OBJECT) {
1487 // Skip if object has been removed
1488 if (pointed_object->m_removed)
1491 actionstream<<player->getName()<<" punches object "
1492 <<pointed.object_id<<": "
1493 <<pointed_object->getDescription()<<std::endl;
1495 ItemStack punchitem = playersao->getWieldedItem();
1496 ToolCapabilities toolcap =
1497 punchitem.getToolCapabilities(m_itemdef);
1498 v3f dir = (pointed_object->getBasePosition() -
1499 (player->getPosition() + player->getEyeOffset())
1501 float time_from_last_punch =
1502 playersao->resetTimeFromLastPunch();
1504 s16 src_original_hp = pointed_object->getHP();
1505 s16 dst_origin_hp = playersao->getHP();
1507 pointed_object->punch(dir, &toolcap, playersao,
1508 time_from_last_punch);
1510 // If the object is a player and its HP changed
1511 if (src_original_hp != pointed_object->getHP() &&
1512 pointed_object->getType() == ACTIVEOBJECT_TYPE_PLAYER) {
1513 SendPlayerHPOrDie(((PlayerSAO*)pointed_object)->getPeerID(),
1514 pointed_object->getHP() == 0);
1517 // If the puncher is a player and its HP changed
1518 if (dst_origin_hp != playersao->getHP()) {
1519 SendPlayerHPOrDie(playersao->getPeerID(), playersao->getHP() == 0);
1528 else if (action == 1) {
1532 2: Digging completed
1534 else if (action == 2) {
1535 // Only digging of nodes
1536 if (pointed.type == POINTEDTHING_NODE) {
1538 MapNode n = m_env->getMap().getNodeNoEx(p_under, &pos_ok);
1540 infostream << "Server: Not finishing digging: Node not found."
1541 << " Adding block to emerge queue."
1543 m_emerge->enqueueBlockEmerge(pkt->getPeerId(), getNodeBlockPos(p_above), false);
1546 /* Cheat prevention */
1547 bool is_valid_dig = true;
1548 if (!isSingleplayer() && !g_settings->getBool("disable_anticheat")) {
1549 v3s16 nocheat_p = playersao->getNoCheatDigPos();
1550 float nocheat_t = playersao->getNoCheatDigTime();
1551 playersao->noCheatDigEnd();
1552 // If player didn't start digging this, ignore dig
1553 if (nocheat_p != p_under) {
1554 infostream << "Server: NoCheat: " << player->getName()
1555 << " started digging "
1556 << PP(nocheat_p) << " and completed digging "
1557 << PP(p_under) << "; not digging." << std::endl;
1558 is_valid_dig = false;
1560 m_script->on_cheat(playersao, "finished_unknown_dig");
1562 // Get player's wielded item
1563 ItemStack playeritem;
1564 InventoryList *mlist = playersao->getInventory()->getList("main");
1566 playeritem = mlist->getItem(playersao->getWieldIndex());
1567 ToolCapabilities playeritem_toolcap =
1568 playeritem.getToolCapabilities(m_itemdef);
1569 // Get diggability and expected digging time
1570 DigParams params = getDigParams(m_nodedef->get(n).groups,
1571 &playeritem_toolcap);
1572 // If can't dig, try hand
1573 if (!params.diggable) {
1574 const ItemDefinition &hand = m_itemdef->get("");
1575 const ToolCapabilities *tp = hand.tool_capabilities;
1577 params = getDigParams(m_nodedef->get(n).groups, tp);
1579 // If can't dig, ignore dig
1580 if (!params.diggable) {
1581 infostream << "Server: NoCheat: " << player->getName()
1582 << " completed digging " << PP(p_under)
1583 << ", which is not diggable with tool. not digging."
1585 is_valid_dig = false;
1587 m_script->on_cheat(playersao, "dug_unbreakable");
1589 // Check digging time
1590 // If already invalidated, we don't have to
1591 if (!is_valid_dig) {
1592 // Well not our problem then
1594 // Clean and long dig
1595 else if (params.time > 2.0 && nocheat_t * 1.2 > params.time) {
1596 // All is good, but grab time from pool; don't care if
1597 // it's actually available
1598 playersao->getDigPool().grab(params.time);
1600 // Short or laggy dig
1601 // Try getting the time from pool
1602 else if (playersao->getDigPool().grab(params.time)) {
1607 infostream << "Server: NoCheat: " << player->getName()
1608 << " completed digging " << PP(p_under)
1609 << "too fast; not digging." << std::endl;
1610 is_valid_dig = false;
1612 m_script->on_cheat(playersao, "dug_too_fast");
1616 /* Actually dig node */
1618 if (is_valid_dig && n.getContent() != CONTENT_IGNORE)
1619 m_script->node_on_dig(p_under, n, playersao);
1621 v3s16 blockpos = getNodeBlockPos(floatToInt(pointed_pos_under, BS));
1622 RemoteClient *client = getClient(pkt->getPeerId());
1623 // Send unusual result (that is, node not being removed)
1624 if (m_env->getMap().getNodeNoEx(p_under).getContent() != CONTENT_AIR) {
1625 // Re-send block to revert change on client-side
1626 client->SetBlockNotSent(blockpos);
1629 client->ResendBlockIfOnWire(blockpos);
1635 3: place block or right-click object
1637 else if (action == 3) {
1638 ItemStack item = playersao->getWieldedItem();
1640 // Reset build time counter
1641 if (pointed.type == POINTEDTHING_NODE &&
1642 item.getDefinition(m_itemdef).type == ITEM_NODE)
1643 getClient(pkt->getPeerId())->m_time_from_building = 0.0;
1645 if (pointed.type == POINTEDTHING_OBJECT) {
1646 // Right click object
1648 // Skip if object has been removed
1649 if (pointed_object->m_removed)
1652 actionstream << player->getName() << " right-clicks object "
1653 << pointed.object_id << ": "
1654 << pointed_object->getDescription() << std::endl;
1657 pointed_object->rightClick(playersao);
1659 else if (m_script->item_OnPlace(
1660 item, playersao, pointed)) {
1661 // Placement was handled in lua
1663 // Apply returned ItemStack
1664 if (playersao->setWieldedItem(item)) {
1665 SendInventory(playersao);
1669 // If item has node placement prediction, always send the
1670 // blocks to make sure the client knows what exactly happened
1671 RemoteClient *client = getClient(pkt->getPeerId());
1672 v3s16 blockpos = getNodeBlockPos(floatToInt(pointed_pos_above, BS));
1673 v3s16 blockpos2 = getNodeBlockPos(floatToInt(pointed_pos_under, BS));
1674 if (item.getDefinition(m_itemdef).node_placement_prediction != "") {
1675 client->SetBlockNotSent(blockpos);
1676 if (blockpos2 != blockpos) {
1677 client->SetBlockNotSent(blockpos2);
1681 client->ResendBlockIfOnWire(blockpos);
1682 if (blockpos2 != blockpos) {
1683 client->ResendBlockIfOnWire(blockpos2);
1691 else if (action == 4) {
1692 ItemStack item = playersao->getWieldedItem();
1694 actionstream << player->getName() << " uses " << item.name
1695 << ", pointing at " << pointed.dump() << std::endl;
1697 if (m_script->item_OnUse(
1698 item, playersao, pointed)) {
1699 // Apply returned ItemStack
1700 if (playersao->setWieldedItem(item)) {
1701 SendInventory(playersao);
1709 Catch invalid actions
1712 infostream << "WARNING: Server: Invalid action "
1713 << action << std::endl;
1717 void Server::handleCommand_RemovedSounds(NetworkPacket* pkt)
1721 for (u16 k = 0; k < num; k++) {
1726 std::map<s32, ServerPlayingSound>::iterator i =
1727 m_playing_sounds.find(id);
1729 if (i == m_playing_sounds.end())
1732 ServerPlayingSound &psound = i->second;
1733 psound.clients.erase(pkt->getPeerId());
1734 if (psound.clients.empty())
1735 m_playing_sounds.erase(i++);
1739 void Server::handleCommand_NodeMetaFields(NetworkPacket* pkt)
1742 std::string formname;
1745 *pkt >> p >> formname >> num;
1748 for (u16 k = 0; k < num; k++) {
1749 std::string fieldname;
1751 fields[fieldname] = pkt->readLongString();
1754 Player *player = m_env->getPlayer(pkt->getPeerId());
1755 if (player == NULL) {
1756 errorstream << "Server::ProcessData(): Canceling: "
1757 "No player for peer_id=" << pkt->getPeerId()
1758 << " disconnecting peer!" << std::endl;
1759 m_con.DisconnectPeer(pkt->getPeerId());
1763 PlayerSAO *playersao = player->getPlayerSAO();
1764 if (playersao == NULL) {
1765 errorstream << "Server::ProcessData(): Canceling: "
1766 "No player object for peer_id=" << pkt->getPeerId()
1767 << " disconnecting peer!" << std::endl;
1768 m_con.DisconnectPeer(pkt->getPeerId());
1772 // If something goes wrong, this player is to blame
1773 RollbackScopeActor rollback_scope(m_rollback,
1774 std::string("player:")+player->getName());
1776 // Check the target node for rollback data; leave others unnoticed
1777 RollbackNode rn_old(&m_env->getMap(), p, this);
1779 m_script->node_on_receive_fields(p, formname, fields, playersao);
1781 // Report rollback data
1782 RollbackNode rn_new(&m_env->getMap(), p, this);
1783 if (rollback() && rn_new != rn_old) {
1784 RollbackAction action;
1785 action.setSetNode(p, rn_old, rn_new);
1786 rollback()->reportAction(action);
1790 void Server::handleCommand_InventoryFields(NetworkPacket* pkt)
1792 std::string formname;
1795 *pkt >> formname >> num;
1798 for (u16 k = 0; k < num; k++) {
1799 std::string fieldname;
1801 fields[fieldname] = pkt->readLongString();
1804 Player *player = m_env->getPlayer(pkt->getPeerId());
1805 if (player == NULL) {
1806 errorstream << "Server::ProcessData(): Canceling: "
1807 "No player for peer_id=" << pkt->getPeerId()
1808 << " disconnecting peer!" << std::endl;
1809 m_con.DisconnectPeer(pkt->getPeerId());
1813 PlayerSAO *playersao = player->getPlayerSAO();
1814 if (playersao == NULL) {
1815 errorstream << "Server::ProcessData(): Canceling: "
1816 "No player object for peer_id=" << pkt->getPeerId()
1817 << " disconnecting peer!" << std::endl;
1818 m_con.DisconnectPeer(pkt->getPeerId());
1822 m_script->on_playerReceiveFields(playersao, formname, fields);
1825 void Server::handleCommand_FirstSrp(NetworkPacket* pkt)
1827 RemoteClient* client = getClient(pkt->getPeerId(), CS_Invalid);
1828 ClientState cstate = client->getState();
1830 std::string playername = client->getName();
1833 std::string verification_key;
1835 std::string addr_s = getPeerAddress(pkt->getPeerId()).serializeString();
1838 *pkt >> salt >> verification_key >> is_empty;
1840 verbosestream << "Server: Got TOSERVER_FIRST_SRP from " << addr_s
1841 << ", with is_empty= " << is_empty << std::endl;
1843 // Either this packet is sent because the user is new or to change the password
1844 if (cstate == CS_HelloSent) {
1845 if (!client->isMechAllowed(AUTH_MECHANISM_FIRST_SRP)) {
1846 actionstream << "Server: Client from " << addr_s
1847 << " tried to set password without being "
1848 << "authenticated, or the username being new." << std::endl;
1849 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_UNEXPECTED_DATA);
1853 if (!isSingleplayer() &&
1854 g_settings->getBool("disallow_empty_password") &&
1856 actionstream << "Server: " << playername
1857 << " supplied empty password from " << addr_s << std::endl;
1858 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_EMPTY_PASSWORD);
1862 std::string initial_ver_key;
1863 std::string raw_default_password = g_settings->get("default_password");
1864 // If default_password is empty, allow any initial password
1865 if (raw_default_password.length() == 0) {
1866 initial_ver_key = encodeSRPVerifier(verification_key, salt);
1868 initial_ver_key = getSRPVerifier(playername, raw_default_password);
1871 m_script->createAuth(playername, initial_ver_key);
1873 acceptAuth(pkt->getPeerId(), false);
1875 if (cstate < CS_SudoMode) {
1876 infostream << "Server::ProcessData(): Ignoring TOSERVER_FIRST_SRP from "
1877 << addr_s << ": " << "Client has wrong state " << cstate << "."
1881 m_clients.event(pkt->getPeerId(), CSE_SudoLeave);
1882 std::string pw_db_field = encodeSRPVerifier(verification_key, salt);
1883 bool success = m_script->setPassword(playername, pw_db_field);
1885 actionstream << playername << " changes password" << std::endl;
1886 SendChatMessage(pkt->getPeerId(), L"Password change successful.");
1888 actionstream << playername << " tries to change password but "
1889 << "it fails" << std::endl;
1890 SendChatMessage(pkt->getPeerId(), L"Password change failed or unavailable.");
1895 void Server::handleCommand_SrpBytesA(NetworkPacket* pkt)
1897 RemoteClient* client = getClient(pkt->getPeerId(), CS_Invalid);
1898 ClientState cstate = client->getState();
1900 bool wantSudo = (cstate == CS_Active);
1902 if (!((cstate == CS_HelloSent) || (cstate == CS_Active))) {
1903 actionstream << "Server: got SRP _A packet in wrong state "
1904 << cstate << " from "
1905 << getPeerAddress(pkt->getPeerId()).serializeString()
1906 << ". Ignoring." << std::endl;
1910 if (client->chosen_mech != AUTH_MECHANISM_NONE) {
1911 actionstream << "Server: got SRP _A packet, while auth"
1912 << "is already going on with mech " << client->chosen_mech
1913 << " from " << getPeerAddress(pkt->getPeerId()).serializeString()
1914 << " (wantSudo=" << wantSudo << "). Ignoring." << std::endl;
1916 DenySudoAccess(pkt->getPeerId());
1919 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_UNEXPECTED_DATA);
1924 std::string bytes_A;
1926 *pkt >> bytes_A >> based_on;
1928 infostream << "Server: TOSERVER_SRP_BYTES_A received with "
1929 << "based_on=" << int(based_on) << " and len_A="
1930 << bytes_A.length() << "." << std::endl;
1932 AuthMechanism chosen = (based_on == 0) ?
1933 AUTH_MECHANISM_LEGACY_PASSWORD : AUTH_MECHANISM_SRP;
1936 if (!client->isSudoMechAllowed(chosen)) {
1937 actionstream << "Server: Player \"" << client->getName()
1938 << "\" at " << getPeerAddress(pkt->getPeerId()).serializeString()
1939 << " tried to change password using unallowed mech "
1940 << chosen << "." << std::endl;
1941 DenySudoAccess(pkt->getPeerId());
1945 if (!client->isMechAllowed(chosen)) {
1946 actionstream << "Server: Client tried to authenticate from "
1947 << getPeerAddress(pkt->getPeerId()).serializeString()
1948 << " using unallowed mech " << chosen << "." << std::endl;
1949 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_UNEXPECTED_DATA);
1954 client->chosen_mech = chosen;
1956 std::string bytes_s;
1957 std::string bytes_v;
1959 if (based_on == 0) {
1960 char *p_bytes_s = 0;
1962 char *p_bytes_v = 0;
1964 getSRPVerifier(client->getName(), client->enc_pwd,
1966 &p_bytes_v, &len_v);
1967 bytes_s = std::string(p_bytes_s, len_s);
1968 bytes_v = std::string(p_bytes_v, len_v);
1971 } else if (!decodeSRPVerifier(client->enc_pwd, &bytes_s, &bytes_v)) {
1972 // Non-base64 errors should have been catched in the init handler
1973 actionstream << "Server: User " << client->getName()
1974 << " tried to log in, but srp verifier field"
1975 << " was invalid (most likely invalid base64)." << std::endl;
1976 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_SERVER_FAIL);
1983 client->auth_data = srp_verifier_new(SRP_SHA256, SRP_NG_2048,
1984 client->getName().c_str(),
1985 (const unsigned char *) bytes_s.c_str(), bytes_s.size(),
1986 (const unsigned char *) bytes_v.c_str(), bytes_v.size(),
1987 (const unsigned char *) bytes_A.c_str(), bytes_A.size(),
1989 (unsigned char **) &bytes_B, &len_B, NULL, NULL);
1992 actionstream << "Server: User " << client->getName()
1993 << " tried to log in, SRP-6a safety check violated in _A handler."
1996 DenySudoAccess(pkt->getPeerId());
1999 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_UNEXPECTED_DATA);
2004 NetworkPacket resp_pkt(TOCLIENT_SRP_BYTES_S_B, 0, pkt->getPeerId());
2005 resp_pkt << bytes_s << std::string(bytes_B, len_B);
2009 void Server::handleCommand_SrpBytesM(NetworkPacket* pkt)
2011 RemoteClient* client = getClient(pkt->getPeerId(), CS_Invalid);
2012 ClientState cstate = client->getState();
2014 bool wantSudo = (cstate == CS_Active);
2016 verbosestream << "Server: Recieved TOCLIENT_SRP_BYTES_M." << std::endl;
2018 if (!((cstate == CS_HelloSent) || (cstate == CS_Active))) {
2019 actionstream << "Server: got SRP _M packet in wrong state "
2020 << cstate << " from "
2021 << getPeerAddress(pkt->getPeerId()).serializeString()
2022 << ". Ignoring." << std::endl;
2026 if ((client->chosen_mech != AUTH_MECHANISM_SRP)
2027 && (client->chosen_mech != AUTH_MECHANISM_LEGACY_PASSWORD)) {
2028 actionstream << "Server: got SRP _M packet, while auth"
2029 << "is going on with mech " << client->chosen_mech
2030 << " from " << getPeerAddress(pkt->getPeerId()).serializeString()
2031 << " (wantSudo=" << wantSudo << "). Denying." << std::endl;
2033 DenySudoAccess(pkt->getPeerId());
2036 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_UNEXPECTED_DATA);
2041 std::string bytes_M;
2044 if (srp_verifier_get_session_key_length((SRPVerifier *) client->auth_data)
2045 != bytes_M.size()) {
2046 actionstream << "Server: User " << client->getName()
2047 << " at " << getPeerAddress(pkt->getPeerId()).serializeString()
2048 << " sent bytes_M with invalid length " << bytes_M.size() << std::endl;
2049 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_UNEXPECTED_DATA);
2053 unsigned char *bytes_HAMK = 0;
2055 srp_verifier_verify_session((SRPVerifier *) client->auth_data,
2056 (unsigned char *)bytes_M.c_str(), &bytes_HAMK);
2060 actionstream << "Server: User " << client->getName()
2061 << " at " << getPeerAddress(pkt->getPeerId()).serializeString()
2062 << " tried to change their password, but supplied wrong"
2063 << " (SRP) password for authentication." << std::endl;
2064 DenySudoAccess(pkt->getPeerId());
2067 actionstream << "Server: User " << client->getName()
2068 << " at " << getPeerAddress(pkt->getPeerId()).serializeString()
2069 << " supplied wrong (SRP) password from address "
2070 << getPeerAddress(pkt->getPeerId()).serializeString()
2071 << "." << std::endl;
2072 DenyAccess(pkt->getPeerId(), SERVER_ACCESSDENIED_WRONG_PASSWORD);
2077 acceptAuth(pkt->getPeerId(), wantSudo);