/* * Copyright (C) 2016+ AzerothCore , released under GNU GPL v2 license: https://github.com/azerothcore/azerothcore-wotlk/blob/master/LICENSE-GPL2 * Copyright (C) 2008-2016 TrinityCore * Copyright (C) 2005-2009 MaNGOS */ #include #include #include #include #include #include #include #include #include #include #include "WorldSocket.h" #include "Common.h" #include "Player.h" #include "Util.h" #include "World.h" #include "WorldPacket.h" #include "SharedDefines.h" #include "ByteBuffer.h" #include "Opcodes.h" #include "DatabaseEnv.h" #include "BigNumber.h" #include "SHA1.h" #include "WorldSession.h" #include "WorldSocketMgr.h" #include "Log.h" #include "PacketLog.h" #include "ScriptMgr.h" #include "AccountMgr.h" #if defined(__GNUC__) #pragma pack(1) #else #pragma pack(push, 1) #endif struct ServerPktHeader { /** * size is the length of the payload _plus_ the length of the opcode */ ServerPktHeader(uint32 size, uint16 cmd) : size(size) { uint8 headerIndex=0; if (isLargePacket()) { sLog->outDebug(LOG_FILTER_NETWORKIO, "initializing large server to client packet. Size: %u, cmd: %u", size, cmd); header[headerIndex++] = 0x80|(0xFF &(size>>16)); } header[headerIndex++] = 0xFF &(size>>8); header[headerIndex++] = 0xFF &size; header[headerIndex++] = 0xFF & cmd; header[headerIndex++] = 0xFF & (cmd>>8); } uint8 getHeaderLength() { // cmd = 2 bytes, size= 2||3bytes return 2+(isLargePacket()?3:2); } bool isLargePacket() const { return size > 0x7FFF; } const uint32 size; uint8 header[5]; }; struct ClientPktHeader { uint16 size; uint32 cmd; }; #if defined(__GNUC__) #pragma pack() #else #pragma pack(pop) #endif WorldSocket::WorldSocket (void): WorldHandler(), m_LastPingTime(ACE_Time_Value::zero), m_OverSpeedPings(0), m_Session(0), m_RecvWPct(0), m_RecvPct(), m_Header(sizeof (ClientPktHeader)), m_OutBuffer(0), m_OutBufferSize(65536), m_OutActive(false), m_Seed(static_cast (rand32())) { reference_counting_policy().value (ACE_Event_Handler::Reference_Counting_Policy::ENABLED); msg_queue()->high_water_mark(8*1024*1024); msg_queue()->low_water_mark(8*1024*1024); } WorldSocket::~WorldSocket (void) { delete m_RecvWPct; if (m_OutBuffer) m_OutBuffer->release(); closing_ = true; peer().close(); } bool WorldSocket::IsClosed (void) const { return closing_; } void WorldSocket::CloseSocket (void) { { ACE_GUARD (LockType, Guard, m_OutBufferLock); if (closing_) return; closing_ = true; peer().close_writer(); } { ACE_GUARD (LockType, Guard, m_SessionLock); m_Session = NULL; } } const std::string& WorldSocket::GetRemoteAddress (void) const { return m_Address; } int WorldSocket::SendPacket(WorldPacket const& pct) { ACE_GUARD_RETURN (LockType, Guard, m_OutBufferLock, -1); if (closing_) return -1; // Dump outgoing packet. if (sPacketLog->CanLogPacket()) sPacketLog->LogPacket(pct, SERVER_TO_CLIENT); ServerPktHeader header(pct.size()+2, pct.GetOpcode()); m_Crypt.EncryptSend ((uint8*)header.header, header.getHeaderLength()); if (m_OutBuffer->space() >= pct.size() + header.getHeaderLength() && msg_queue()->is_empty()) { // Put the packet on the buffer. if (m_OutBuffer->copy((char*) header.header, header.getHeaderLength()) == -1) ACE_ASSERT (false); if (!pct.empty()) if (m_OutBuffer->copy((char*) pct.contents(), pct.size()) == -1) ACE_ASSERT (false); } else { // Enqueue the packet. ACE_Message_Block* mb; ACE_NEW_RETURN(mb, ACE_Message_Block(pct.size() + header.getHeaderLength()), -1); mb->copy((char*) header.header, header.getHeaderLength()); if (!pct.empty()) mb->copy((const char*)pct.contents(), pct.size()); if (msg_queue()->enqueue_tail(mb, (ACE_Time_Value*)&ACE_Time_Value::zero) == -1) { sLog->outError("WorldSocket::SendPacket enqueue_tail failed"); mb->release(); return -1; } } return 0; } long WorldSocket::AddReference (void) { return static_cast (add_reference()); } long WorldSocket::RemoveReference (void) { return static_cast (remove_reference()); } int WorldSocket::open (void *a) { ACE_UNUSED_ARG (a); // Prevent double call to this func. if (m_OutBuffer) return -1; // This will also prevent the socket from being Updated // while we are initializing it. m_OutActive = true; // Hook for the manager. if (sWorldSocketMgr->OnSocketOpen(this) == -1) return -1; // Allocate the buffer. ACE_NEW_RETURN (m_OutBuffer, ACE_Message_Block (m_OutBufferSize), -1); // Store peer address. ACE_INET_Addr remote_addr; if (peer().get_remote_addr(remote_addr) == -1) { sLog->outError("WorldSocket::open: peer().get_remote_addr errno = %s", ACE_OS::strerror (errno)); return -1; } m_Address = remote_addr.get_host_addr(); // Send startup packet. WorldPacket packet (SMSG_AUTH_CHALLENGE, 24); packet << uint32(1); // 1...31 packet << m_Seed; BigNumber seed1; seed1.SetRand(16 * 8); packet.append(seed1.AsByteArray(16).get(), 16); // new encryption seeds BigNumber seed2; seed2.SetRand(16 * 8); packet.append(seed2.AsByteArray(16).get(), 16); // new encryption seeds if (SendPacket(packet) == -1) return -1; // Register with ACE Reactor if (reactor()->register_handler(this, ACE_Event_Handler::READ_MASK | ACE_Event_Handler::WRITE_MASK) == -1) { sLog->outError("WorldSocket::open: unable to register client handler errno = %s", ACE_OS::strerror (errno)); return -1; } // reactor takes care of the socket from now on remove_reference(); return 0; } int WorldSocket::close (u_long) { shutdown(); closing_ = true; remove_reference(); return 0; } int WorldSocket::handle_input (ACE_HANDLE) { if (closing_) return -1; switch (handle_input_missing_data()) { case -1 : { if ((errno == EWOULDBLOCK) || (errno == EAGAIN)) { return Update(); // interesting line, isn't it ? } #if defined(ENABLE_EXTRAS) && defined(ENABLE_EXTRA_LOGS) sLog->outStaticDebug("WorldSocket::handle_input: Peer error closing connection errno = %s", ACE_OS::strerror (errno)); #endif errno = ECONNRESET; return -1; } case 0: { #if defined(ENABLE_EXTRAS) && defined(ENABLE_EXTRA_LOGS) sLog->outStaticDebug("WorldSocket::handle_input: Peer has closed connection"); #endif errno = ECONNRESET; return -1; } case 1: return 1; default: return Update(); // another interesting line ;) } ACE_NOTREACHED(return -1); } int WorldSocket::handle_output (ACE_HANDLE) { ACE_GUARD_RETURN (LockType, Guard, m_OutBufferLock, -1); if (closing_) return -1; size_t send_len = m_OutBuffer->length(); if (send_len == 0) return handle_output_queue(Guard); #ifdef MSG_NOSIGNAL ssize_t n = peer().send (m_OutBuffer->rd_ptr(), send_len, MSG_NOSIGNAL); #else ssize_t n = peer().send (m_OutBuffer->rd_ptr(), send_len); #endif // MSG_NOSIGNAL if (n == 0) return -1; else if (n == -1) { if (errno == EWOULDBLOCK || errno == EAGAIN) return schedule_wakeup_output (Guard); return -1; } else if (n < (ssize_t)send_len) //now n > 0 { m_OutBuffer->rd_ptr (static_cast (n)); // move the data to the base of the buffer m_OutBuffer->crunch(); return schedule_wakeup_output (Guard); } else //now n == send_len { m_OutBuffer->reset(); return handle_output_queue (Guard); } ACE_NOTREACHED (return 0); } int WorldSocket::handle_output_queue (GuardType& g) { if (msg_queue()->is_empty()) return cancel_wakeup_output(g); ACE_Message_Block* mblk; if (msg_queue()->dequeue_head(mblk, (ACE_Time_Value*)&ACE_Time_Value::zero) == -1) { sLog->outError("WorldSocket::handle_output_queue dequeue_head"); return -1; } const size_t send_len = mblk->length(); #ifdef MSG_NOSIGNAL ssize_t n = peer().send(mblk->rd_ptr(), send_len, MSG_NOSIGNAL); #else ssize_t n = peer().send(mblk->rd_ptr(), send_len); #endif // MSG_NOSIGNAL if (n == 0) { mblk->release(); return -1; } else if (n == -1) { if (errno == EWOULDBLOCK || errno == EAGAIN) { msg_queue()->enqueue_head(mblk, (ACE_Time_Value*) &ACE_Time_Value::zero); return schedule_wakeup_output (g); } mblk->release(); return -1; } else if (n < (ssize_t)send_len) //now n > 0 { mblk->rd_ptr(static_cast (n)); if (msg_queue()->enqueue_head(mblk, (ACE_Time_Value*) &ACE_Time_Value::zero) == -1) { sLog->outError("WorldSocket::handle_output_queue enqueue_head"); mblk->release(); return -1; } return schedule_wakeup_output (g); } else //now n == send_len { mblk->release(); return msg_queue()->is_empty() ? cancel_wakeup_output(g) : ACE_Event_Handler::WRITE_MASK; } ACE_NOTREACHED(return -1); } int WorldSocket::handle_close (ACE_HANDLE h, ACE_Reactor_Mask) { // Critical section { ACE_GUARD_RETURN (LockType, Guard, m_OutBufferLock, -1); closing_ = true; if (h == ACE_INVALID_HANDLE) peer().close_writer(); } // Critical section { ACE_GUARD_RETURN (LockType, Guard, m_SessionLock, -1); m_Session = NULL; } reactor()->remove_handler(this, ACE_Event_Handler::DONT_CALL | ACE_Event_Handler::ALL_EVENTS_MASK); return 0; } int WorldSocket::Update (void) { if (closing_) return -1; if (m_OutActive) return 0; { ACE_GUARD_RETURN (LockType, Guard, m_OutBufferLock, 0); if (m_OutBuffer->length() == 0 && msg_queue()->is_empty()) return 0; } int ret; do ret = handle_output (get_handle()); while (ret > 0); return ret; } int WorldSocket::handle_input_header (void) { ACE_ASSERT (m_RecvWPct == NULL); ACE_ASSERT (m_Header.length() == sizeof(ClientPktHeader)); m_Crypt.DecryptRecv ((uint8*) m_Header.rd_ptr(), sizeof(ClientPktHeader)); ClientPktHeader& header = *((ClientPktHeader*) m_Header.rd_ptr()); EndianConvertReverse(header.size); EndianConvert(header.cmd); if ((header.size < 4) || (header.size > 10240) || (header.cmd > 10240)) { Player* _player = m_Session ? m_Session->GetPlayer() : NULL; sLog->outError("WorldSocket::handle_input_header(): client (account: %u, char [GUID: %u, name: %s]) sent malformed packet (size: %d, cmd: %d)", m_Session ? m_Session->GetAccountId() : 0, _player ? _player->GetGUIDLow() : 0, _player ? _player->GetName().c_str() : "", header.size, header.cmd); errno = EINVAL; return -1; } header.size -= 4; ACE_NEW_RETURN (m_RecvWPct, WorldPacket ((uint16) header.cmd, header.size), -1); if (header.size > 0) { m_RecvWPct->resize (header.size); m_RecvPct.base ((char*) m_RecvWPct->contents(), m_RecvWPct->size()); } else { ACE_ASSERT(m_RecvPct.space() == 0); } return 0; } int WorldSocket::handle_input_payload (void) { // set errno properly here on error !!! // now have a header and payload ACE_ASSERT (m_RecvPct.space() == 0); ACE_ASSERT (m_Header.space() == 0); ACE_ASSERT (m_RecvWPct != NULL); const int ret = ProcessIncoming (m_RecvWPct); m_RecvPct.base (NULL, 0); m_RecvPct.reset(); m_RecvWPct = NULL; m_Header.reset(); if (ret == -1) errno = EINVAL; return ret; } int WorldSocket::handle_input_missing_data (void) { char buf [4096]; ACE_Data_Block db (sizeof (buf), ACE_Message_Block::MB_DATA, buf, 0, 0, ACE_Message_Block::DONT_DELETE, 0); ACE_Message_Block message_block(&db, ACE_Message_Block::DONT_DELETE, 0); const size_t recv_size = message_block.space(); const ssize_t n = peer().recv (message_block.wr_ptr(), recv_size); if (n <= 0) return int(n); message_block.wr_ptr (n); while (message_block.length() > 0) { if (m_Header.space() > 0) { //need to receive the header const size_t to_header = (message_block.length() > m_Header.space() ? m_Header.space() : message_block.length()); m_Header.copy (message_block.rd_ptr(), to_header); message_block.rd_ptr (to_header); if (m_Header.space() > 0) { // Couldn't receive the whole header this time. ACE_ASSERT (message_block.length() == 0); errno = EWOULDBLOCK; return -1; } // We just received nice new header if (handle_input_header() == -1) { ACE_ASSERT ((errno != EWOULDBLOCK) && (errno != EAGAIN)); return -1; } } // Its possible on some error situations that this happens // for example on closing when epoll receives more chunked data and stuff // hope this is not hack, as proper m_RecvWPct is asserted around if (!m_RecvWPct) { sLog->outError("Forcing close on input m_RecvWPct = NULL"); errno = EINVAL; return -1; } // We have full read header, now check the data payload if (m_RecvPct.space() > 0) { //need more data in the payload const size_t to_data = (message_block.length() > m_RecvPct.space() ? m_RecvPct.space() : message_block.length()); m_RecvPct.copy (message_block.rd_ptr(), to_data); message_block.rd_ptr (to_data); if (m_RecvPct.space() > 0) { // Couldn't receive the whole data this time. ACE_ASSERT (message_block.length() == 0); errno = EWOULDBLOCK; return -1; } } //just received fresh new payload if (handle_input_payload() == -1) { ACE_ASSERT ((errno != EWOULDBLOCK) && (errno != EAGAIN)); return -1; } } return size_t(n) == recv_size ? 1 : 2; } int WorldSocket::cancel_wakeup_output (GuardType& g) { if (!m_OutActive) return 0; m_OutActive = false; g.release(); if (reactor()->cancel_wakeup (this, ACE_Event_Handler::WRITE_MASK) == -1) { // would be good to store errno from reactor with errno guard sLog->outError("WorldSocket::cancel_wakeup_output"); return -1; } return 0; } int WorldSocket::schedule_wakeup_output (GuardType& g) { if (m_OutActive) return 0; m_OutActive = true; g.release(); if (reactor()->schedule_wakeup (this, ACE_Event_Handler::WRITE_MASK) == -1) { sLog->outError("WorldSocket::schedule_wakeup_output"); return -1; } return 0; } int WorldSocket::ProcessIncoming(WorldPacket* new_pct) { ACE_ASSERT (new_pct); // manage memory ;) ACE_Auto_Ptr aptr (new_pct); const ACE_UINT16 opcode = new_pct->GetOpcode(); if (closing_) return -1; // Dump received packet. if (sPacketLog->CanLogPacket()) sPacketLog->LogPacket(*new_pct, CLIENT_TO_SERVER); try { switch (opcode) { case CMSG_PING: return HandlePing (*new_pct); case CMSG_AUTH_SESSION: if (m_Session) { sLog->outError("WorldSocket::ProcessIncoming: Player send CMSG_AUTH_SESSION again"); return -1; } return HandleAuthSession (*new_pct); case CMSG_KEEP_ALIVE: return 0; default: { ACE_GUARD_RETURN (LockType, Guard, m_SessionLock, -1); if (m_Session != NULL) { // Our Idle timer will reset on any non PING opcodes. // Catches people idling on the login screen and any lingering ingame connections. m_Session->ResetTimeOutTime(); // OK, give the packet to WorldSession aptr.release(); m_Session->QueuePacket (new_pct); return 0; } else { sLog->outError("WorldSocket::ProcessIncoming: Client not authed opcode = %u", uint32(opcode)); return -1; } } } } catch (ByteBufferException &) { sLog->outError("WorldSocket::ProcessIncoming ByteBufferException occured while parsing an instant handled packet (opcode: %u) from client %s, accountid=%i. Disconnected client.", opcode, GetRemoteAddress().c_str(), m_Session?m_Session->GetAccountId():-1); if (sLog->IsOutDebug()) { sLog->outDebug(LOG_FILTER_NETWORKIO, "Dumping error causing packet:"); new_pct->hexlike(); } return -1; } ACE_NOTREACHED (return 0); } int WorldSocket::HandleAuthSession(WorldPacket& recvPacket) { // NOTE: ATM the socket is singlethread, have this in mind ... uint8 digest[20]; uint32 clientSeed; uint32 loginServerID, loginServerType, regionID, battlegroupID, realm; uint64 DosResponse; uint32 BuiltNumberClient; uint32 id, security; bool skipQueue = false; //uint8 expansion = 0; LocaleConstant locale; std::string account; SHA1Hash sha; WorldPacket packet, SendAddonPacked; BigNumber k; if (sWorld->IsClosed()) { packet.Initialize(SMSG_AUTH_RESPONSE, 1); packet << uint8(AUTH_REJECT); SendPacket(packet); sLog->outError("WorldSocket::HandleAuthSession: World closed, denying client (%s).", GetRemoteAddress().c_str()); return -1; } // Read the content of the packet recvPacket >> BuiltNumberClient; // for now no use recvPacket >> loginServerID; recvPacket >> account; recvPacket >> loginServerType; recvPacket >> clientSeed; recvPacket >> regionID; recvPacket >> battlegroupID; recvPacket >> realm; recvPacket >> DosResponse; recvPacket.read(digest, 20); #if defined(ENABLE_EXTRAS) && defined(ENABLE_EXTRA_LOGS) sLog->outStaticDebug ("WorldSocket::HandleAuthSession: client %u, loginServerID %u, account %s, loginServerType %u, clientseed %u", BuiltNumberClient, loginServerID, account.c_str(), loginServerType, clientSeed); #endif // Get the account information from the realmd database // 0 1 2 3 4 5 6 7 8 9 // SELECT id, sessionkey, last_ip, locked, lock_country, expansion, mutetime, locale, recruiter, os FROM account WHERE username = ? PreparedStatement* stmt = LoginDatabase.GetPreparedStatement(LOGIN_SEL_ACCOUNT_INFO_BY_NAME); stmt->setString(0, account); PreparedQueryResult result = LoginDatabase.Query(stmt); // Stop if the account is not found if (!result) { packet.Initialize (SMSG_AUTH_RESPONSE, 1); packet << uint8 (AUTH_UNKNOWN_ACCOUNT); SendPacket(packet); sLog->outError("WorldSocket::HandleAuthSession: Sent Auth Response (unknown account)."); return -1; } Field* fields = result->Fetch(); uint8 expansion = fields[5].GetUInt8(); uint32 world_expansion = sWorld->getIntConfig(CONFIG_EXPANSION); if (expansion > world_expansion) expansion = world_expansion; ///- Re-check ip locking (same check as in realmd). if (fields[3].GetUInt8() == 1) // if ip is locked { if (strcmp (fields[2].GetCString(), GetRemoteAddress().c_str())) { packet.Initialize (SMSG_AUTH_RESPONSE, 1); packet << uint8 (AUTH_FAILED); SendPacket(packet); sLog->outBasic ("WorldSocket::HandleAuthSession: Sent Auth Response (Account IP differs)."); return -1; } } id = fields[0].GetUInt32(); /* if (security > SEC_ADMINISTRATOR) // prevent invalid security settings in DB security = SEC_ADMINISTRATOR; */ k.SetHexStr (fields[1].GetCString()); int64 mutetime = fields[6].GetInt64(); //! Negative mutetime indicates amount of seconds to be muted effective on next login - which is now. if (mutetime < 0) { mutetime = time(NULL) + llabs(mutetime); PreparedStatement* stmt = LoginDatabase.GetPreparedStatement(LOGIN_UPD_MUTE_TIME_LOGIN); stmt->setInt64(0, mutetime); stmt->setUInt32(1, id); LoginDatabase.Execute(stmt); } locale = LocaleConstant (fields[7].GetUInt8()); if (locale >= TOTAL_LOCALES) locale = LOCALE_enUS; uint32 recruiter = fields[8].GetUInt32(); std::string os = fields[9].GetString(); // Must be done before WorldSession is created if (sWorld->getBoolConfig(CONFIG_WARDEN_ENABLED) && os != "Win" && os != "OSX") { packet.Initialize(SMSG_AUTH_RESPONSE, 1); packet << uint8(AUTH_REJECT); SendPacket(packet); sLog->outError("WorldSocket::HandleAuthSession: Client %s attempted to log in using invalid client OS (%s).", GetRemoteAddress().c_str(), os.c_str()); return -1; } // Checks gmlevel per Realm stmt = LoginDatabase.GetPreparedStatement(LOGIN_GET_GMLEVEL_BY_REALMID); stmt->setUInt32(0, id); stmt->setInt32(1, int32(realmID)); result = LoginDatabase.Query(stmt); if (!result) security = 0; else { fields = result->Fetch(); security = fields[0].GetUInt8(); skipQueue = true; } // Re-check account ban (same check as in realmd) stmt = LoginDatabase.GetPreparedStatement(LOGIN_SEL_BANS); stmt->setUInt32(0, id); stmt->setString(1, GetRemoteAddress()); PreparedQueryResult banresult = LoginDatabase.Query(stmt); if (banresult) // if account banned { packet.Initialize (SMSG_AUTH_RESPONSE, 1); packet << uint8 (AUTH_BANNED); SendPacket(packet); sLog->outError("WorldSocket::HandleAuthSession: Sent Auth Response (Account banned)."); return -1; } // Check locked state for server AccountTypes allowedAccountType = sWorld->GetPlayerSecurityLimit(); #if defined(ENABLE_EXTRAS) && defined(ENABLE_EXTRA_LOGS) sLog->outDebug(LOG_FILTER_NETWORKIO, "Allowed Level: %u Player Level %u", allowedAccountType, AccountTypes(security)); #endif if (AccountTypes(security) < allowedAccountType) { WorldPacket Packet (SMSG_AUTH_RESPONSE, 1); Packet << uint8 (AUTH_UNAVAILABLE); SendPacket(packet); #if defined(ENABLE_EXTRAS) && defined(ENABLE_EXTRA_LOGS) sLog->outDetail("WorldSocket::HandleAuthSession: User tries to login but his security level is not enough"); #endif return -1; } // Check that Key and account name are the same on client and server uint32 t = 0; uint32 seed = m_Seed; sha.UpdateData (account); sha.UpdateData ((uint8 *) & t, 4); sha.UpdateData ((uint8 *) & clientSeed, 4); sha.UpdateData ((uint8 *) & seed, 4); sha.UpdateBigNumbers (&k, NULL); sha.Finalize(); std::string address = GetRemoteAddress(); if (memcmp (sha.GetDigest(), digest, 20)) { packet.Initialize (SMSG_AUTH_RESPONSE, 1); packet << uint8 (AUTH_FAILED); SendPacket(packet); sLog->outError("WorldSocket::HandleAuthSession: Authentication failed for account: %u ('%s') address: %s", id, account.c_str(), address.c_str()); return -1; } #if defined(ENABLE_EXTRAS) && defined(ENABLE_EXTRA_LOGS) sLog->outStaticDebug("WorldSocket::HandleAuthSession: Client '%s' authenticated successfully from %s.", account.c_str(), address.c_str()); #endif // Check if this user is by any chance a recruiter stmt = LoginDatabase.GetPreparedStatement(LOGIN_SEL_ACCOUNT_RECRUITER); stmt->setUInt32(0, id); result = LoginDatabase.Query(stmt); bool isRecruiter = false; if (result) isRecruiter = true; // Update the last_ip in the database stmt = LoginDatabase.GetPreparedStatement(LOGIN_UPD_LAST_IP); stmt->setString(0, address); stmt->setString(1, account); LoginDatabase.Execute(stmt); // NOTE ATM the socket is single-threaded, have this in mind ... ACE_NEW_RETURN (m_Session, WorldSession (id, this, AccountTypes(security), expansion, mutetime, locale, recruiter, isRecruiter, skipQueue), -1); m_Crypt.Init(&k); // First reject the connection if packet contains invalid data or realm state doesn't allow logging in if (sWorld->IsClosed()) { packet.Initialize (SMSG_AUTH_RESPONSE, 1); packet << uint8 (AUTH_REJECT); SendPacket(packet); sLog->outError("WorldSocket::HandleAuthSession: World closed, denying client (%s).", address.c_str()); return -1; } if (realm != realmID) { packet.Initialize (SMSG_AUTH_RESPONSE, 1); packet << uint8 (REALM_LIST_REALM_NOT_FOUND); SendPacket(packet); sLog->outError("WorldSocket::HandleAuthSession: Client %s requested connecting with realm id %u but this realm has id %u set in config.", address.c_str(), realm, realmID); return -1; } m_Session->LoadGlobalAccountData(); m_Session->LoadTutorialsData(); m_Session->ReadAddonsInfo(recvPacket); // Initialize Warden system only if it is enabled by config if (sWorld->getBoolConfig(CONFIG_WARDEN_ENABLED)) m_Session->InitWarden(&k, os); // Sleep this Network thread for uint32 sleepTime = sWorld->getIntConfig(CONFIG_SESSION_ADD_DELAY); ACE_OS::sleep (ACE_Time_Value (0, sleepTime)); sWorld->AddSession (m_Session); return 0; } int WorldSocket::HandlePing (WorldPacket& recvPacket) { uint32 ping; uint32 latency; // Get the ping packet content recvPacket >> ping; recvPacket >> latency; if (m_LastPingTime == ACE_Time_Value::zero) m_LastPingTime = ACE_OS::gettimeofday(); // for 1st ping else { ACE_Time_Value cur_time = ACE_OS::gettimeofday(); ACE_Time_Value diff_time (cur_time); diff_time -= m_LastPingTime; m_LastPingTime = cur_time; if (diff_time < ACE_Time_Value (27)) { ++m_OverSpeedPings; uint32 max_count = sWorld->getIntConfig (CONFIG_MAX_OVERSPEED_PINGS); if (max_count && m_OverSpeedPings > max_count) { ACE_GUARD_RETURN (LockType, Guard, m_SessionLock, -1); if (m_Session && AccountMgr::IsPlayerAccount(m_Session->GetSecurity())) { Player* _player = m_Session->GetPlayer(); sLog->outError("WorldSocket::HandlePing: Player (account: %u, GUID: %u, name: %s) kicked for over-speed pings (address: %s)", m_Session->GetAccountId(), _player ? _player->GetGUIDLow() : 0, _player ? _player->GetName().c_str() : "", GetRemoteAddress().c_str()); return -1; } } } else m_OverSpeedPings = 0; } // critical section { ACE_GUARD_RETURN (LockType, Guard, m_SessionLock, -1); if (m_Session) { m_Session->SetLatency (latency); m_Session->ResetClientTimeDelay(); } else { sLog->outError("WorldSocket::HandlePing: peer sent CMSG_PING, " "but is not authenticated or got recently kicked, " " address = %s", GetRemoteAddress().c_str()); return -1; } } WorldPacket packet (SMSG_PONG, 4); packet << ping; return SendPacket(packet); }