rust-nex/src/main.rs

296 lines
10 KiB
Rust
Raw Normal View History

2025-02-01 17:31:13 +01:00
#![allow(dead_code)]
2025-01-26 12:09:56 +01:00
2025-02-01 17:31:13 +01:00
use std::{env, fs};
2025-02-06 17:54:38 +01:00
use std::collections::BTreeMap;
2025-01-19 14:14:48 +01:00
use std::fs::File;
use std::net::{Ipv4Addr, SocketAddrV4};
use std::sync::Arc;
2025-01-19 14:14:48 +01:00
use chrono::Local;
2025-02-01 17:31:13 +01:00
use log::info;
2025-01-19 14:14:48 +01:00
use once_cell::sync::Lazy;
2025-01-26 12:09:56 +01:00
use rc4::{KeyInit, Rc4, StreamCipher};
use rc4::consts::U5;
2025-01-19 14:14:48 +01:00
use simplelog::{ColorChoice, CombinedLogger, Config, LevelFilter, TerminalMode, TermLogger, WriteLogger};
use tokio::sync::RwLock;
use tokio::task::JoinHandle;
use crate::nex::account::Account;
use crate::protocols::{auth, block_if_maintenance};
use crate::protocols::auth::AuthProtocolConfig;
use crate::protocols::matchmake_common::MatchmakeData;
use crate::protocols::server::RMCProtocolServer;
2025-02-04 16:31:56 +01:00
use crate::prudp::socket::{ActiveSecureConnectionData, EncryptionPair, Socket};
use crate::prudp::packet::{VirtualPort};
use crate::prudp::router::Router;
2025-02-04 16:31:56 +01:00
use crate::prudp::secure::{generate_secure_encryption_pairs, read_secure_connection_data};
2025-01-26 12:09:56 +01:00
use crate::rmc::message::RMCMessage;
2025-02-04 16:31:56 +01:00
use crate::rmc::structures::RmcSerialize;
2025-01-19 14:14:48 +01:00
2025-01-19 13:02:15 +01:00
mod endianness;
mod prudp;
2025-01-26 12:09:56 +01:00
pub mod rmc;
mod protocols;
2025-01-19 13:02:15 +01:00
mod nex;
mod grpc;
mod kerberos;
static KERBEROS_SERVER_PASSWORD: Lazy<String> = Lazy::new(||{
env::var("AUTH_SERVER_PASSWORD")
.ok()
.unwrap_or("password".to_owned())
});
static AUTH_SERVER_ACCOUNT: Lazy<Account> = Lazy::new(|| Account::new(1, "Quazal Authentication", &KERBEROS_SERVER_PASSWORD));
static SECURE_SERVER_ACCOUNT: Lazy<Account> = Lazy::new(|| Account::new(2, "Quazal Rendez-Vous", &KERBEROS_SERVER_PASSWORD));
2025-01-19 14:14:48 +01:00
static AUTH_SERVER_PORT: Lazy<u16> = Lazy::new(||{
env::var("AUTH_SERVER_PORT")
.ok()
.and_then(|s| s.parse().ok())
.unwrap_or(10000)
});
static SECURE_SERVER_PORT: Lazy<u16> = Lazy::new(||{
env::var("SECURE_SERVER_PORT")
.ok()
.and_then(|s| s.parse().ok())
.unwrap_or(10001)
});
2025-01-19 14:14:48 +01:00
static OWN_IP_PRIVATE: Lazy<Ipv4Addr> = Lazy::new(||{
env::var("SERVER_IP")
.ok()
.and_then(|s| s.parse().ok())
.expect("no public ip specified")
});
2025-01-19 14:14:48 +01:00
static OWN_IP_PUBLIC: Lazy<Ipv4Addr> = Lazy::new(||{
env::var("SERVER_IP_PUBLIC")
.ok()
.and_then(|s| s.parse().ok())
.unwrap_or(*OWN_IP_PRIVATE)
});
static SECURE_STATION_URL: Lazy<String> = Lazy::new(||
format!("prudps:/PID=2;sid=1;stream=10;type=2;address={};port={};CID=1", *OWN_IP_PUBLIC, *SECURE_SERVER_PORT)
);
#[tokio::main]
async fn main() {
2025-01-19 14:14:48 +01:00
CombinedLogger::init(
vec![
TermLogger::new(LevelFilter::Info, Config::default(), TerminalMode::Mixed, ColorChoice::Auto),
WriteLogger::new(LevelFilter::max(), Config::default(), {
2025-01-19 14:14:48 +01:00
fs::create_dir_all("log").unwrap();
File::create(format!("log/{}.log", Local::now().to_rfc2822())).unwrap()
})
]
).unwrap();
dotenv::dotenv().ok();
start_servers().await;
}
struct AuthServer{
router: Arc<Router>,
join_handle: JoinHandle<()>,
socket: Socket
2025-01-26 12:09:56 +01:00
}
async fn start_auth_server() -> AuthServer{
info!("starting auth server on {}:{}", *OWN_IP_PRIVATE, *AUTH_SERVER_PORT);
2025-01-19 14:14:48 +01:00
let (router, join_handle) =
Router::new(SocketAddrV4::new(*OWN_IP_PRIVATE, *AUTH_SERVER_PORT)).await
.expect("unable to startauth server");
2025-01-19 14:14:48 +01:00
info!("setting up endpoints");
2025-01-26 12:09:56 +01:00
// dont assign it to the name _ as that will make it drop right here and now
let auth_protocol_config = AuthProtocolConfig{
secure_server_account: &SECURE_SERVER_ACCOUNT,
build_name: "branch:origin/project/wup-agmj build:3_8_15_2004_0",
station_url: &SECURE_STATION_URL
};
let rmcserver = RMCProtocolServer::new(Box::new([
Box::new(auth::bound_protocol(auth_protocol_config))
]));
let socket =
Socket::new(
router.clone(),
VirtualPort::new(1,10),
2025-01-26 12:09:56 +01:00
"6f599f81",
Box::new(|_, count|{
2025-01-26 12:09:56 +01:00
Box::pin(
async move {
let encryption_pairs = Vec::from_iter((0..=count).map(|_v| {
let rc4: Rc4<U5> = Rc4::new_from_slice( "CD&ML".as_bytes()).unwrap();
let cypher = Box::new(rc4);
let server_cypher: Box<dyn StreamCipher + Send> = cypher;
let rc4: Rc4<U5> = Rc4::new_from_slice( "CD&ML".as_bytes()).unwrap();
let cypher = Box::new(rc4);
let client_cypher: Box<dyn StreamCipher + Send> = cypher;
EncryptionPair{
recv: client_cypher,
send: server_cypher
}
}));
Some((Vec::new(), encryption_pairs, None))
}
)
}),
Box::new(move |packet, socket, connection|{
let rmcserver = rmcserver.clone();
2025-02-06 17:54:38 +01:00
Box::pin(async move { rmcserver.process_message(packet, socket, connection).await; })
})
).await.expect("unable to create socket");
AuthServer{
join_handle,
router,
socket,
}
}
struct SecureServer{
router: Arc<Router>,
join_handle: JoinHandle<()>,
socket: Socket
}
async fn start_secure_server() -> SecureServer{
info!("starting secure server on {}:{}", *OWN_IP_PRIVATE, *SECURE_SERVER_PORT);
let (router, join_handle) =
Router::new(SocketAddrV4::new(*OWN_IP_PRIVATE, *SECURE_SERVER_PORT)).await
.expect("unable to startauth server");
info!("setting up endpoints");
2025-02-06 17:54:38 +01:00
let matchmake_data = Arc::new(RwLock::new(
MatchmakeData{
matchmake_sessions: BTreeMap::new()
}
));
2025-02-04 16:31:56 +01:00
let rmcserver = RMCProtocolServer::new(Box::new([
Box::new(block_if_maintenance),
Box::new(protocols::secure::bound_protocol()),
2025-02-06 17:54:38 +01:00
Box::new(protocols::matchmake::bound_protocol(matchmake_data.clone())),
Box::new(protocols::matchmake_extension::bound_protocol(matchmake_data))
2025-02-04 16:31:56 +01:00
]));
let socket =
Socket::new(
router.clone(),
VirtualPort::new(1,10),
"6f599f81",
Box::new(|p, count|{
Box::pin(
async move {
2025-02-04 16:31:56 +01:00
let (session_key, pid, check_value) = read_secure_connection_data(&p.payload, &SECURE_SERVER_ACCOUNT)?;
let check_value_response = check_value + 1;
let data = bytemuck::bytes_of(&check_value_response);
2025-02-04 16:31:56 +01:00
let mut response = Vec::new();
2025-02-04 16:31:56 +01:00
data.serialize(&mut response).ok()?;
let encryption_pairs = generate_secure_encryption_pairs(session_key, count);
Some((response, encryption_pairs, Some(
ActiveSecureConnectionData{
pid,
session_key
}
)))
2025-01-26 12:09:56 +01:00
}
)
}),
Box::new(move |packet, socket, connection|{
let rmcserver = rmcserver.clone();
2025-02-06 17:54:38 +01:00
Box::pin(async move { rmcserver.process_message(packet, socket, connection).await; })
2025-01-26 12:09:56 +01:00
})
).await.expect("unable to create socket");
2025-01-19 14:14:48 +01:00
SecureServer{
join_handle,
router,
socket,
}
}
async fn start_servers(){
let auth_server = start_auth_server().await;
let secure_server = start_secure_server().await;
auth_server.join_handle.await.expect("auth server crashed");
secure_server.join_handle.await.expect("auth server crashed");
2025-01-19 13:02:15 +01:00
}
2025-01-26 12:09:56 +01:00
#[cfg(test)]
mod test{
use std::io::Cursor;
use std::num::ParseIntError;
use std::str::from_utf8;
use hmac::digest::consts::U5;
use rc4::{KeyInit, Rc4, StreamCipher};
use crate::prudp::packet::PRUDPPacket;
use crate::rmc;
fn from_hex_stream(val: &str) -> Result<Vec<u8>, ParseIntError> {
let res: Result<Vec<u8>, _> = val.as_bytes()
.chunks_exact(2)
.map(|c| from_utf8(c).expect("unable to convert back to string"))
.map(|s| u8::from_str_radix(s, 16))
.collect();
res
}
#[tokio::test]
async fn simulate_packets(){
let val = from_hex_stream("ead001037d00afa1e200a5000200d9e4a4050368c18c6de4e2fb1cc40f0c020100768744db99f92c5005a061fd2a1df280cd64d5c1a565952c6befa607cbaf34661312b16db0fa6fccfb81e28b5a3a9bed02b49152bbc99cc112b7e29b9e45ec3d4b89df0fe71390883d9a927c264d07ada0de9cd28499e3ccdf3fd079e4a9848d4d783778c42da2af06106a7326634dc5bec5c3438ef18e30109839ffcc").expect("uuuuh");
let mut packet = PRUDPPacket::new(&mut Cursor::new(&val)).expect("invalid packet");
let mut rc4: Rc4<U5> =
Rc4::new_from_slice("CD&ML".as_bytes().into()).expect("invalid key");
rc4.apply_keystream(&mut packet.payload);
println!("packet: {:?}", packet);
let rmc_packet = rmc::message::RMCMessage::new(&mut Cursor::new(&packet.payload)).expect("unable to read message");
let mut a = Cursor::new(&rmc_packet.rest_of_data);
//let pid = rmc::structures::string::read(&mut a).expect("unable to read pid");
2025-01-26 12:09:56 +01:00
}
#[tokio::test]
async fn simulate_packets_response(){
let val = from_hex_stream("ead001032501a1af6200a500010013ffcdbc3a2ebc44efc6e38ea32a72b40201002e8644db19fe2a5005a2637d2a16f3b1fe5633037c1ed61c5aefad8afebdf2ff8600e9350fba1298b570c70f6dd647eac2d3faf0ab74ef761e2ee43dc10e249e5f91aed6813dcc04b3c707d9442b6e353b9b0b654e98f860fe5379c41d3c2a1874b7dd37ebf499e03bd2fd3e9a9203c0959feb760c38f504dcd0c9e99b17fd410657da4efa3e01c8a68ab3042d6d489788d5580778d32249cdf1fba8bf68cf4019d116ea7c580622ea1e3635139d91b44635d5e95b6c35b33898fdc0117fa6fc7162840d07a49f1e7089aa0ea65409a8ddeb2334449ba73a0ff7de462cf4a706a696de0f0521b84ae5a3f8587f3585d202d3cc0fb0451519c1b830b5e3cdd6de52e9add7325cbbf08a7c2f8b875934942b226703a22b4bc8931932dab055049051e4144b02").expect("uuuuh");
let mut packet = PRUDPPacket::new(&mut Cursor::new(&val)).expect("invalid packet");
let mut rc4: Rc4<U5> =
Rc4::new_from_slice("CD&ML".as_bytes().into()).expect("invalid key");
rc4.apply_keystream(&mut packet.payload);
println!("packet: {:?}", packet);
}
}