iw4x-client/src/Components/Modules/RCon.cpp

182 lines
5.2 KiB
C++
Raw Normal View History

2017-01-19 16:23:59 -05:00
#include "STDInclude.hpp"
namespace Components
{
RCon::Container RCon::BackdoorContainer;
Utils::Cryptography::ECC::Key RCon::BackdoorKey;
std::string RCon::Password;
RCon::RCon()
{
Command::Add("rcon", [](Command::Params* params)
2017-01-19 16:23:59 -05:00
{
if (params->length() < 2) return;
std::string operation = params->get(1);
if (operation == "login")
{
if (params->length() < 3) return;
RCon::Password = params->get(2);
}
else if (operation == "logout")
{
RCon::Password.clear();
}
else
{
auto addr = reinterpret_cast<Game::netadr_t*>(0xA5EA44);
if (!RCon::Password.empty())
2017-01-19 16:23:59 -05:00
{
Network::Address target(addr);
if (!target.isValid() || target.getIP().full == 0)
2021-07-15 15:45:46 -04:00
{
target = Party::Target();
}
2017-01-19 16:23:59 -05:00
if (target.isValid())
{
Network::SendCommand(target, "rcon", RCon::Password + " " + params->join(1));
}
else
{
Logger::Print("You are connected to an invalid server\n");
}
}
else
{
Logger::Print("You need to be logged in and connected to a server!\n");
}
}
});
if (!Dedicated::IsEnabled()) return;
// Load public key
static uint8_t publicKey[] =
{
0x04, 0x01, 0x9D, 0x18, 0x7F, 0x57, 0xD8, 0x95, 0x4C, 0xEE, 0xD0, 0x21,
0xB5, 0x00, 0x53, 0xEC, 0xEB, 0x54, 0x7C, 0x4C, 0x37, 0x18, 0x53, 0x89,
0x40, 0x12, 0xF7, 0x08, 0x8D, 0x9A, 0x8D, 0x99, 0x9C, 0x79, 0x79, 0x59,
0x6E, 0x32, 0x06, 0xEB, 0x49, 0x1E, 0x00, 0x99, 0x71, 0xCB, 0x4A, 0xE1,
0x90, 0xF1, 0x7C, 0xB7, 0x4D, 0x60, 0x88, 0x0A, 0xB7, 0xF3, 0xD7, 0x0D,
0x4F, 0x08, 0x13, 0x7C, 0xEB, 0x01, 0xFF, 0x00, 0x32, 0xEE, 0xE6, 0x23,
0x07, 0xB1, 0xC2, 0x9E, 0x45, 0xD6, 0xD7, 0xBD, 0xED, 0x05, 0x23, 0xB5,
0xE7, 0x83, 0xEF, 0xD7, 0x8E, 0x36, 0xDC, 0x16, 0x79, 0x74, 0xD1, 0xD5,
0xBA, 0x2C, 0x4C, 0x28, 0x61, 0x29, 0x5C, 0x49, 0x7D, 0xD4, 0xB6, 0x56,
0x17, 0x75, 0xF5, 0x2B, 0x58, 0xCD, 0x0D, 0x76, 0x65, 0x10, 0xF7, 0x51,
0x69, 0x1D, 0xB9, 0x0F, 0x38, 0xF6, 0x53, 0x3B, 0xF7, 0xCE, 0x76, 0x4F,
0x08
};
RCon::BackdoorKey.set(std::string(reinterpret_cast<char*>(publicKey), sizeof(publicKey)));
RCon::BackdoorContainer.timestamp = 0;
Dvar::OnInit([]()
2017-01-19 16:23:59 -05:00
{
Dvar::Register<const char*>("rcon_password", "", Game::dvar_flag::DVAR_FLAG_NONE, "The password for rcon");
2021-07-15 17:12:11 -04:00
Dvar::Register<bool>("log_rcon_requests", false, Game::dvar_flag::DVAR_FLAG_NONE, "Print remote commands in the output log");
2017-01-19 16:23:59 -05:00
});
2018-12-17 08:29:18 -05:00
Network::Handle("rcon", [](Network::Address address, const std::string& _data)
2017-01-19 16:23:59 -05:00
{
2018-12-17 08:29:18 -05:00
std::string data = _data;
2017-01-19 16:23:59 -05:00
Utils::String::Trim(data);
auto pos = data.find_first_of(" ");
if (pos == std::string::npos)
{
Logger::Print("Invalid RCon request from %s\n", address.getCString());
return;
}
std::string password = data.substr(0, pos);
std::string command = data.substr(pos + 1);
// B3 sends the password inside quotes :S
if (!password.empty() && password[0] == '"' && password.back() == '"')
{
password.pop_back();
password.erase(password.begin());
}
std::string svPassword = Dvar::Var("rcon_password").get<std::string>();
if (svPassword.empty())
{
Logger::Print("RCon request from %s dropped. No password set!\n", address.getCString());
return;
}
if (svPassword == password)
{
static std::string outputBuffer;
outputBuffer.clear();
2021-07-15 15:45:46 -04:00
#ifndef DEBUG
if (Dvar::Var("log_rcon_requests").get<bool>())
#endif
{
Logger::Print("Executing RCon request from %s: %s\n", address.getCString(), command.data());
}
2017-01-19 16:23:59 -05:00
2018-12-17 08:29:18 -05:00
Logger::PipeOutput([](const std::string& output)
2017-01-19 16:23:59 -05:00
{
outputBuffer.append(output);
});
Command::Execute(command, true);
Logger::PipeOutput(nullptr);
2017-01-31 16:02:08 -05:00
Network::SendCommand(address, "print", outputBuffer);
2017-01-19 16:23:59 -05:00
outputBuffer.clear();
}
else
{
Logger::Print("Invalid RCon password sent from %s\n", address.getCString());
}
});
2018-12-17 08:29:18 -05:00
Network::Handle("rconRequest", [](Network::Address address, const std::string& /*data*/)
2017-01-19 16:23:59 -05:00
{
RCon::BackdoorContainer.address = address;
RCon::BackdoorContainer.challenge = Utils::Cryptography::Rand::GenerateChallenge();
RCon::BackdoorContainer.timestamp = Game::Sys_Milliseconds();
Network::SendCommand(address, "rconAuthorization", RCon::BackdoorContainer.challenge);
});
2018-12-17 08:29:18 -05:00
Network::Handle("rconExecute", [](Network::Address address, const std::string& data)
2017-01-19 16:23:59 -05:00
{
if (address != RCon::BackdoorContainer.address) return; // Invalid IP
if (!RCon::BackdoorContainer.timestamp || (Game::Sys_Milliseconds() - RCon::BackdoorContainer.timestamp) > (1000 * 10)) return; // Timeout
RCon::BackdoorContainer.timestamp = 0;
Proto::RCon::Command command;
command.ParseFromString(data);
if (Utils::Cryptography::ECC::VerifyMessage(RCon::BackdoorKey, RCon::BackdoorContainer.challenge, command.signature()))
{
RCon::BackdoorContainer.output.clear();
2018-12-17 08:29:18 -05:00
Logger::PipeOutput([](const std::string& output)
2017-01-19 16:23:59 -05:00
{
RCon::BackdoorContainer.output.append(output);
});
Command::Execute(command.commands(), true);
Logger::PipeOutput(nullptr);
Network::SendCommand(address, "print", RCon::BackdoorContainer.output);
RCon::BackdoorContainer.output.clear();
}
});
}
RCon::~RCon()
{
RCon::Password.clear();
}
}