summary | shortlog | log | commit | commitdiff | tree
raw | patch | inline | side by side (parent: 72feb90)
raw | patch | inline | side by side (parent: 72feb90)
author | fgsfds <pvt.fgsfds@gmail.com> | |
Thu, 1 Jun 2023 22:01:22 +0000 (22:01 +0000) | ||
committer | Dmitry D. Chernov <blackdoomer@yandex.ru> | |
Sat, 3 Jun 2023 21:58:09 +0000 (07:58 +1000) |
src/mastersrv/Makefile | patch | blob | history | |
src/mastersrv/master.c | patch | blob | history |
diff --git a/src/mastersrv/Makefile b/src/mastersrv/Makefile
index 912055e37445b50fa6fa441f2db8016910d91647..337a06b7294321f95da0ac2f2bbcb3f067c5e175 100644 (file)
--- a/src/mastersrv/Makefile
+++ b/src/mastersrv/Makefile
-CC:=gcc
-CFLAGS:=-std=c99 -Wall -Werror -pedantic -O2
-SOURCES:=master.c
+CC := gcc
+CFLAGS := -std=gnu11 -Wall -Werror -Wno-unused-function -pedantic -O2
+SOURCES := master.c
ifeq ($(OS),Windows_NT)
- BIN:=bin\\d2df_master.exe
- DEL:=del
- LDFLAGS:=-lenet -lws2_32 -lwinmm -static-libgcc
+ BIN := bin\\d2df_master.exe
+ DEL := del
+ LDFLAGS := -lenet -lws2_32 -lwinmm -static-libgcc -static
else
- BIN:=bin/d2df_master
- DEL:=rm -f
- LDFLAGS:=-lenet
+ BIN := bin/d2df_master
+ DEL := rm -f
+ LDFLAGS := -lenet
CFLAGS += -Llibs -I.
endif
all: master
-
+
master:
$(CC) $(CFLAGS) -o $(BIN) $(SOURCES) $(LDFLAGS)
-
+
clean:
- $(DEL) *.o $(BIN)
\ No newline at end of file
+ $(DEL) *.o $(BIN)
diff --git a/src/mastersrv/master.c b/src/mastersrv/master.c
index ebeb2c5c9a5d7640b8ff04e3fdb9bd4a6a85c6d9..2ea5016bbf538ba65ee5da1e0f7679c5610894bf 100644 (file)
--- a/src/mastersrv/master.c
+++ b/src/mastersrv/master.c
#include <stdlib.h>
#include <stdio.h>
+#include <stdint.h>
+#include <stdbool.h>
+#include <stdarg.h>
#include <ctype.h>
#include <string.h>
#include <time.h>
+#include <errno.h>
#include <enet/enet.h>
#include <enet/types.h>
-#define MS_VERSION "0.2"
-#define MS_MAXSRVS 128
-#define MS_MAXHOST 5
-#define MS_MAXBANS 256
-#define MS_TIMEOUT 100
-#define MS_BANTIME (3 * 86400)
-#define MS_MAXHEUR 100
-
-#define NET_CHANS 2
-#define NET_CH_MAIN 0
-#define NET_CH_UPD 1
-#define NET_MAXCLIENTS 64
-
-#define NET_BUFSIZE 65536
-
-#define NET_MSG_ADD 200
-#define NET_MSG_RM 201
-#define NET_MSG_LIST 202
-
-#define LC_MS_INIT "D2DF master server starting on port %d...\n"
-#define LC_MS_ADD "\nAdded server in slot #%d:\n%s:%d\n%s\n%s (%d)\n%d/%d plrs\nproto: %d pw?: %d\n"
-#define LC_MS_UPD "\nUpdated server #%d (%s:%d):\n%s\n%s (%d)\n%d/%d plrs\nproto: %d pw?: %d\n"
-#define LC_MS_RM "\nRemoved server #%d (%s:%d) by request.\n"
-#define LC_MS_TIME "\nServer #%d (%s:%d) timed out.\n"
-#define LC_MS_LIST "\nSent server list to %x:%u (ver. %s).\n"
-#define LC_MS_DIE "\nD2DF master server shutting down...\n"
-#define LC_MS_CONN "\nIncoming connection from %x:%u...\n"
-#define LC_MS_MOTD "\nMOTD: %s\n"
-#define LC_MS_URGENT "\nURGENT: %s\n"
-#define LC_MS_BANNED "\nBanned %s until %s, reason: %s (#%d)\n"
-#define LC_MS_NOBANS "\nCould not load ban list from file\n"
-#define LC_MS_BADADR "\nBad address in file: %s\n"
-#define LC_MS_BANHEUR "tripped heuristic check"
-#define LC_MS_BANTOOMUCH "created too many servers"
-#define LC_MS_BANSPAM "suspicious multiple server activity"
-#define LC_MS_BANLIST "address in ban list"
-#define LC_MS_BANTRASH "garbage server data"
-#define LC_MS_BANINVAL "invalid message ID"
-#define LC_MS_OOM "\nOut of memory\n"
-
+#define MS_VERSION "0.3"
+#define MS_MAX_SERVERS 128
+#define MS_MAX_CLIENTS (MS_MAX_SERVERS + 1)
#define MS_URGENT_FILE "urgent.txt"
#define MS_MOTD_FILE "motd.txt"
#define MS_BAN_FILE "master_bans.txt"
-struct ms_ban_s;
+#define DEFAULT_SPAM_CAP 10
+#define DEFAULT_MAX_SERVERS MS_MAX_SERVERS
+#define DEFAULT_MAX_PER_HOST 4
+#define DEFAULT_TIMEOUT 100
+#define DEFAULT_BAN_TIME (3 * 86400)
+#define DEFAULT_PORT 25665
-typedef struct ms_ban_record_s {
- ENetAddress mask;
- char ip[18];
- int ban_count;
- time_t cur_ban;
- struct ms_ban_record_s *next;
- struct ms_ban_record_s *prev;
-} ms_ban_record;
-
-struct ms_server_s {
- enet_uint8 used;
- char s_ip[18];
- char s_name[257];
- char s_map[257];
- enet_uint8 s_pw;
- enet_uint8 s_plrs;
- enet_uint8 s_maxplrs;
- enet_uint8 s_mode;
- enet_uint8 s_protocol;
- enet_uint16 s_port;
- time_t deathtime;
- time_t lasttime;
+#define NET_BUFSIZE 65536
+#define NET_FULLMASK 0xFFFFFFFF
+
+#define SV_PROTO_MIN 140
+#define SV_PROTO_MAX 210
+#define SV_NAME_MAX 64
+#define SV_MAP_MAX 64
+#define SV_MAX_PLAYERS 24
+#define SV_MAX_GAMEMODE 5
+#define SV_NEW_SERVER_INTERVAL 3
+
+#define MAX_STRLEN 0xFF
+
+enum log_severity_e {
+ LOG_NOTE,
+ LOG_WARN,
+ LOG_ERROR
+};
+
+enum net_ch_e {
+ NET_CH_MAIN,
+ NET_CH_UPD,
+ NET_CH_COUNT
+};
+
+enum net_msg_e {
+ NET_MSG_ADD = 200,
+ NET_MSG_RM = 201,
+ NET_MSG_LIST = 202
};
-typedef struct ms_server_s ms_server;
+enum sv_flags_e {
+ SV_FL_PASSWORD = 1 << 0,
+ SV_FL_VERIFIED = 1 << 1,
+ SV_FL_MAX = SV_FL_PASSWORD | SV_FL_VERIFIED,
+};
typedef struct enet_buf_s {
enet_uint8 *data;
size_t size;
size_t pos;
int overflow;
-} enet_buf;
-
-const char ms_game_ver[] = "0.63";
-char ms_motd[255] = "";
-char ms_urgent[255] = "";
-
-int ms_port = 25660;
-int ms_timeout = 100;
-int ms_checkmultiple = 0;
-
-enet_uint8 b_send_data[NET_BUFSIZE];
-enet_buf b_send = { .data = b_send_data, .size = sizeof(b_send_data) };
-enet_buf b_recv;
-
-ENetHost *ms_host = NULL;
-ENetPeer *ms_peers[NET_MAXCLIENTS];
+} enet_buf_t;
-ms_server ms_srv[MS_MAXSRVS];
-enet_uint8 ms_count = 0;
-
-ms_ban_record *ms_bans;
+typedef struct ban_record_s {
+ enet_uint32 host;
+ enet_uint32 mask;
+ int ban_count;
+ time_t cur_ban;
+ struct ban_record_s *next;
+ struct ban_record_s *prev;
+} ban_record_t;
+
+typedef struct server_s {
+ enet_uint32 host; // BE; 0 means this slot is unused
+ enet_uint16 port; // LE, which is what the game and enet both expect
+ enet_uint8 flags;
+ enet_uint8 proto;
+ enet_uint8 gamemode;
+ enet_uint8 players;
+ enet_uint8 maxplayers;
+ char name[MAX_STRLEN + 2];
+ char map[MAX_STRLEN + 2];
+ time_t death_time;
+ time_t timestamp;
+} server_t;
+
+// real servers
+static server_t servers[MS_MAX_SERVERS];
+static int max_servers = DEFAULT_MAX_SERVERS;
+static int max_servers_per_host = DEFAULT_MAX_PER_HOST;
+static int num_servers = 0;
// fake servers to show on old versions of the game
-static const ms_server ms_fake_srv[] = {
+static const server_t fake_servers[] = {
{
- .used = 1,
- .s_ip = "0.0.0.0",
- .s_name = "! \xc2\xc0\xd8\xc0 \xca\xce\xcf\xc8\xdf \xc8\xc3\xd0\xdb "
- "\xd3\xd1\xd2\xc0\xd0\xc5\xcb\xc0! "
- "\xd1\xca\xc0\xd7\xc0\xc9\xd2\xc5 \xcd\xce\xc2\xd3\xde C "
- "doom2d.org !",
- .s_map = "! Your game is outdated. "
+ .name = "! \xc2\xc0\xd8\xc0 \xca\xce\xcf\xc8\xdf \xc8\xc3\xd0\xdb "
+ "\xd3\xd1\xd2\xc0\xd0\xc5\xcb\xc0! "
+ "\xd1\xca\xc0\xd7\xc0\xc9\xd2\xc5 \xcd\xce\xc2\xd3\xde C "
+ "doom2d.org !",
+ .map = "! Your game is outdated. "
"Get latest version at doom2d.org !",
- .s_protocol = 255,
+ .proto = 255,
},
{
- .used = 1,
- .s_ip = "0.0.0.0",
- .s_name = "! \xcf\xd0\xce\xc1\xd0\xce\xd1\xdcTE \xcf\xce\xd0\xd2\xdb "
- "25666 \xc8 57133 HA CEPBEPE \xcf\xc5\xd0\xc5\xc4 \xc8\xc3\xd0\xce\xc9 !",
- .s_map = "! Forward ports 25666 and 57133 before hosting !",
- .s_protocol = 255,
+ .name = "! \xcf\xd0\xce\xc1\xd0\xce\xd1\xdcTE \xcf\xce\xd0\xd2\xdb "
+ "25666 \xc8 57133 HA CEPBEPE \xcf\xc5\xd0\xc5\xc4 \xc8\xc3\xd0\xce\xc9 !",
+ .map = "! Forward ports 25666 and 57133 before hosting !",
+ .proto = 255,
},
};
-
-#define MS_FAKESRVS (sizeof(ms_fake_srv) / sizeof(ms_fake_srv[0]))
-
-void i_usage (void) {
- printf("Usage: d2df_master -p port_number [-t timeout_seconds]\n");
- fflush(stdout);
+static const int num_fake_servers = sizeof(fake_servers) / sizeof(*fake_servers);
+
+// ban list
+static ban_record_t *banlist;
+
+// settings
+static int ms_port = DEFAULT_PORT;
+static int ms_timeout = DEFAULT_TIMEOUT;
+static int ms_spam_cap = DEFAULT_SPAM_CAP;
+static char ms_motd[MAX_STRLEN + 1] = "";
+static char ms_urgent[MAX_STRLEN + 1] = "";
+static ENetHost *ms_host;
+
+// network buffers
+static enet_uint8 buf_send_data[NET_BUFSIZE];
+static enet_buf_t buf_send = { .data = buf_send_data, .size = sizeof(buf_send_data) };
+static enet_buf_t buf_recv; // rx data supplied by enet packets
+
+// stupid client spam filter
+static enet_uint32 cl_last_addr;
+static time_t cl_last_time;
+static int cl_spam_cnt;
+
+/* common utility functions */
+
+static char *u_vabuf(void) {
+ static char vabuf[4][MAX_STRLEN];
+ static int idx = 0;
+ char *ret = vabuf[idx++];
+ if (idx >= 4) idx = 0;
+ return ret;
}
-
-void i_version (void) {
- printf("Doom 2D Forever master server v%s\n", MS_VERSION);
- fflush(stdout);
+static const char *u_strtime(const time_t t) {
+ char *buf = u_vabuf();
+ struct tm *ptm = localtime(&t);
+ strftime(buf, MAX_STRLEN - 1, "%d/%m/%y %H:%M:%S", ptm);
+ return buf;
}
-
-void d_error (const char *msg, int fatal) {
- if (fatal) {
- fprintf(stderr, "FATAL ERROR: %s\n", msg);
- exit(EXIT_FAILURE);
- } else {
- fprintf(stderr, "ERROR: %s\n", msg);
+static inline const char *u_logprefix(const enum log_severity_e s) {
+ switch (s) {
+ case LOG_WARN: return "WARNING:";
+ case LOG_ERROR: return "ERROR:";
+ default: return "";
}
}
+static void u_log(const enum log_severity_e severity, const char *fmt, ...) {
+ printf("[%s] %s ", u_strtime(time(NULL)), u_logprefix(severity));
+ va_list args;
+ va_start(args, fmt);
+ vprintf(fmt, args);
+ va_end(args);
+ printf("\n");
+}
-void d_getargs (int argc, char *argv[]) {
- if (argc < 2) {
- i_usage();
- exit(0);
- return;
- }
-
- for (int i = 1; i < argc; ++i) {
- if (!strcmp(argv[i], "-v")) {
- i_version();
- exit(0);
- return;
- } else if (!strcmp(argv[i], "-p")) {
- if (i + 1 >= argc) {
- d_error("Specify a port value!", 1);
- return;
- } else {
- ms_port = atoi(argv[++i]);
- }
- } else if (!strcmp(argv[i], "-t") & (i + 1 < argc)) {
- ms_timeout = atoi(argv[++i]);
- } else if (!strcmp(argv[i], "--check-multihost")) {
- ms_checkmultiple = 1;
- }
+static void __attribute__((noreturn)) u_fatal(const char *fmt, ...) {
+ fprintf(stderr, "[%s] FATAL ERROR:\n", u_strtime(time(NULL)));
+ va_list args;
+ va_start(args, fmt);
+ vfprintf(stderr, fmt, args);
+ va_end(args);
+ fprintf(stderr, "\n");
+ fflush(stderr);
+ exit(1);
+}
+static bool u_strisprint(const char *str) {
+ if (!str || !*str)
+ return false;
+ for (const char *p = str; *p; ++p) {
+ // only stuff before space, DEL, NBSP and SHY are considered garbage since we're on 1251
+ if (*p < 0x20 || *p == 0x7F || *p == 0xA0 || *p == 0xAD)
+ return false;
}
+ return true;
}
+static const char *u_iptostr(const enet_uint32 host) {
+ ENetAddress addr = { .host = host, .port = 0 };
+ char *buf = u_vabuf();
+ enet_address_get_host_ip(&addr, buf, MAX_STRLEN - 1);
+ return buf;
+}
-int d_readtextfile (const char *fname, char *buf, size_t max) {
+static bool u_readtextfile(const char *fname, char *buf, size_t max) {
FILE *f = fopen(fname, "r");
char *const end = buf + max - 1;
char *p = buf;
}
*p = '\0';
fclose(f);
- return 0;
+ return true;
}
- return 1;
+ return false;
}
-
-int d_strisprint (const char *str) {
- if (!str || !*str) return 0;
- for (const char *p = str; p && *p; ++p)
- if (isprint(*p) || *p > 0x7f) return 1;
- return 0;
+static inline enet_uint32 u_prefixtomask(const enet_uint32 prefix) {
+ return ENET_HOST_TO_NET_32((0xFFFFFFFF << (32 - prefix)) & 0xFFFFFFFF);
}
+static inline enet_uint32 u_masktoprefix(const enet_uint32 mask) {
+ return (32 - __builtin_ctz(mask));
+}
-const char *d_strtime(const time_t t) {
- static char buf[128];
- struct tm *ptm = localtime(&t);
- strftime(buf, sizeof(buf), "%c", ptm);
- return buf;
+static inline void u_printsv(const server_t *sv) {
+ printf("* addr: %s:%d\n", u_iptostr(sv->host), sv->port);
+ printf("* name: %s\n", sv->name);
+ printf("* map: %s (mode %d)\n", sv->map, sv->gamemode);
+ printf("* plrs: %d/%d\n", sv->players, sv->maxplayers);
+ printf("* flag: %04x\n", sv->flags);
}
+/* buffer utility functions */
-static inline int b_enough_left(enet_buf *buf, size_t size) {
+static inline int b_enough_left(enet_buf_t *buf, size_t size) {
if (buf->pos + size > buf->size) {
buf->overflow = 1;
return 0;
return 1;
}
-
-enet_uint8 b_read_uint8 (enet_buf *buf) {
+static enet_uint8 b_read_uint8(enet_buf_t *buf) {
if (b_enough_left(buf, 1))
return buf->data[buf->pos++];
return 0;
}
-
-enet_uint16 b_read_uint16 (enet_buf *buf) {
+static enet_uint16 b_read_uint16(enet_buf_t *buf) {
enet_uint16 ret = 0;
if (b_enough_left(buf, sizeof(ret))) {
return ret;
}
-
-char* b_read_dstring (enet_buf *buf) {
+static char *b_read_dstring(enet_buf_t *buf) {
char *ret = NULL;
if (b_enough_left(buf, 1)) {
- size_t len = b_read_uint8(buf);
+ const size_t len = b_read_uint8(buf);
if (b_enough_left(buf, len)) {
ret = malloc(len + 1);
memmove(ret, (char*)(buf->data + buf->pos), len);
return ret;
}
+static char *b_read_dstring_to(enet_buf_t *buf, char *out, size_t out_size) {
+ if (b_enough_left(buf, 1)) {
+ const size_t len = b_read_uint8(buf);
+ if (b_enough_left(buf, len)) {
+ if (len < out_size) {
+ memmove(out, (char*)(buf->data + buf->pos), len);
+ out[len] = '\0';
+ } else if (out_size) {
+ out[0] = '\0';
+ }
+ buf->pos += len;
+ return out;
+ }
+ }
+ return NULL;
+}
-void b_write_uint8 (enet_buf *buf, enet_uint8 val) {
+static void b_write_uint8(enet_buf_t *buf, enet_uint8 val) {
buf->data[buf->pos++] = val;
}
-
-void b_write_uint16 (enet_buf *buf, enet_uint16 val) {
+static void b_write_uint16(enet_buf_t *buf, enet_uint16 val) {
*(enet_uint16*)(buf->data + buf->pos) = val;
buf->pos += sizeof(val);
}
-
-void b_write_dstring (enet_buf *buf, const char* val) {
+static void b_write_dstring(enet_buf_t *buf, const char* val) {
enet_uint8 len = strlen(val);
b_write_uint8(buf, len);
-
memmove((char*)(buf->data + buf->pos), val, len);
buf->pos += len;
}
+void b_write_server(enet_buf_t *buf, const server_t *s) {
+ b_write_dstring(buf, u_iptostr(s->host));
+ b_write_uint16 (buf, s->port);
+ b_write_dstring(buf, s->name);
+ b_write_dstring(buf, s->map);
+ b_write_uint8 (buf, s->gamemode);
+ b_write_uint8 (buf, s->players);
+ b_write_uint8 (buf, s->maxplayers);
+ b_write_uint8 (buf, s->proto);
+ b_write_uint8 (buf, (s->flags & SV_FL_PASSWORD));
+}
-void b_write_server (enet_buf *b_send, ms_server s) {
- b_write_dstring(b_send, s.s_ip);
- b_write_uint16 (b_send, s.s_port);
- b_write_dstring(b_send, s.s_name);
- b_write_dstring(b_send, s.s_map);
- b_write_uint8 (b_send, s.s_mode);
- b_write_uint8 (b_send, s.s_plrs);
- b_write_uint8 (b_send, s.s_maxplrs);
- b_write_uint8 (b_send, s.s_protocol);
- b_write_uint8 (b_send, s.s_pw);
+/* server functions */
+
+static void sv_remove(const enet_uint32 host, const enet_uint16 port) {
+ for (int i = 0; i < max_servers; ++i) {
+ if (servers[i].host == host && servers[i].port == port) {
+ servers[i].host = 0;
+ servers[i].port = 0;
+ --num_servers;
+ }
+ }
+}
+
+static void sv_remove_by_host(enet_uint32 host, enet_uint32 mask) {
+ host &= mask;
+ for (int i = 0; i < max_servers; ++i) {
+ if (servers[i].host && (servers[i].host & mask) == host) {
+ servers[i].host = 0;
+ servers[i].port = 0;
+ --num_servers;
+ }
+ }
}
+static int sv_count_by_host(enet_uint32 host, enet_uint32 mask) {
+ host &= mask;
+ int count = 0;
+ for (int i = 0; i < max_servers; ++i) {
+ if (servers[i].host && (servers[i].host & mask) == host)
+ ++count;
+ }
+ return count;
+}
+
+static time_t sv_last_timestamp_for_host(enet_uint32 host, enet_uint32 mask) {
+ host &= mask;
+ time_t last = 0;
+ for (int i = 0; i < max_servers; ++i) {
+ if (servers[i].host && (servers[i].host & mask) == host) {
+ if (servers[i].timestamp > last)
+ last = servers[i].timestamp;
+ }
+ }
+ return last;
+}
-time_t ban_get_time(const int cnt) {
+static inline server_t *sv_find_or_add(const enet_uint32 host, const enet_uint32 port) {
+ server_t *empty = NULL;
+ for (int i = 0; i < max_servers; ++i) {
+ server_t *s = servers + i;
+ if (s->host == host && s->port == port)
+ return s; // this server already exists
+ if (!s->host && !empty)
+ empty = s; // remember the first empty slot in case it's needed later
+ }
+ return empty;
+}
+
+/* ban list functions */
+
+static inline time_t ban_get_time(const int cnt) {
static const time_t times[] = {
1 * 5 * 60,
1 * 30 * 60,
1 * 60 * 60,
24 * 60 * 60,
72 * 60 * 60,
+ 720 * 60 * 60,
8760 * 60 * 60,
};
return times[cnt];
}
-
-ms_ban_record *ban_check (const ENetAddress *addr) {
+static ban_record_t *ban_check(const enet_uint32 host) {
const time_t now = time(NULL);
- for (ms_ban_record *b = ms_bans; b; b = b->next) {
- if (b->mask.host == addr->host) {
+ for (ban_record_t *b = banlist; b; b = b->next) {
+ if ((b->host & b->mask) == (host & b->mask)) {
if (b->cur_ban > now)
return b;
}
return NULL;
}
-
-ms_ban_record *ban_record_check (const ENetAddress *addr) {
- for (ms_ban_record *b = ms_bans; b; b = b->next) {
- if (b->mask.host == addr->host)
+static inline ban_record_t *ban_record_check(const enet_uint32 host) {
+ for (ban_record_t *b = banlist; b; b = b->next) {
+ if ((b->host & b->mask) == (host & b->mask))
return b;
}
return NULL;
}
-
-ms_ban_record *ban_record_add_addr (const ENetAddress *addr, const int cnt, const time_t cur) {
- ms_ban_record *rec = ban_record_check(addr);
+static ban_record_t *ban_record_add_addr(const enet_uint32 host, const enet_uint32 mask, const int cnt, const time_t cur) {
+ ban_record_t *rec = ban_record_check(host);
if (rec) return rec;
rec = calloc(1, sizeof(*rec));
if (!rec) return NULL;
- enet_address_get_host_ip(addr, rec->ip, 17);
- rec->mask = *addr;
+ rec->host = host & mask;
+ rec->mask = mask;
+ if (rec->mask == 0) rec->mask = NET_FULLMASK;
rec->ban_count = cnt;
rec->cur_ban = cur;
- if (ms_bans) ms_bans->prev = rec;
- rec->next = ms_bans;
- ms_bans = rec;
+ if (banlist) banlist->prev = rec;
+ rec->next = banlist;
+ banlist = rec;
return rec;
}
+static ban_record_t *ban_record_add_ip(const char *ip, const int cnt, const time_t cur) {
+ enet_uint32 prefix = 32;
-ms_ban_record *ban_record_add_ip (const char *ip, const int cnt, const time_t cur) {
- ENetAddress addr;
- if (enet_address_set_host_ip(&addr, ip) != 0) {
- fprintf(stderr, LC_MS_BADADR, ip);
+ // find and get the prefix length, if any
+ char ip_copy[24] = { 0 };
+ strncpy(ip_copy, ip, sizeof(ip_copy) - 1);
+ char *slash = strrchr(ip_copy, '/');
+ if (slash) {
+ *slash++ = '\0'; // strip the prefix length off
+ if (*slash) prefix = atoi(slash);
+ }
+
+ ENetAddress addr = { 0 };
+ if (enet_address_set_host_ip(&addr, ip_copy) != 0) {
+ u_log(LOG_ERROR, "banlist: `%s` is not a valid IP address", ip_copy);
return NULL;
}
- return ban_record_add_addr(&addr, cnt, cur);
-}
+ // transform prefix length into mask
+ const enet_uint32 mask = u_prefixtomask(prefix);
+
+ return ban_record_add_addr(addr.host, mask, cnt, cur);
+}
-void ban_load_list (const char *fname) {
+static void ban_load_list(const char *fname) {
FILE *f = fopen(fname, "r");
if (!f) {
- d_error(LC_MS_NOBANS, 0);
- return;
+ u_log(LOG_WARN, "banlist: could not open %s for reading", fname);
+ return;
}
- char ln[256] = { 0 };
+ char ln[MAX_STRLEN] = { 0 };
while (fgets(ln, sizeof(ln), f)) {
for (int i = sizeof(ln) - 1; i >= 0; --i)
if (ln[i] == '\n' || ln[i] == '\r')
ln[i] = 0;
- char ip[17] = { 0 };
+ if (ln[0] == 0)
+ continue;
+
+ char ip[21] = { 0 }; // optionally includes the "/nn" prefix length at the end
time_t exp = 0;
int count = 0;
-
- sscanf(ln, "%16s %ld %d", ip, &exp, &count);
+ if (sscanf(ln, "%20s %ld %d", ip, &exp, &count) < 3) {
+ u_log(LOG_ERROR, "banlist: malformed line: `%s`", ln);
+ continue;
+ }
if (ban_record_add_ip(ip, count, exp))
- printf(LC_MS_BANNED, ip, d_strtime(exp), LC_MS_BANLIST, count);
+ u_log(LOG_NOTE, "banlist: banned %s until %s (ban level %d)", ip, u_strtime(exp), count);
}
fclose(f);
}
-
-void ban_save_list (const char *fname) {
+static void ban_save_list(const char *fname) {
FILE *f = fopen(fname, "w");
if (!f) {
- d_error(LC_MS_NOBANS, 0);
+ u_log(LOG_ERROR, "banlist: could not open %s for writing", fname);
return;
}
- for (ms_ban_record *rec = ms_bans; rec; rec = rec->next)
+ for (ban_record_t *rec = banlist; rec; rec = rec->next) {
if (rec->ban_count)
- fprintf(f, "%s %ld %d\n", rec->ip, rec->cur_ban, rec->ban_count);
+ fprintf(f, "%s/%u %ld %d\n", u_iptostr(rec->host), u_masktoprefix(rec->mask), rec->cur_ban, rec->ban_count);
+ }
fclose(f);
}
-
-int ban_heur (const ms_server *srv, const time_t now) {
- int score = 0;
-
+static bool ban_sanity_check(const server_t *srv) {
// can't have more than 24 maxplayers; can't have more than max
- if (srv->s_plrs > srv->s_maxplrs || srv->s_maxplrs > 24 || srv->s_maxplrs == 0)
- score += MS_MAXHEUR;
-
+ if (srv->players > srv->maxplayers || srv->maxplayers > SV_MAX_PLAYERS || srv->maxplayers == 0)
+ return false;
// name and map have to be non-garbage
- if (!d_strisprint(srv->s_map) || !d_strisprint(srv->s_name))
- score += MS_MAXHEUR;
-
+ if (!u_strisprint(srv->map) || !u_strisprint(srv->name))
+ return false;
// these protocols don't exist
- if (srv->s_protocol < 100 || srv->s_protocol > 250)
- score += MS_MAXHEUR;
-
+ if (srv->proto < SV_PROTO_MIN || srv->proto > SV_PROTO_MAX)
+ return false;
// the game doesn't allow server names longer than 64 chars
- if (strlen(srv->s_name) > 64)
- score += MS_MAXHEUR;
-
+ if (strlen(srv->name) > SV_NAME_MAX)
+ return false;
// game mode has to actually exist
- if (srv->s_mode > 5)
- score += MS_MAXHEUR;
+ if (srv->gamemode > SV_MAX_GAMEMODE)
+ return false;
+ // flags field can't be higher than the sum of all the flags
+ if (srv->flags > SV_FL_MAX)
+ return false;
+ return true;
+}
- // password field can be either 0 or 1
- if (srv->s_pw > 1)
- score += MS_MAXHEUR;
+static void ban_add(const enet_uint32 host, const char *reason) {
+ const time_t now = time(NULL);
- // port has to be set, although the game allows you to set it to 0
- // if (!srv->s_port)
- // score += MS_MAXHEUR;
+ ban_record_t *rec = ban_record_add_addr(host, NET_FULLMASK, 0, 0);
+ if (!rec) u_fatal("OOM trying to ban %s", u_iptostr(host));
- // servers usually don't update more often than once every 30 seconds
- if (now - srv->lasttime < 5)
- score += MS_MAXHEUR / 2;
+ rec->cur_ban = now + ban_get_time(rec->ban_count);
+ rec->ban_count++;
+
+ u_log(LOG_NOTE, "banned %s until %s, reason: %s, ban level: %d", u_iptostr(rec->host), u_strtime(rec->cur_ban), reason, rec->ban_count);
+
+ ban_save_list(MS_BAN_FILE);
- return score;
+ sv_remove_by_host(host, NET_FULLMASK);
+
+ if (host == cl_last_addr)
+ cl_last_addr = 0;
}
-void erase_banned_host(const char *ip) {
- for (int i = 0; i < MS_MAXSRVS; ++i) {
- if (!strcmp(ms_srv[i].s_ip, ip)) {
- if (ms_srv[i].used) {
- ms_srv[i].used = 0;
- ms_count--;
- }
- }
+static inline void ban_peer(ENetPeer *peer, const char *reason) {
+ if (peer) {
+ ban_add(peer->address.host, reason);
+ enet_peer_reset(peer);
}
}
-time_t get_sum_lasttime(char* ip) {
- time_t sumLastTime = 0;
- const time_t now = time(NULL);
- for (int i = 0; i < MS_MAXSRVS; ++i) {
- if (ms_srv[i].used && (strncmp(ip, ms_srv[i].s_ip, 16) == 0)) {
- sumLastTime = sumLastTime + (now - ms_srv[i].lasttime);
- }
+/* main */
+
+static void deinit(void) {
+ // ban_save_list(MS_BAN_FILE);
+ if (ms_host) {
+ enet_host_destroy(ms_host);
+ ms_host = NULL;
}
- return sumLastTime;
+ enet_deinitialize();
}
-void ban_add (const ENetAddress *addr, const char *reason) {
+static bool handle_msg(const enet_uint8 msgid, ENetPeer *peer) {
+ server_t *sv = NULL;
+ server_t tmpsv = { 0 };
+ char clientver[MAX_STRLEN] = { 0 };
const time_t now = time(NULL);
- ms_ban_record *rec = ban_record_add_addr(addr, 0, 0);
- if (!rec) d_error(LC_MS_OOM, 1);
+ switch (msgid) {
+ case NET_MSG_ADD:
+ tmpsv.port = b_read_uint16(&buf_recv);
+ b_read_dstring_to(&buf_recv, tmpsv.name, sizeof(tmpsv.name));
+ b_read_dstring_to(&buf_recv, tmpsv.map, sizeof(tmpsv.map));
+ tmpsv.gamemode = b_read_uint8(&buf_recv);
+ tmpsv.players = b_read_uint8(&buf_recv);
+ tmpsv.maxplayers = b_read_uint8(&buf_recv);
+ tmpsv.proto = b_read_uint8(&buf_recv);
+ tmpsv.flags = b_read_uint8(&buf_recv);
+
+ if (buf_recv.overflow) {
+ ban_peer(peer, "malformed MSG_ADD");
+ return true;
+ }
- rec->cur_ban = now + ban_get_time(rec->ban_count);
- rec->ban_count++;
+ sv = sv_find_or_add(peer->address.host, tmpsv.port);
+ if (!sv) {
+ u_log(LOG_ERROR, "ran out of server slots trying to add %s:%d", u_iptostr(peer->address.host), tmpsv.port);
+ return true;
+ }
- printf(LC_MS_BANNED, rec->ip, d_strtime(rec->cur_ban), reason, rec->ban_count);
+ if (sv->host == peer->address.host) {
+ // old server; update it
+ memcpy(sv->map, tmpsv.map, sizeof(sv->map));
+ memcpy(sv->name, tmpsv.name, sizeof(sv->name));
+ sv->players = tmpsv.players;
+ sv->maxplayers = tmpsv.maxplayers;
+ sv->flags = tmpsv.flags;
+ sv->gamemode = tmpsv.gamemode;
+ // first check if the new values are garbage
+ if (!ban_sanity_check(sv)) {
+ ban_peer(peer, "tripped sanity check");
+ return true;
+ }
+ // only then update the times
+ sv->death_time = now + ms_timeout;
+ sv->timestamp = now;
+ u_log(LOG_NOTE, "updated server #%d:", sv - servers);
+ u_printsv(sv);
+ } else {
+ // new server; first check if this host is creating too many servers in the list
+ if (max_servers_per_host) {
+ const int count = sv_count_by_host(peer->address.host, NET_FULLMASK);
+ if (count >= max_servers_per_host) {
+ ban_peer(peer, "too many servers in list");
+ return true;
+ }
+ /*
+ // FIXME: commented out as this might trip when the master restarts
+ if (count > 0) {
+ // check if this is too soon to create a new server
+ const time_t delta = now - sv_last_timestamp_for_host(peer->address.host, NET_FULLMASK);
+ if (delta < count * SV_NEW_SERVER_INTERVAL) {
+ ban_peer(peer, "creating servers too fast");
+ return true;
+ }
+ }
+ */
+ }
+ // then add that shit
+ *sv = tmpsv;
+ sv->host = peer->address.host;
+ sv->death_time = now + ms_timeout;
+ sv->timestamp = now;
+ if (!ban_sanity_check(sv)) {
+ sv->host = 0;
+ sv->port = 0;
+ ban_peer(peer, "tripped sanity check");
+ return true;
+ }
+ ++num_servers;
+ u_log(LOG_NOTE, "added new server #%d:", sv - servers);
+ u_printsv(sv);
+ }
+ return true;
- ban_save_list(MS_BAN_FILE);
- erase_banned_host(rec->ip);
-}
+ case NET_MSG_RM:
+ tmpsv.port = b_read_uint16(&buf_recv);
+ if (buf_recv.overflow) {
+ ban_peer(peer, "malformed MSG_RM");
+ return true;
+ }
+ sv_remove(peer->address.host, tmpsv.port);
+ return true;
+
+ case NET_MSG_LIST:
+ buf_send.pos = 0;
+ b_write_uint8(&buf_send, NET_MSG_LIST);
+
+ clientver[0] = 0;
+ if (buf_recv.size > 2) {
+ // holy shit a fresh client
+ b_read_dstring_to(&buf_recv, clientver, sizeof(clientver));
+ b_write_uint8(&buf_send, num_servers);
+ } else {
+ // old client; feed him fake servers first
+ b_write_uint8(&buf_send, num_servers + num_fake_servers);
+ for (int i = 0; i < num_fake_servers; ++i)
+ b_write_server(&buf_send, &fake_servers[i]);
+ }
+ if (buf_recv.overflow) {
+ ban_peer(peer, "malformed MSG_LIST");
+ return true;
+ }
-void d_deinit(void) {
- ban_save_list(MS_BAN_FILE);
+ for (int i = 0; i < max_servers; ++i) {
+ if (servers[i].host)
+ b_write_server(&buf_send, servers + i);
+ }
+
+ if (clientver[0]) {
+ // TODO: check if this client is outdated (?) and send back new verstring
+ // for now just write the same shit back
+ b_write_dstring(&buf_send, clientver);
+ // write the motd and urgent message
+ b_write_dstring(&buf_send, ms_motd);
+ b_write_dstring(&buf_send, ms_urgent);
+ }
+
+ ENetPacket *p = enet_packet_create(buf_send.data, buf_send.pos, ENET_PACKET_FLAG_RELIABLE);
+ enet_peer_send(peer, NET_CH_MAIN, p);
+ enet_host_flush(ms_host);
+
+ u_log(LOG_NOTE, "sent server list to %s:%d (ver %s)", u_iptostr(peer->address.host), peer->address.port, clientver[0] ? clientver : "<old>");
+ return true;
+
+ default:
+ break;
+ }
+
+ return false;
}
-int count_servers(char* ip) {
- int sameHostServers = 0;
- for (int i = 0; i < MS_MAXSRVS; ++i) {
- if ((strncmp(ip, ms_srv[i].s_ip, 16) == 0)) {
- ++sameHostServers;
- }
+static void print_usage(void) {
+ printf("Usage: d2df_master [OPTIONS...]\n");
+ printf("Available options:\n");
+ printf("-h show this message and exit\n");
+ printf("-p N listen on port N (default: %d)\n", DEFAULT_PORT);
+ printf("-t N seconds before server is removed from list (default: %d)\n", DEFAULT_TIMEOUT);
+ printf("-s N max number of servers in server list, 1-%d (default: %d)\n", MS_MAX_SERVERS, DEFAULT_MAX_SERVERS);
+ printf("-d N if N > 0, disallow more than N servers on the same IP (default: %d)\n", DEFAULT_MAX_PER_HOST);
+ printf("-f N crappy spam filter: ban people after they send N requests in a row too fast (default: %d)\n", DEFAULT_SPAM_CAP);
+ fflush(stdout);
+}
+
+static inline bool parse_int_arg(int argc, char **argv, const int i, const char *name, int vmin, int vmax, int *outval) {
+ if (strcmp(name, argv[i]))
+ return false;
+
+ if (i >= argc - 1) {
+ fprintf(stderr, "expected integer value after %s\n", name);
+ return false;
}
- return sameHostServers;
+
+ const int v = atoi(argv[i + 1]);
+ if (v < vmin || v > vmax) {
+ fprintf(stderr, "expected integer value in range %d - %d\n", vmin, vmax);
+ return false;
+ }
+
+ *outval = v;
+ return true;
}
+static bool parse_args(int argc, char **argv) {
+ if (argc < 2)
+ return true;
+
+ if (!strcmp(argv[0], "-h")) {
+ print_usage();
+ return false;
+ }
-#define CHECK_RECV_OVERFLOW(addr) \
- if (b_recv.overflow) { \
- ban_add(addr, LC_MS_BANTRASH); \
- break; \
+ for (int i = 1; i < argc; ++i) {
+ const bool success =
+ parse_int_arg(argc, argv, i, "-p", 1, 0xFFFF, &ms_port)
+ || parse_int_arg(argc, argv, i, "-t", 1, 0x7FFFFFFF, &ms_timeout)
+ || parse_int_arg(argc, argv, i, "-s", 1, MS_MAX_SERVERS, &max_servers)
+ || parse_int_arg(argc, argv, i, "-d", 0, MS_MAX_SERVERS, &max_servers_per_host)
+ || parse_int_arg(argc, argv, i, "-f", 0, 0xFFFF, &ms_spam_cap);
+ if (success) {
+ ++i;
+ } else {
+ fprintf(stderr, "unknown or invalid argument: %s\n", argv[i]);
+ return false;
+ }
}
-int main (int argc, char *argv[]) {
- d_getargs(argc, argv);
+ return true;
+}
- if (enet_initialize()) {
- d_error("Could not init ENet!", 1);
- return EXIT_FAILURE;
+// a stupid thing to filter sustained spam from a single IP
+static bool spam_filter(ENetPeer *peer) {
+ const time_t now = time(NULL);
+ if (peer->address.host == cl_last_addr) {
+ // spam === sending shit faster than once a second
+ if (now - cl_last_time < 1) {
+ if (cl_spam_cnt > 1)
+ u_log(LOG_WARN, "address %s is sending packets too fast", u_iptostr(peer->address.host));
+ if (++cl_spam_cnt >= ms_spam_cap) {
+ ban_peer(peer, "spam");
+ return true;
+ }
+ } else {
+ cl_spam_cnt = 0;
+ }
+ } else {
+ cl_last_addr = peer->address.host;
+ cl_spam_cnt = 0;
}
+ cl_last_time = now;
+ return false;
+}
- printf(LC_MS_INIT, ms_port);
+int main(int argc, char **argv) {
+ if (enet_initialize() != 0)
+ u_fatal("could not init enet");
- d_readtextfile(MS_MOTD_FILE, ms_motd, sizeof(ms_motd));
- d_readtextfile(MS_URGENT_FILE, ms_urgent, sizeof(ms_urgent));
- ban_load_list(MS_BAN_FILE);
+ if (!parse_args(argc, argv))
+ return 1; // early exit
- if (ms_motd[0]) printf(LC_MS_MOTD, ms_motd);
- if (ms_urgent[0]) printf(LC_MS_URGENT, ms_urgent);
+ u_log(LOG_NOTE, "d2df master server starting on port %d", ms_port);
- for (int i = 0; i < NET_MAXCLIENTS; ++i) ms_peers[i] = NULL;
+ if (!u_readtextfile(MS_MOTD_FILE, ms_motd, sizeof(ms_motd)))
+ u_log(LOG_NOTE, "couldn't read motd from %s", MS_MOTD_FILE);
+ else
+ u_log(LOG_NOTE, "motd: %s", ms_motd);
- for (int i = 0; i < MS_MAXSRVS; ++i) {
- ms_srv[i].used = 0;
- ms_srv[i].s_ip[0] = '\0';
- ms_srv[i].s_name[0] = '\0';
- ms_srv[i].s_map[0] = '\0';
- ms_srv[i].deathtime = 0;
- }
+ if (!u_readtextfile(MS_URGENT_FILE, ms_urgent, sizeof(ms_urgent)))
+ u_log(LOG_NOTE, "couldn't read urgentmsg from %s", MS_URGENT_FILE);
+ else
+ u_log(LOG_NOTE, "urgentmsg: %s", ms_urgent);
- ENetAddress addr;
- addr.host = ENET_HOST_ANY;
- addr.port = ms_port;
+ ban_load_list(MS_BAN_FILE);
- ms_host = enet_host_create(&addr, NET_MAXCLIENTS, NET_CHANS, 0, 0);
- if (!ms_host) {
- d_error("Could not create host on specified port!", 1);
- return EXIT_FAILURE;
- }
+ atexit(deinit);
- atexit(d_deinit);
+ ENetAddress addr;
+ addr.host = 0;
+ addr.port = ms_port;
+ ms_host = enet_host_create(&addr, MS_MAX_CLIENTS, NET_CH_COUNT, 0, 0);
+ if (!ms_host)
+ u_fatal("could not create enet host on port %d", ms_port);
+ bool running = true;
+ enet_uint8 msgid = 0;
ENetEvent event;
- int shutdown = 0;
- enet_uint8 msg = 255;
-
- char ip[17];
- enet_uint16 port = 0;
-
- char *name = NULL;
- char *map = NULL;
- char *clientver = NULL;
- enet_uint8 gm = 0;
- enet_uint16 pl = 0;
- enet_uint16 mpl = 0;
-
- enet_uint8 proto = 0;
- enet_uint8 pw = 0;
- while (!shutdown) {
+ while (running) {
while (enet_host_service(ms_host, &event, 5000) > 0) {
- if (event.peer && ban_check(&(event.peer->address)))
+ if (!event.peer) {
+ continue; // can this even happen?
+ } else if (ban_check(event.peer->address.host)) {
+ enet_peer_reset(event.peer);
continue;
+ }
- const time_t now = time(NULL);
+ if (event.type != ENET_EVENT_TYPE_DISCONNECT)
+ if (spam_filter(event.peer))
+ continue;
switch (event.type) {
case ENET_EVENT_TYPE_CONNECT:
- printf(LC_MS_CONN, event.peer->address.host, event.peer->address.port);
+ u_log(LOG_NOTE, "%s:%d connected", u_iptostr(event.peer->address.host), event.peer->address.port);
break;
case ENET_EVENT_TYPE_RECEIVE:
- if (!event.peer) continue;
-
- b_recv.pos = 0;
- b_recv.overflow = 0;
- b_recv.data = event.packet->data;
- b_recv.size = event.packet->dataLength;
- msg = b_read_uint8(&b_recv);
-
- switch (msg) {
- case NET_MSG_ADD:
- enet_address_get_host_ip(&(event.peer->address), ip, 17);
- port = b_read_uint16(&b_recv);
-
- name = b_read_dstring(&b_recv);
- map = b_read_dstring(&b_recv);
- gm = b_read_uint8(&b_recv);
-
- pl = b_read_uint8(&b_recv);
- mpl = b_read_uint8(&b_recv);
-
- proto = b_read_uint8(&b_recv);
- pw = b_read_uint8(&b_recv);
-
- CHECK_RECV_OVERFLOW(&(event.peer->address));
-
- for (int i = 0; i < MS_MAXSRVS; ++i) {
- if (ms_srv[i].used) {
- if ((strncmp(ip, ms_srv[i].s_ip, 16) == 0) && (ms_srv[i].s_port == port)) {
- strncpy(ms_srv[i].s_map, map, sizeof(ms_srv[i].s_map) - 1);
- strncpy(ms_srv[i].s_name, name, sizeof(ms_srv[i].s_name) - 1);
- ms_srv[i].s_plrs = pl;
- ms_srv[i].s_maxplrs = mpl;
- ms_srv[i].s_pw = pw;
- ms_srv[i].s_mode = gm;
-
- if (ban_heur(ms_srv + i, now) >= MS_MAXHEUR) {
- ban_add(&(event.peer->address), LC_MS_BANHEUR);
- break;
- }
-
- ms_srv[i].deathtime = now + ms_timeout;
- ms_srv[i].lasttime = now;
-
- printf(LC_MS_UPD, i, ip, port, name, map, gm, pl, mpl, proto, pw);
- break;
- }
- } else {
- int countServer = count_servers(ip);
- if (countServer > MS_MAXHOST) {
- ban_add(&(event.peer->address), LC_MS_BANTOOMUCH);
- break;
- }
- else if (ms_checkmultiple && countServer > 1) {
- if (get_sum_lasttime(ip) < (countServer*3)) {
- ban_add(&(event.peer->address), LC_MS_BANSPAM);
- break;
- }
- }
- strncpy(ms_srv[i].s_ip, ip, sizeof(ms_srv[i].s_ip) - 1);
- strncpy(ms_srv[i].s_map, map, sizeof(ms_srv[i].s_map) - 1);
- strncpy(ms_srv[i].s_name, name, sizeof(ms_srv[i].s_name) - 1);
- ms_srv[i].s_port = port;
- ms_srv[i].s_plrs = pl;
- ms_srv[i].s_maxplrs = mpl;
- ms_srv[i].s_pw = pw;
- ms_srv[i].s_mode = gm;
- ms_srv[i].s_protocol = proto;
- ms_srv[i].deathtime = now + ms_timeout;
- ms_srv[i].lasttime = now;
-
- if (ban_heur(ms_srv + i, now) >= MS_MAXHEUR) {
- ban_add(&(event.peer->address), LC_MS_BANHEUR);
- break;
- }
-
- ms_srv[i].used = 1;
-
- printf(LC_MS_ADD, i, ip, port, name, map, gm, pl, mpl, proto, pw);
-
- ++ms_count;
- break;
- }
- }
- free(name);
- free(map);
- break;
-
- case NET_MSG_RM:
- enet_address_get_host_ip(&(event.peer->address), ip, 17);
- port = b_read_uint16(&b_recv);
- CHECK_RECV_OVERFLOW(&(event.peer->address));
- for (int i = 0; i < MS_MAXSRVS; ++i) {
- if (ms_srv[i].used) {
- if ((strncmp(ip, ms_srv[i].s_ip, 16) == 0) && (ms_srv[i].s_port == port)) {
- if (ban_heur(ms_srv + i, now) >= MS_MAXHEUR) {
- ban_add(&(event.peer->address), LC_MS_BANHEUR);
- break;
- }
- ms_srv[i].used = 0;
- printf(LC_MS_RM, i, ip, port);
- --ms_count;
- }
- }
- }
- break;
-
- case NET_MSG_LIST:
- b_send.pos = 0;
- b_write_uint8(&b_send, NET_MSG_LIST);
-
- if (event.packet->dataLength > 2) {
- // holy shit a fresh client
- clientver = b_read_dstring(&b_recv);
- b_write_uint8(&b_send, ms_count);
- } else {
- // old client, feed them bullshit first
- b_write_uint8(&b_send, ms_count + 2);
- for (int i = 0; i < MS_FAKESRVS; ++i)
- b_write_server(&b_send, ms_fake_srv[i]);
- }
-
- CHECK_RECV_OVERFLOW(&(event.peer->address));
-
- for (int i = 0; i < MS_MAXSRVS; ++i) {
- if (ms_srv[i].used)
- b_write_server(&b_send, ms_srv[i]);
- }
-
- if (clientver) {
- // TODO: check if this client is outdated (?) and send back new verstring
- // for now just write the same shit back
- b_write_dstring(&b_send, clientver);
- // write the motd and urgent message
- b_write_dstring(&b_send, ms_motd);
- b_write_dstring(&b_send, ms_urgent);
- }
-
- ENetPacket *p = enet_packet_create(b_send.data, b_send.pos, ENET_PACKET_FLAG_RELIABLE);
- enet_peer_send(event.peer, NET_CH_MAIN, p);
- enet_host_flush(ms_host);
-
- printf(LC_MS_LIST, event.peer->address.host, event.peer->address.port, clientver ? clientver : "<old>");
- free(clientver);
- clientver = NULL;
- break;
-
- default:
- // cheeky cunt sending invalid messages
- ban_add(&(event.peer->address), LC_MS_BANINVAL);
- break;
+ if (!event.packet || event.packet->dataLength == 0) {
+ ban_peer(event.peer, "empty packet");
+ break;
+ }
+ // set up receive buffer
+ buf_recv.pos = 0;
+ buf_recv.overflow = 0;
+ buf_recv.data = event.packet->data;
+ buf_recv.size = event.packet->dataLength;
+ // read message id and handle the message
+ msgid = b_read_uint8(&buf_recv);
+ if (!handle_msg(msgid, event.peer)) {
+ // cheeky cunt sending invalid messages
+ ban_peer(event.peer, "unknown message");
}
-
- enet_packet_destroy(event.packet);
break;
default:
}
}
- time_t now = time(NULL);
- for (int i = 0; i < MS_MAXSRVS; ++i) {
- if (ms_srv[i].used) {
- if (ms_srv[i].deathtime <= now) {
- ms_srv[i].used = 0;
- printf(LC_MS_TIME, i, ms_srv[i].s_ip, ms_srv[i].s_port);
- --ms_count;
+ const time_t now = time(NULL);
+ for (int i = 0; i < max_servers; ++i) {
+ if (servers[i].host) {
+ if (servers[i].death_time <= now) {
+ u_log(LOG_NOTE, "server #%d %s:%d timed out", i, u_iptostr(servers[i].host), servers[i].port);
+ servers[i].host = 0;
+ servers[i].port = 0;
+ --num_servers;
}
}
}
}
-
- printf(LC_MS_DIE);
-
- return EXIT_SUCCESS;
}