supported 1.19 key authentication
This commit is contained in:
38
bot/login.go
38
bot/login.go
@ -2,15 +2,19 @@ package bot
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
|
"crypto"
|
||||||
"crypto/aes"
|
"crypto/aes"
|
||||||
"crypto/cipher"
|
"crypto/cipher"
|
||||||
"crypto/rand"
|
"crypto/rand"
|
||||||
"crypto/rsa"
|
"crypto/rsa"
|
||||||
"crypto/sha1"
|
"crypto/sha1"
|
||||||
|
"crypto/sha256"
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
|
"encoding/pem"
|
||||||
"fmt"
|
"fmt"
|
||||||
"github.com/Tnze/go-mc/yggdrasil/userApi"
|
"github.com/Tnze/go-mc/yggdrasil/userApi"
|
||||||
|
randN "golang.org/x/exp/rand"
|
||||||
"io"
|
"io"
|
||||||
"net/http"
|
"net/http"
|
||||||
"strings"
|
"strings"
|
||||||
@ -190,15 +194,40 @@ func genEncryptionKeyResponse(shareSecret, publicKey, verifyToken []byte, keyPai
|
|||||||
err = fmt.Errorf("encryption share secret fail: %v", err)
|
err = fmt.Errorf("encryption share secret fail: %v", err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
if keyPair != nil {
|
||||||
|
privateKeyBlock, _ := pem.Decode([]byte(keyPair.KeyPair.PrivateKey))
|
||||||
|
privateKey, err := x509.ParsePKCS8PrivateKey(privateKeyBlock.Bytes)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("decode user private key fail: %v", err)
|
||||||
|
return erp, err
|
||||||
|
}
|
||||||
|
|
||||||
|
l := randN.Int63()
|
||||||
|
var b bytes.Buffer
|
||||||
|
pk.Long(l).WriteTo(&b)
|
||||||
|
|
||||||
|
key := privateKey.(*rsa.PrivateKey)
|
||||||
|
hash := sha256.New()
|
||||||
|
hash.Write(verifyToken)
|
||||||
|
hash.Write(b.Bytes())
|
||||||
|
signedData, err := key.Sign(rand.Reader, hash.Sum(nil), crypto.SHA256)
|
||||||
|
if err != nil {
|
||||||
|
err = fmt.Errorf("sign verifyToken fail: %v", err)
|
||||||
|
return erp, err
|
||||||
|
}
|
||||||
|
return pk.Marshal(
|
||||||
|
0x01,
|
||||||
|
pk.ByteArray(cryptPK),
|
||||||
|
pk.Boolean(false),
|
||||||
|
pk.Long(l),
|
||||||
|
pk.ByteArray(signedData),
|
||||||
|
), nil
|
||||||
|
} else {
|
||||||
verifyT, err := rsa.EncryptPKCS1v15(rand.Reader, rsaKey, verifyToken)
|
verifyT, err := rsa.EncryptPKCS1v15(rand.Reader, rsaKey, verifyToken)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
err = fmt.Errorf("encryption verfy tokenfail: %v", err)
|
err = fmt.Errorf("encryption verfy tokenfail: %v", err)
|
||||||
return
|
return erp, err
|
||||||
}
|
}
|
||||||
|
|
||||||
// currently broken
|
|
||||||
|
|
||||||
return pk.Marshal(
|
return pk.Marshal(
|
||||||
0x01,
|
0x01,
|
||||||
pk.ByteArray(cryptPK),
|
pk.ByteArray(cryptPK),
|
||||||
@ -206,3 +235,4 @@ func genEncryptionKeyResponse(shareSecret, publicKey, verifyToken []byte, keyPai
|
|||||||
pk.ByteArray(verifyT),
|
pk.ByteArray(verifyT),
|
||||||
), nil
|
), nil
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
14
bot/mcbot.go
14
bot/mcbot.go
@ -6,6 +6,8 @@ package bot
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"encoding/base64"
|
||||||
|
"encoding/pem"
|
||||||
"errors"
|
"errors"
|
||||||
"github.com/Tnze/go-mc/yggdrasil/userApi"
|
"github.com/Tnze/go-mc/yggdrasil/userApi"
|
||||||
"net"
|
"net"
|
||||||
@ -75,6 +77,7 @@ func (c *Client) join(ctx context.Context, d *mcnet.Dialer, addr string) error {
|
|||||||
// Login Start
|
// Login Start
|
||||||
pair, err := userApi.GetOrFetchKeyPair(c.Auth.AsTk)
|
pair, err := userApi.GetOrFetchKeyPair(c.Auth.AsTk)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
// (No Signature)
|
||||||
err = c.Conn.WritePacket(pk.Marshal(
|
err = c.Conn.WritePacket(pk.Marshal(
|
||||||
packetid.LoginStart,
|
packetid.LoginStart,
|
||||||
pk.String(c.Auth.Name),
|
pk.String(c.Auth.Name),
|
||||||
@ -84,13 +87,8 @@ func (c *Client) join(ctx context.Context, d *mcnet.Dialer, addr string) error {
|
|||||||
return LoginErr{"login start (without sig)", err}
|
return LoginErr{"login start (without sig)", err}
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
// Login Start (With Signature) (Currently not supported)
|
// Login Start (With Signature)
|
||||||
err = c.Conn.WritePacket(pk.Marshal(
|
block, _ := pem.Decode([]byte(pair.KeyPair.PublicKey))
|
||||||
packetid.LoginStart,
|
|
||||||
pk.String(c.Auth.Name),
|
|
||||||
pk.Boolean(false),
|
|
||||||
))
|
|
||||||
/* block, _ := pem.Decode([]byte(pair.KeyPair.PublicKey))
|
|
||||||
sig, _ := base64.StdEncoding.DecodeString(pair.PublicKeySignature)
|
sig, _ := base64.StdEncoding.DecodeString(pair.PublicKeySignature)
|
||||||
err = c.Conn.WritePacket(pk.Marshal(
|
err = c.Conn.WritePacket(pk.Marshal(
|
||||||
packetid.LoginStart,
|
packetid.LoginStart,
|
||||||
@ -99,7 +97,7 @@ func (c *Client) join(ctx context.Context, d *mcnet.Dialer, addr string) error {
|
|||||||
pk.Long(pair.ExpiresAt.UnixMilli()),
|
pk.Long(pair.ExpiresAt.UnixMilli()),
|
||||||
pk.ByteArray(block.Bytes),
|
pk.ByteArray(block.Bytes),
|
||||||
pk.ByteArray(sig),
|
pk.ByteArray(sig),
|
||||||
))*/
|
))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return LoginErr{"login start (with sig)", err}
|
return LoginErr{"login start (with sig)", err}
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user