supported 1.19 key authentication

This commit is contained in:
2022-06-14 10:19:48 +08:00
parent 0d88ae61c3
commit 780260c3bf
2 changed files with 53 additions and 25 deletions

View File

@ -2,15 +2,19 @@ package bot
import ( import (
"bytes" "bytes"
"crypto"
"crypto/aes" "crypto/aes"
"crypto/cipher" "crypto/cipher"
"crypto/rand" "crypto/rand"
"crypto/rsa" "crypto/rsa"
"crypto/sha1" "crypto/sha1"
"crypto/sha256"
"crypto/x509" "crypto/x509"
"encoding/json" "encoding/json"
"encoding/pem"
"fmt" "fmt"
"github.com/Tnze/go-mc/yggdrasil/userApi" "github.com/Tnze/go-mc/yggdrasil/userApi"
randN "golang.org/x/exp/rand"
"io" "io"
"net/http" "net/http"
"strings" "strings"
@ -190,19 +194,45 @@ func genEncryptionKeyResponse(shareSecret, publicKey, verifyToken []byte, keyPai
err = fmt.Errorf("encryption share secret fail: %v", err) err = fmt.Errorf("encryption share secret fail: %v", err)
return return
} }
if keyPair != nil {
privateKeyBlock, _ := pem.Decode([]byte(keyPair.KeyPair.PrivateKey))
privateKey, err := x509.ParsePKCS8PrivateKey(privateKeyBlock.Bytes)
if err != nil {
err = fmt.Errorf("decode user private key fail: %v", err)
return erp, err
}
verifyT, err := rsa.EncryptPKCS1v15(rand.Reader, rsaKey, verifyToken) l := randN.Int63()
if err != nil { var b bytes.Buffer
err = fmt.Errorf("encryption verfy tokenfail: %v", err) pk.Long(l).WriteTo(&b)
return
key := privateKey.(*rsa.PrivateKey)
hash := sha256.New()
hash.Write(verifyToken)
hash.Write(b.Bytes())
signedData, err := key.Sign(rand.Reader, hash.Sum(nil), crypto.SHA256)
if err != nil {
err = fmt.Errorf("sign verifyToken fail: %v", err)
return erp, err
}
return pk.Marshal(
0x01,
pk.ByteArray(cryptPK),
pk.Boolean(false),
pk.Long(l),
pk.ByteArray(signedData),
), nil
} else {
verifyT, err := rsa.EncryptPKCS1v15(rand.Reader, rsaKey, verifyToken)
if err != nil {
err = fmt.Errorf("encryption verfy tokenfail: %v", err)
return erp, err
}
return pk.Marshal(
0x01,
pk.ByteArray(cryptPK),
pk.Boolean(true),
pk.ByteArray(verifyT),
), nil
} }
// currently broken
return pk.Marshal(
0x01,
pk.ByteArray(cryptPK),
pk.Boolean(true),
pk.ByteArray(verifyT),
), nil
} }

View File

@ -6,6 +6,8 @@ package bot
import ( import (
"context" "context"
"encoding/base64"
"encoding/pem"
"errors" "errors"
"github.com/Tnze/go-mc/yggdrasil/userApi" "github.com/Tnze/go-mc/yggdrasil/userApi"
"net" "net"
@ -75,6 +77,7 @@ func (c *Client) join(ctx context.Context, d *mcnet.Dialer, addr string) error {
// Login Start // Login Start
pair, err := userApi.GetOrFetchKeyPair(c.Auth.AsTk) pair, err := userApi.GetOrFetchKeyPair(c.Auth.AsTk)
if err != nil { if err != nil {
// (No Signature)
err = c.Conn.WritePacket(pk.Marshal( err = c.Conn.WritePacket(pk.Marshal(
packetid.LoginStart, packetid.LoginStart,
pk.String(c.Auth.Name), pk.String(c.Auth.Name),
@ -84,22 +87,17 @@ func (c *Client) join(ctx context.Context, d *mcnet.Dialer, addr string) error {
return LoginErr{"login start (without sig)", err} return LoginErr{"login start (without sig)", err}
} }
} else { } else {
// Login Start (With Signature) (Currently not supported) // Login Start (With Signature)
block, _ := pem.Decode([]byte(pair.KeyPair.PublicKey))
sig, _ := base64.StdEncoding.DecodeString(pair.PublicKeySignature)
err = c.Conn.WritePacket(pk.Marshal( err = c.Conn.WritePacket(pk.Marshal(
packetid.LoginStart, packetid.LoginStart,
pk.String(c.Auth.Name), pk.String(c.Auth.Name),
pk.Boolean(false), pk.Boolean(true),
pk.Long(pair.ExpiresAt.UnixMilli()),
pk.ByteArray(block.Bytes),
pk.ByteArray(sig),
)) ))
/* block, _ := pem.Decode([]byte(pair.KeyPair.PublicKey))
sig, _ := base64.StdEncoding.DecodeString(pair.PublicKeySignature)
err = c.Conn.WritePacket(pk.Marshal(
packetid.LoginStart,
pk.String(c.Auth.Name),
pk.Boolean(true),
pk.Long(pair.ExpiresAt.UnixMilli()),
pk.ByteArray(block.Bytes),
pk.ByteArray(sig),
))*/
if err != nil { if err != nil {
return LoginErr{"login start (with sig)", err} return LoginErr{"login start (with sig)", err}
} }