update encryption response packet for 1.19.3
This commit is contained in:
@ -5,14 +5,12 @@ import (
|
|||||||
|
|
||||||
"github.com/Tnze/go-mc/data/packetid"
|
"github.com/Tnze/go-mc/data/packetid"
|
||||||
"github.com/Tnze/go-mc/net"
|
"github.com/Tnze/go-mc/net"
|
||||||
"github.com/Tnze/go-mc/yggdrasil/user"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// Client is used to access Minecraft server
|
// Client is used to access Minecraft server
|
||||||
type Client struct {
|
type Client struct {
|
||||||
Conn *net.Conn
|
Conn *net.Conn
|
||||||
Auth Auth
|
Auth Auth
|
||||||
KeyPair *user.KeyPairResp
|
|
||||||
|
|
||||||
Name string
|
Name string
|
||||||
UUID uuid.UUID
|
UUID uuid.UUID
|
||||||
|
58
bot/login.go
58
bot/login.go
@ -2,16 +2,13 @@ package bot
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"crypto"
|
|
||||||
"crypto/aes"
|
"crypto/aes"
|
||||||
"crypto/cipher"
|
"crypto/cipher"
|
||||||
"crypto/rand"
|
"crypto/rand"
|
||||||
"crypto/rsa"
|
"crypto/rsa"
|
||||||
"crypto/sha1"
|
"crypto/sha1"
|
||||||
"crypto/sha256"
|
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"encoding/pem"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
"net/http"
|
"net/http"
|
||||||
@ -20,7 +17,6 @@ import (
|
|||||||
"github.com/Tnze/go-mc/data/packetid"
|
"github.com/Tnze/go-mc/data/packetid"
|
||||||
"github.com/Tnze/go-mc/net/CFB8"
|
"github.com/Tnze/go-mc/net/CFB8"
|
||||||
pk "github.com/Tnze/go-mc/net/packet"
|
pk "github.com/Tnze/go-mc/net/packet"
|
||||||
"github.com/Tnze/go-mc/yggdrasil/user"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// Auth includes an account
|
// Auth includes an account
|
||||||
@ -47,7 +43,7 @@ func handleEncryptionRequest(c *Client, p pk.Packet) error {
|
|||||||
|
|
||||||
// 响应加密请求
|
// 响应加密请求
|
||||||
// Write Encryption Key Response
|
// Write Encryption Key Response
|
||||||
p, err = genEncryptionKeyResponse(key, er.PublicKey, er.VerifyToken, c.KeyPair)
|
p, err = genEncryptionKeyResponse(key, er.PublicKey, er.VerifyToken)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("gen encryption key response fail: %v", err)
|
return fmt.Errorf("gen encryption key response fail: %v", err)
|
||||||
}
|
}
|
||||||
@ -182,7 +178,7 @@ func newSymmetricEncryption() (key []byte, encoStream, decoStream cipher.Stream)
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
func genEncryptionKeyResponse(shareSecret, publicKey, verifyToken []byte, keyPair *user.KeyPairResp) (erp pk.Packet, err error) {
|
func genEncryptionKeyResponse(shareSecret, publicKey, verifyToken []byte) (erp pk.Packet, err error) {
|
||||||
iPK, err := x509.ParsePKIXPublicKey(publicKey) // Decode Public Key
|
iPK, err := x509.ParsePKIXPublicKey(publicKey) // Decode Public Key
|
||||||
if err != nil {
|
if err != nil {
|
||||||
err = fmt.Errorf("decode public key fail: %v", err)
|
err = fmt.Errorf("decode public key fail: %v", err)
|
||||||
@ -194,47 +190,15 @@ func genEncryptionKeyResponse(shareSecret, publicKey, verifyToken []byte, keyPai
|
|||||||
err = fmt.Errorf("encryption share secret fail: %v", err)
|
err = fmt.Errorf("encryption share secret fail: %v", err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
if keyPair != nil {
|
|
||||||
privateKeyBlock, _ := pem.Decode([]byte(keyPair.KeyPair.PrivateKey))
|
|
||||||
privateKey, err := x509.ParsePKCS8PrivateKey(privateKeyBlock.Bytes)
|
|
||||||
if err != nil {
|
|
||||||
err = fmt.Errorf("decode user private key fail: %v", err)
|
|
||||||
return erp, err
|
|
||||||
}
|
|
||||||
|
|
||||||
var l pk.Long
|
verifyT, err := rsa.EncryptPKCS1v15(rand.Reader, rsaKey, verifyToken)
|
||||||
if _, err := l.ReadFrom(rand.Reader); err != nil {
|
if err != nil {
|
||||||
err = fmt.Errorf("generate random number fail: %v", err)
|
err = fmt.Errorf("encryption verfy tokenfail: %v", err)
|
||||||
return erp, err
|
return erp, err
|
||||||
}
|
|
||||||
|
|
||||||
key := privateKey.(*rsa.PrivateKey)
|
|
||||||
hash := sha256.New()
|
|
||||||
hash.Write(verifyToken)
|
|
||||||
_, _ = l.WriteTo(hash)
|
|
||||||
signedData, err := key.Sign(rand.Reader, hash.Sum(nil), crypto.SHA256)
|
|
||||||
if err != nil {
|
|
||||||
err = fmt.Errorf("sign verifyToken fail: %v", err)
|
|
||||||
return erp, err
|
|
||||||
}
|
|
||||||
return pk.Marshal(
|
|
||||||
packetid.LoginEncryptionResponse,
|
|
||||||
pk.ByteArray(cryptPK),
|
|
||||||
pk.Boolean(false),
|
|
||||||
l,
|
|
||||||
pk.ByteArray(signedData),
|
|
||||||
), nil
|
|
||||||
} else {
|
|
||||||
verifyT, err := rsa.EncryptPKCS1v15(rand.Reader, rsaKey, verifyToken)
|
|
||||||
if err != nil {
|
|
||||||
err = fmt.Errorf("encryption verfy tokenfail: %v", err)
|
|
||||||
return erp, err
|
|
||||||
}
|
|
||||||
return pk.Marshal(
|
|
||||||
packetid.LoginEncryptionResponse,
|
|
||||||
pk.ByteArray(cryptPK),
|
|
||||||
pk.Boolean(true),
|
|
||||||
pk.ByteArray(verifyT),
|
|
||||||
), nil
|
|
||||||
}
|
}
|
||||||
|
return pk.Marshal(
|
||||||
|
packetid.LoginEncryptionResponse,
|
||||||
|
pk.ByteArray(cryptPK),
|
||||||
|
pk.ByteArray(verifyT),
|
||||||
|
), nil
|
||||||
}
|
}
|
||||||
|
12
bot/mcbot.go
12
bot/mcbot.go
@ -104,13 +104,6 @@ func (c *Client) join(addr string, options JoinOptions) error {
|
|||||||
return LoginErr{"handshake", err}
|
return LoginErr{"handshake", err}
|
||||||
}
|
}
|
||||||
// Login Start
|
// Login Start
|
||||||
if c.Auth.AsTk != "" && !options.NoPublicKey {
|
|
||||||
if options.KeyPair != nil {
|
|
||||||
c.KeyPair = options.KeyPair
|
|
||||||
} else if KeyPairResp, err := user.GetOrFetchKeyPair(c.Auth.AsTk); err == nil {
|
|
||||||
c.KeyPair = &KeyPairResp
|
|
||||||
}
|
|
||||||
}
|
|
||||||
c.UUID, err = uuid.Parse(c.Auth.UUID)
|
c.UUID, err = uuid.Parse(c.Auth.UUID)
|
||||||
PlayerUUID := pk.Option[pk.UUID, *pk.UUID]{
|
PlayerUUID := pk.Option[pk.UUID, *pk.UUID]{
|
||||||
Has: err == nil,
|
Has: err == nil,
|
||||||
@ -124,11 +117,12 @@ func (c *Client) join(addr string, options JoinOptions) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return LoginErr{"login start", err}
|
return LoginErr{"login start", err}
|
||||||
}
|
}
|
||||||
|
receiving := "encrypt start"
|
||||||
for {
|
for {
|
||||||
// Receive Packet
|
// Receive Packet
|
||||||
var p pk.Packet
|
var p pk.Packet
|
||||||
if err = c.Conn.ReadPacket(&p); err != nil {
|
if err = c.Conn.ReadPacket(&p); err != nil {
|
||||||
return LoginErr{"receive packet", err}
|
return LoginErr{receiving, err}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Handle Packet
|
// Handle Packet
|
||||||
@ -145,6 +139,7 @@ func (c *Client) join(addr string, options JoinOptions) error {
|
|||||||
if err := handleEncryptionRequest(c, p); err != nil {
|
if err := handleEncryptionRequest(c, p); err != nil {
|
||||||
return LoginErr{"encryption", err}
|
return LoginErr{"encryption", err}
|
||||||
}
|
}
|
||||||
|
receiving = "set compression"
|
||||||
|
|
||||||
case packetid.LoginSuccess: // Login Success
|
case packetid.LoginSuccess: // Login Success
|
||||||
err := p.Scan(
|
err := p.Scan(
|
||||||
@ -162,6 +157,7 @@ func (c *Client) join(addr string, options JoinOptions) error {
|
|||||||
return LoginErr{"compression", err}
|
return LoginErr{"compression", err}
|
||||||
}
|
}
|
||||||
c.Conn.SetThreshold(int(threshold))
|
c.Conn.SetThreshold(int(threshold))
|
||||||
|
receiving = "login success"
|
||||||
|
|
||||||
case packetid.LoginPluginRequest: // Login Plugin Request
|
case packetid.LoginPluginRequest: // Login Plugin Request
|
||||||
var (
|
var (
|
||||||
|
Reference in New Issue
Block a user