Geyser/core/src/main/java/org/geysermc/geyser/util/LoginEncryptionUtils.java

335 lines
15 KiB
Java
Raw Normal View History

/*
2022-01-01 19:03:05 +00:00
* Copyright (c) 2019-2022 GeyserMC. http://geysermc.org
*
* Permission is hereby granted, free of charge, to any person obtaining a copy
* of this software and associated documentation files (the "Software"), to deal
* in the Software without restriction, including without limitation the rights
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
* copies of the Software, and to permit persons to whom the Software is
* furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in
* all copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
* THE SOFTWARE.
*
* @author GeyserMC
* @link https://github.com/GeyserMC/Geyser
*/
package org.geysermc.geyser.util;
2019-07-24 22:53:15 +00:00
import com.fasterxml.jackson.databind.DeserializationFeature;
import com.fasterxml.jackson.databind.JsonNode;
import com.fasterxml.jackson.databind.ObjectMapper;
import com.fasterxml.jackson.databind.node.JsonNodeType;
import com.github.steveice10.mc.auth.service.MsaAuthenticationService;
2019-07-24 22:53:15 +00:00
import com.nimbusds.jose.JWSObject;
import com.nimbusds.jose.shaded.json.JSONObject;
import com.nimbusds.jose.shaded.json.JSONValue;
2019-07-24 22:53:15 +00:00
import com.nukkitx.network.util.Preconditions;
2019-08-02 03:02:17 +00:00
import com.nukkitx.protocol.bedrock.packet.LoginPacket;
import com.nukkitx.protocol.bedrock.packet.ServerToClientHandshakePacket;
2019-07-24 22:53:15 +00:00
import com.nukkitx.protocol.bedrock.util.EncryptionUtils;
import org.geysermc.geyser.GeyserImpl;
import org.geysermc.geyser.configuration.GeyserConfiguration;
2021-11-22 19:52:26 +00:00
import org.geysermc.geyser.session.GeyserSession;
import org.geysermc.geyser.session.auth.AuthData;
import org.geysermc.geyser.session.auth.BedrockClientData;
2020-12-10 21:57:48 +00:00
import org.geysermc.cumulus.CustomForm;
import org.geysermc.cumulus.ModalForm;
2020-12-10 21:57:48 +00:00
import org.geysermc.cumulus.SimpleForm;
import org.geysermc.cumulus.response.CustomFormResponse;
import org.geysermc.cumulus.response.ModalFormResponse;
2020-12-10 21:57:48 +00:00
import org.geysermc.cumulus.response.SimpleFormResponse;
import org.geysermc.geyser.text.GeyserLocale;
2019-07-24 22:53:15 +00:00
2019-08-02 03:02:17 +00:00
import javax.crypto.SecretKey;
import java.io.IOException;
import java.net.URI;
2019-08-02 03:02:17 +00:00
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.PublicKey;
2019-07-24 22:53:15 +00:00
import java.security.interfaces.ECPublicKey;
2019-08-02 03:02:17 +00:00
import java.security.spec.ECGenParameterSpec;
import java.util.Iterator;
2019-08-02 03:02:17 +00:00
import java.util.UUID;
2019-07-24 22:53:15 +00:00
public class LoginEncryptionUtils {
2019-08-02 03:02:17 +00:00
private static final ObjectMapper JSON_MAPPER = new ObjectMapper().disable(DeserializationFeature.FAIL_ON_UNKNOWN_PROPERTIES);
2019-07-24 22:53:15 +00:00
private static boolean HAS_SENT_ENCRYPTION_MESSAGE = false;
2019-08-02 03:02:17 +00:00
private static boolean validateChainData(JsonNode data) throws Exception {
if (data.size() != 3) {
return false;
}
2019-07-24 22:53:15 +00:00
ECPublicKey lastKey = null;
boolean mojangSigned = false;
Iterator<JsonNode> iterator = data.iterator();
while (iterator.hasNext()) {
JsonNode node = iterator.next();
2019-07-24 22:53:15 +00:00
JWSObject jwt = JWSObject.parse(node.asText());
// x509 cert is expected in every claim
URI x5u = jwt.getHeader().getX509CertURL();
if (x5u == null) {
return false;
2019-07-24 22:53:15 +00:00
}
ECPublicKey expectedKey = EncryptionUtils.generateKey(jwt.getHeader().getX509CertURL().toString());
// First key is self-signed
if (lastKey == null) {
lastKey = expectedKey;
} else if (!lastKey.equals(expectedKey)) {
return false;
2019-07-24 22:53:15 +00:00
}
if (!EncryptionUtils.verifyJwt(jwt, lastKey)) {
return false;
}
if (mojangSigned) {
return !iterator.hasNext();
}
if (lastKey.equals(EncryptionUtils.getMojangPublicKey())) {
mojangSigned = true;
}
Object payload = JSONValue.parse(jwt.getPayload().toString());
Preconditions.checkArgument(payload instanceof JSONObject, "Payload is not an object");
Object identityPublicKey = ((JSONObject) payload).get("identityPublicKey");
Preconditions.checkArgument(identityPublicKey instanceof String, "identityPublicKey node is missing in chain");
lastKey = EncryptionUtils.generateKey((String) identityPublicKey);
2019-07-24 22:53:15 +00:00
}
return mojangSigned;
2019-07-24 22:53:15 +00:00
}
2019-08-02 03:02:17 +00:00
2021-11-22 19:52:26 +00:00
public static void encryptPlayerConnection(GeyserSession session, LoginPacket loginPacket) {
2019-08-02 03:02:17 +00:00
JsonNode certData;
try {
certData = JSON_MAPPER.readTree(loginPacket.getChainData().toByteArray());
} catch (IOException ex) {
throw new RuntimeException("Certificate JSON can not be read.");
}
JsonNode certChainData = certData.get("chain");
if (certChainData.getNodeType() != JsonNodeType.ARRAY) {
throw new RuntimeException("Certificate data is not valid");
}
encryptConnectionWithCert(session, loginPacket.getSkinData().toString(), certChainData);
2019-08-02 03:02:17 +00:00
}
2021-11-22 19:52:26 +00:00
private static void encryptConnectionWithCert(GeyserSession session, String clientData, JsonNode certChainData) {
2019-08-02 03:02:17 +00:00
try {
GeyserImpl geyser = session.getGeyser();
2019-08-02 03:02:17 +00:00
boolean validChain = validateChainData(certChainData);
geyser.getLogger().debug(String.format("Is player data valid? %s", validChain));
2019-08-02 03:02:17 +00:00
if (!validChain && !session.getGeyser().getConfig().isEnableProxyConnections()) {
session.disconnect(GeyserLocale.getLocaleStringLog("geyser.network.remote.invalid_xbox_account"));
return;
}
2019-08-02 03:02:17 +00:00
JWSObject jwt = JWSObject.parse(certChainData.get(certChainData.size() - 1).asText());
JsonNode payload = JSON_MAPPER.readTree(jwt.getPayload().toBytes());
if (payload.get("extraData").getNodeType() != JsonNodeType.OBJECT) {
throw new RuntimeException("AuthData was not found!");
}
2019-11-30 12:34:45 +00:00
JsonNode extraData = payload.get("extraData");
2020-01-04 05:58:58 +00:00
session.setAuthenticationData(new AuthData(
2019-11-30 12:34:45 +00:00
extraData.get("displayName").asText(),
UUID.fromString(extraData.get("identity").asText()),
2021-02-12 21:22:45 +00:00
extraData.get("XUID").asText(),
certChainData, clientData
2019-11-30 12:34:45 +00:00
));
2019-08-02 03:02:17 +00:00
if (payload.get("identityPublicKey").getNodeType() != JsonNodeType.STRING) {
throw new RuntimeException("Identity Public Key was not found!");
}
ECPublicKey identityPublicKey = EncryptionUtils.generateKey(payload.get("identityPublicKey").textValue());
2019-11-30 12:34:45 +00:00
JWSObject clientJwt = JWSObject.parse(clientData);
2019-08-02 03:02:17 +00:00
EncryptionUtils.verifyJwt(clientJwt, identityPublicKey);
JsonNode clientDataJson = JSON_MAPPER.readTree(clientJwt.getPayload().toBytes());
BedrockClientData data = JSON_MAPPER.convertValue(clientDataJson, BedrockClientData.class);
2020-08-20 03:13:05 +00:00
session.setClientData(data);
2019-11-30 12:34:45 +00:00
2019-08-02 03:02:17 +00:00
if (EncryptionUtils.canUseEncryption()) {
try {
LoginEncryptionUtils.startEncryptionHandshake(session, identityPublicKey);
} catch (Throwable e) {
// An error can be thrown on older Java 8 versions about an invalid key
if (geyser.getConfig().isDebugMode()) {
e.printStackTrace();
}
sendEncryptionFailedMessage(geyser);
}
} else {
sendEncryptionFailedMessage(geyser);
2019-08-02 03:02:17 +00:00
}
} catch (Exception ex) {
session.disconnect("disconnectionScreen.internalError.cantConnect");
throw new RuntimeException("Unable to complete login", ex);
}
}
2021-11-22 19:52:26 +00:00
private static void startEncryptionHandshake(GeyserSession session, PublicKey key) throws Exception {
2019-08-02 03:02:17 +00:00
KeyPairGenerator generator = KeyPairGenerator.getInstance("EC");
generator.initialize(new ECGenParameterSpec("secp384r1"));
KeyPair serverKeyPair = generator.generateKeyPair();
byte[] token = EncryptionUtils.generateRandomToken();
SecretKey encryptionKey = EncryptionUtils.getSecretKey(serverKeyPair.getPrivate(), key, token);
session.getUpstream().getSession().enableEncryption(encryptionKey);
2019-08-02 03:02:17 +00:00
ServerToClientHandshakePacket packet = new ServerToClientHandshakePacket();
packet.setJwt(EncryptionUtils.createHandshakeJwt(serverKeyPair, token).serialize());
session.sendUpstreamPacketImmediately(packet);
2019-08-02 03:02:17 +00:00
}
private static void sendEncryptionFailedMessage(GeyserImpl geyser) {
if (!HAS_SENT_ENCRYPTION_MESSAGE) {
geyser.getLogger().warning(GeyserLocale.getLocaleStringLog("geyser.network.encryption.line_1"));
geyser.getLogger().warning(GeyserLocale.getLocaleStringLog("geyser.network.encryption.line_2", "https://geysermc.org/supported_java"));
HAS_SENT_ENCRYPTION_MESSAGE = true;
}
}
2021-11-22 19:52:26 +00:00
public static void buildAndShowLoginWindow(GeyserSession session) {
2021-11-30 03:04:02 +00:00
if (session.isLoggedIn()) {
// Can happen if a window is cancelled during dimension switch
return;
}
// Set DoDaylightCycle to false so the time doesn't accelerate while we're here
session.setDaylightCycle(false);
GeyserConfiguration config = session.getGeyser().getConfig();
boolean isPasswordAuthEnabled = config.getRemote().isPasswordAuthentication();
session.sendForm(
SimpleForm.builder()
.translator(GeyserLocale::getPlayerLocaleString, session.getLocale())
.title("geyser.auth.login.form.notice.title")
.content("geyser.auth.login.form.notice.desc")
2021-02-01 23:46:46 +00:00
.optionalButton("geyser.auth.login.form.notice.btn_login.mojang", isPasswordAuthEnabled)
.button("geyser.auth.login.form.notice.btn_login.microsoft")
.button("geyser.auth.login.form.notice.btn_disconnect")
.responseHandler((form, responseData) -> {
2020-12-12 00:39:09 +00:00
SimpleFormResponse response = form.parseResponse(responseData);
if (!response.isCorrect()) {
buildAndShowLoginWindow(session);
return;
}
if (isPasswordAuthEnabled && response.getClickedButtonId() == 0) {
session.setMicrosoftAccount(false);
buildAndShowLoginDetailsWindow(session);
return;
}
2019-08-02 03:02:17 +00:00
if (isPasswordAuthEnabled && response.getClickedButtonId() == 1) {
session.setMicrosoftAccount(true);
buildAndShowMicrosoftAuthenticationWindow(session);
return;
}
2020-04-17 12:54:04 +00:00
if (response.getClickedButtonId() == 0) {
// Just show the OAuth code
session.authenticateWithMicrosoftCode();
return;
}
session.disconnect(GeyserLocale.getPlayerLocaleString("geyser.auth.login.form.disconnect", session.getLocale()));
}));
2019-08-02 03:02:17 +00:00
}
2021-11-22 19:52:26 +00:00
public static void buildAndShowLoginDetailsWindow(GeyserSession session) {
session.sendForm(
CustomForm.builder()
.translator(GeyserLocale::getPlayerLocaleString, session.getLocale())
.title("geyser.auth.login.form.details.title")
.label("geyser.auth.login.form.details.desc")
.input("geyser.auth.login.form.details.email", "account@geysermc.org", "")
.input("geyser.auth.login.form.details.pass", "123456", "")
.responseHandler((form, responseData) -> {
2020-12-12 00:39:09 +00:00
CustomFormResponse response = form.parseResponse(responseData);
if (!response.isCorrect()) {
buildAndShowLoginDetailsWindow(session);
return;
}
session.authenticate(response.next(), response.next());
}));
}
2019-08-02 03:02:17 +00:00
/**
2021-06-05 22:53:58 +00:00
* Prompts the user between either OAuth code login or manual password authentication
*/
2021-11-22 19:52:26 +00:00
public static void buildAndShowMicrosoftAuthenticationWindow(GeyserSession session) {
session.sendForm(
SimpleForm.builder()
.translator(GeyserLocale::getPlayerLocaleString, session.getLocale())
.title("geyser.auth.login.form.notice.btn_login.microsoft")
.button("geyser.auth.login.method.browser")
.button("geyser.auth.login.method.password")
.button("geyser.auth.login.form.notice.btn_disconnect")
.responseHandler((form, responseData) -> {
SimpleFormResponse response = form.parseResponse(responseData);
if (!response.isCorrect()) {
buildAndShowLoginWindow(session);
return;
}
if (response.getClickedButtonId() == 0) {
session.authenticateWithMicrosoftCode();
} else if (response.getClickedButtonId() == 1) {
buildAndShowLoginDetailsWindow(session);
} else {
session.disconnect(GeyserLocale.getPlayerLocaleString("geyser.auth.login.form.disconnect", session.getLocale()));
}
}));
}
/**
* Shows the code that a user must input into their browser
*/
2021-11-22 19:52:26 +00:00
public static void buildAndShowMicrosoftCodeWindow(GeyserSession session, MsaAuthenticationService.MsCodeResponse msCode) {
session.sendForm(
ModalForm.builder()
.title("%xbox.signin")
.content("%xbox.signin.website\n%xbox.signin.url\n%xbox.signin.enterCode\n" + msCode.user_code)
.button1("%gui.done")
.button2("%menu.disconnect")
.responseHandler((form, responseData) -> {
ModalFormResponse response = form.parseResponse(responseData);
if (!response.isCorrect()) {
buildAndShowMicrosoftAuthenticationWindow(session);
return;
}
if (response.getClickedButtonId() == 1) {
session.disconnect(GeyserLocale.getPlayerLocaleString("geyser.auth.login.form.disconnect", session.getLocale()));
}
})
2021-02-01 23:46:46 +00:00
);
2019-08-02 03:02:17 +00:00
}
2019-07-24 22:53:15 +00:00
}