// log.c: handles console logging functions and cvars #include "quakedef.h" // cvar callbacks static void QDECL Log_Dir_Callback (struct cvar_s *var, char *oldvalue); static void QDECL Log_Name_Callback (struct cvar_s *var, char *oldvalue); // cvars #define CONLOGGROUP "Console logging" cvar_t log_enable[LOG_TYPES] = { CVARF("log_enable", "0", CVAR_NOTFROMSERVER), CVARF("log_enable_players", "0", CVAR_NOTFROMSERVER), CVARF("log_enable_rcon", "1", CVAR_NOTFROMSERVER) }; cvar_t log_name[LOG_TYPES] = { CVARFC("log_name", "qconsole", CVAR_NOTFROMSERVER, Log_Name_Callback), CVARFC("log_name_players", "players", CVAR_NOTFROMSERVER, Log_Name_Callback), CVARFC("log_name_rcon", "rcon", CVAR_NOTFROMSERVER, Log_Name_Callback)}; cvar_t log_dir_var = CVARAFC("log_dir", "", "sv_logdir", CVAR_NOTFROMSERVER, Log_Dir_Callback); cvar_t log_readable = CVARFD("log_readable", "7", CVAR_NOTFROMSERVER, "Bitfield describing what to convert/strip. If 0, exact byte representation will be used.\n&1: Dequakify text.\n&2: Strip special markup.\n&4: Strip ansi control codes."); cvar_t log_developer = CVARFD("log_developer", "0", CVAR_NOTFROMSERVER, "Enables logging of console prints when set to 1. Otherwise unimportant messages will not fill up your log files."); cvar_t log_rotate_files = CVARF("log_rotate_files", "0", CVAR_NOTFROMSERVER); cvar_t log_rotate_size = CVARF("log_rotate_size", "131072", CVAR_NOTFROMSERVER); cvar_t log_timestamps = CVARF("log_timestamps", "1", CVAR_NOTFROMSERVER); #ifdef _WIN32 cvar_t log_dosformat = CVARF("log_dosformat", "1", CVAR_NOTFROMSERVER); #else cvar_t log_dosformat = CVARF("log_dosformat", "0", CVAR_NOTFROMSERVER); #endif qboolean log_newline[LOG_TYPES]; #ifdef IPLOG cvar_t iplog_autodump = CVARFD("ipautodump", "0", CVAR_ARCHIVE|CVAR_NOTFROMSERVER, "Enables dumping the 'iplog.txt' file, which contains a log of usernames seen for a given IP, which is useful for detecting fake-nicks."); #endif static char log_dir[MAX_OSPATH]; static enum fs_relative log_root = FS_GAMEONLY; // Log_Dir_Callback: called when a log_dir is changed static void QDECL Log_Dir_Callback (struct cvar_s *var, char *oldvalue) { char *t = var->string; char *e = t + (*t?strlen(t):0); // sanity check for directory. // is equivelent to /../ on some systems, so make sure that can't be used either. : is for drives on windows or amiga, or alternative thingies on windows, so block thoses completely. if (strstr(t, "..") || strstr(t, ":") || *t == '/' || *t == '\\' || *e == '/' || *e == '\\' || strstr(t, "//") || strstr(t, "\\\\")) { Con_Printf(CON_NOTICE "%s forced to default due to invalid characters.\n", var->name); // recursion is avoided by assuming the default value is sane Cvar_ForceSet(var, var->enginevalue); } if (!strncmp(var->string, "./", 2)||!strncmp(var->string, ".\\", 2)) { strcpy(log_dir, var->string+2); log_root = FS_ROOT; } else { strcpy(log_dir, var->string); log_root = FS_GAMEONLY; } } // Log_Name_Callback: called when a log_name is changed static void QDECL Log_Name_Callback (struct cvar_s *var, char *oldvalue) { char *t = var->string; // sanity check for directory if (strstr(t, "..") || strstr(t, ":") || strstr(t, "/") || strstr(t, "\\")) { Con_Printf(CON_NOTICE "%s forced to default due to invalid characters.\n", var->name); // recursion is avoided by assuming the default value is sane Cvar_ForceSet(var, var->enginevalue); } } // Con_Log: log string to console log void Log_String (logtype_t lognum, const char *s) { vfsfile_t *fi; char *f; // filename char *t; char utf8[2048]; int i; char fbase[MAX_QPATH]; char fname[MAX_QPATH]; conchar_t cline[2048], *c; unsigned int u, flags; if (!log_enable[lognum].value) return; if (log_name[lognum].string[0]) f = log_name[lognum].string; else f = log_name[lognum].enginevalue; if (!f) return; COM_ParseFunString(CON_WHITEMASK, s, cline, sizeof(cline), !(log_readable.ival & 2)); t = utf8; for (c = cline; *c; ) { c = Font_Decode(c, &flags, &u); if ((flags & CON_HIDDEN) && (log_readable.ival & 2)) continue; if (log_readable.ival&1) u = COM_DeQuake(u); //at the start of a new line, we might want a timestamp (so timestamps are correct for the first char of the line, instead of the preceeding \n) if (log_newline[lognum]) { if (log_timestamps.ival) { time_t unixtime = time(NULL); int bufferspace = utf8+sizeof(utf8)-1-t; if (bufferspace > 0) { strftime(t, bufferspace, "%Y-%m-%d %H:%M:%S ", localtime(&unixtime)); t += strlen(t); } } log_newline[lognum] = false; } //make sure control codes are stripped. no exploiting xterm bugs please. if ((log_readable.ival & 4) && ((u < 32 && u != '\t' && u != '\n') || u == 127 || (u >= 128 && u < 128+32))) //\r is stripped too u = '?'; //if dos format logs, we insert a \r before every \n (also flag next char as the start of a new line) if (u == '\n') { log_newline[lognum] = true; if (log_dosformat.ival) t += utf8_encode(t, '\r', utf8+sizeof(utf8)-1-t); } t += utf8_encode(t, u, utf8+sizeof(utf8)-1-t); } *t = 0; if (*log_dir) Q_snprintfz(fbase, sizeof(fname)-4, "%s/%s", log_dir, f); else Q_snprintfz(fbase, sizeof(fname)-4, "%s", f); Q_snprintfz(fname, sizeof(fname), "%s.log", fbase); // file rotation if (log_rotate_size.value >= 4096 && log_rotate_files.value >= 1) { int x; vfsfile_t *fi; // check file size, use x as temp if ((fi = FS_OpenVFS(fname, "rb", log_root))) { x = VFS_GETLEN(fi); VFS_CLOSE(fi); x += strlen(utf8); // add string size to file size to never go over } else x = 0; if (x > (int)log_rotate_size.value) { char newf[MAX_QPATH]; char oldf[MAX_QPATH]; i = log_rotate_files.value; // unlink file at the top of the chain Q_snprintfz(oldf, sizeof(oldf), "%s.%i.log", fbase, i); FS_Remove(oldf, log_root); // rename files through chain for (x = i-1; x > 0; x--) { strcpy(newf, oldf); Q_snprintfz(oldf, sizeof(oldf), "%s.%i.log", fbase, x); // check if file exists, otherwise skip if ((fi = FS_OpenVFS(oldf, "rb", log_root))) VFS_CLOSE(fi); else continue; // skip nonexistant files if (!FS_Rename(oldf, newf, log_root)) { // rename failed, disable log and bug out Cvar_ForceSet(&log_enable[lognum], "0"); Con_Printf("Unable to rotate log files. Logging disabled.\n"); return; } } // TODO: option to compress file somewhere in here? // rename our base file, which had better exist... if (!FS_Rename(fname, oldf, log_root)) { // rename failed, disable log and bug out Cvar_ForceSet(&log_enable[lognum], "0"); Con_Printf("Unable to rename base log file. Logging disabled.\n"); return; } } } FS_CreatePath(fname, log_root); if ((fi = FS_OpenVFS(fname, "ab", log_root))) { VFS_WRITE(fi, utf8, strlen(utf8)); VFS_CLOSE(fi); } else { // write failed, bug out Cvar_ForceSet(&log_enable[lognum], "0"); Con_Printf("Unable to write to log file. Logging disabled.\n"); return; } } void Con_Log (const char *s) { Log_String(LOG_CONSOLE, s); } #ifdef HAVE_SERVER //still to add stuff at: //connects //disconnects //kicked void SV_LogPlayer(client_t *cl, char *msg) { char line[2048]; char remote_adr[MAX_ADR_SIZE]; char realip_adr[MAX_ADR_SIZE]; if (cl->protocol == SCP_BAD) return; //don't log botclients Q_snprintfz(line, sizeof(line)-1, "%s\\%s\\%i\\%s\\%s\\%i\\guid\\%s", msg, cl->name, cl->userid, NET_BaseAdrToString(remote_adr, sizeof(remote_adr), &cl->netchan.remote_address), (cl->realip_status > 0 ? NET_BaseAdrToString(realip_adr, sizeof(realip_adr), &cl->realip) : "??"), cl->netchan.remote_address.port, cl->guid); InfoBuf_ToString(&cl->userinfo, line+strlen(line), sizeof(line)-1-strlen(line), NULL, NULL, NULL, NULL, NULL); Q_strncatz(line, "\n", sizeof(line)); Log_String(LOG_PLAYER, line); } #endif #ifdef HAVE_LEGACY static struct { const char *commandname; const char *desc; } legacylog[] = { {"logfile", ""}, {"logplayers", " players"}, {"logrcon", " frags"}, }; static void Log_Logfile_f (void) { //these legacy commands are just toggles. not args (other than the commandname to know which log type to toggle) size_t logtype; const char *cmd = Cmd_Argv(0); for (logtype = 0; logtype < countof(legacylog); logtype++) if (!Q_strcasecmp(legacylog[logtype].commandname, cmd)) break; if (log_enable[logtype].value) { Cvar_SetValue(&log_enable[logtype], 0); Con_Printf("Logging%s disabled.\n", legacylog[logtype].desc); } else { const char *f; char syspath[MAX_OSPATH]; if (log_name[logtype].string[0]) f = log_name[logtype].string; else f = log_name[logtype].enginevalue; if (*log_dir) f = va("%s/%s.log", log_dir, f); else f = va("%s.log", f); if (FS_DisplayPath(f, log_root, syspath, sizeof(syspath))) Con_Printf("%s", va("Logging%s to %s\n", legacylog[logtype].desc, syspath)); else Con_Printf("%s", va("Logging%s to %s\n", legacylog[logtype].desc, f)); Cvar_SetValue(&log_enable[logtype], 1); } } #endif #ifdef IPLOG /*for fuck sake, why can people still not write simple files. proquake is writing binary files as text ones. this function is to try to deal with that fuckup*/ static size_t IPLog_Read_Fucked(qbyte *file, size_t *offset, size_t totalsize, qbyte *out, size_t outsize) { size_t read = 0; while (outsize-- > 0 && *offset < totalsize) { if (file[*offset] == '\r' && *offset+1 < totalsize && file[*offset+1] == '\n') { out[read] = '\n'; *offset += 2; read += 1; } else { out[read] = file[*offset]; *offset += 1; read += 1; } } return read; } /*need to make sure any 13 bytes are followed by 10s so that we don't bug out when read back in *sigh* */ static size_t IPLog_Write_Fucked(vfsfile_t *file, qbyte *out, size_t outsize) { qbyte tmp[64]; size_t write = 0; size_t block = 0; while (outsize-- > 0) { if (block >= sizeof(tmp)-4) { VFS_WRITE(file, tmp, block); write += block; block = 0; } if (*out == '\n') tmp[block++] = '\r'; tmp[block++] = *out++; } if (block) { VFS_WRITE(file, tmp, block); write += block; } return write; } qboolean IPLog_Merge_File(const char *fname) { char ip[MAX_ADR_SIZE]; char name[256]; char line[1024]; vfsfile_t *f; if (!*fname) fname = "iplog.txt"; f = FS_OpenVFS(fname, "rb", FS_PUBBASEGAMEONLY); if (!f) f = FS_OpenVFS(fname, "rb", FS_GAME); if (!f) return false; if (!Q_strcasecmp(COM_FileExtension(fname, name, sizeof(name)), "dat")) { //we don't write this format because of it being limited to ipv4, as well as player name lengths size_t l = VFS_GETLEN(f), offset = 0; qbyte *ffs = malloc(l+1); VFS_READ(f, ffs, l); ffs[l] = 0; while (IPLog_Read_Fucked(ffs, &offset, l, line, 20) == 20) { //yes, these addresses are weird. Q_snprintfz(ip, sizeof(ip), "%i.%i.%i.xxx", (qbyte)line[2], (qbyte)line[1], (qbyte)line[0]); memcpy(name, line+4, 20-4); name[20-4] = 0; IPLog_Add(ip, name); } free(ffs); } else { while (VFS_GETS(f, line, sizeof(line)-1)) { //whether the name contains quotes or what is an awkward one. //we always write quotes (including string markup to avoid issues) //dp doesn't, and our parser is lazy, so its possible we'll get gibberish that way if (COM_ParseOut(COM_ParseOut(line, ip, sizeof(ip)), name, sizeof(name))) IPLog_Add(ip, name); } } VFS_CLOSE(f); return true; } struct iplog_entry { netadr_t adr; netadr_t mask; char name[1]; } **iplog_entries; size_t iplog_num, iplog_max; void IPLog_Add(const char *ipstr, const char *name) { size_t i; netadr_t a, m; while (*ipstr == ' ' || *ipstr == '\t') ipstr++; if (*ipstr != '[' && *ipstr < '0' && *ipstr > '9') return; if (*ipstr == '[') ipstr++; //some names are dodgy. if (!*name //|| !Q_strcasecmp(name, /*nq default*/"player") || !Q_strcasecmp(name, /*qw default*/"unnamed") || !strcmp(name, /*nq fallback*/"unconnected") || !strncmp(name, "BOT:", 4)) return; memset(&a, 0, sizeof(a)); memset(&m, 0, sizeof(m)); if (!NET_StringToAdrMasked(ipstr, false, &a, &m)) return; //might be x.y.z.w:port //might be x.y.z.FUCKED //might be x.y.z.0/24 //might be [::]:port //might be [::]/bits //or other ways to express an ip address //FIXME: ignore private addresses? //check for dupes for (i = 0; i < iplog_num; i++) { if (!memcmp(&a, &iplog_entries[i]->adr, sizeof(netadr_t)) && !memcmp(&m, &iplog_entries[i]->mask, sizeof(netadr_t)) && !Q_strcasecmp(name, iplog_entries[i]->name)) return; } //looks like its new... if (iplog_num == iplog_max) Z_ReallocElements((void**)&iplog_entries, &iplog_max, iplog_max+64, sizeof(*iplog_entries)); iplog_entries[iplog_num] = BZ_Malloc(sizeof(struct iplog_entry) + strlen(name)); iplog_entries[iplog_num]->adr = a; iplog_entries[iplog_num]->mask = m; strcpy(iplog_entries[iplog_num]->name, name); iplog_num++; } static void IPLog_Identify(netadr_t *adr, netadr_t *mask, char *fmt, ...) { va_list argptr; qboolean found = false; char line[256]; size_t i; va_start(argptr, fmt); vsnprintf(line, sizeof(line), fmt, argptr); va_end(argptr); Con_Printf("%s: ", line); for (i = 0; i < iplog_num; i++) { if (NET_CompareAdrMasked(adr, &iplog_entries[i]->adr, mask?mask:&iplog_entries[i]->mask)) { if (found) Con_Printf(", "); found=true; Con_Printf("%s", iplog_entries[i]->name); } } if (!found) Con_Printf(""); Con_Printf("\n"); } #include "cl_ignore.h" static void IPLog_Identify_f(void) { const char *nameorip = Cmd_Argv(1); netadr_t adr, mask; char clean[256]; char *endofnum; strtoul(nameorip, &endofnum, 10); if (*endofnum && NET_StringToAdrMasked (nameorip, false, &adr, &mask)) { //if not a single number, try to parse as an ip //treading carefully here, to avoid dns name lookups weirding everything out. IPLog_Identify(&adr, &mask, "Identity of %s", NET_AdrToStringMasked(clean, sizeof(clean), &adr, &mask)); } #ifdef HAVE_SERVER else if (sv.active) { //if server is active, walk players to see if there's a name match to get their address and guess an address mask client_t *cl; int clnum = -1; while((cl = SV_GetClientForString(nameorip, &clnum))) { if (cl->realip_status) { IPLog_Identify(&cl->realip, NULL, "Identity of %s (real) [%s]", cl->name, NET_AdrToString(clean, sizeof(clean), &cl->realip)); IPLog_Identify(&cl->netchan.remote_address, NULL, "Identity of %s (proxy) [%s]", cl->name, NET_AdrToString(clean, sizeof(clean), &cl->realip)); } else IPLog_Identify(&cl->netchan.remote_address, NULL, "Identity of %s [%s]", cl->name, NET_AdrToString(clean, sizeof(clean), &cl->realip)); } } #endif #ifdef HAVE_CLIENT else if (cls.state >= ca_connected) { //else if client is active, walk players to see if there's a name match, to get their address+mask if known via nq hacks int slot; netadr_t adr; if ((slot = Player_StringtoSlot(nameorip)) < 0) Con_Printf("%s: no player with userid %s\n", Cmd_Argv(0), nameorip); else if (!*cl.players[slot].ip) Con_Printf("%s: ip address of %s is not known\n", Cmd_Argv(0), cl.players[slot].name); else { if (NET_StringToAdrMasked(cl.players[slot].ip, false, &adr, &mask)) IPLog_Identify(&adr, &mask, "Identity of %s [%s]", cl.players[slot].name, cl.players[slot].ip); else Con_Printf("ip address of %s not known, cannot identify\n", cl.players[slot].name); } } #endif else Con_Printf("%s: not connected, nor raw address\n", Cmd_Argv(0)); } static int IPLog_Dump(const char *fname) { size_t i; vfsfile_t *f; qbyte line[20]; if (!*fname) fname = "iplog.txt"; if (!iplog_num && !COM_FCheckExists(fname)) return 2; //no entries, nothing to overwrite f = FS_OpenVFS(fname, "wb", FS_PUBBASEGAMEONLY); if (!f) return false; if (!Q_strcasecmp(COM_FileExtension(fname, line, sizeof(line)), "dat")) { for (i = 0; i < iplog_num; i++) { //this shitty format supports only ipv4. if (iplog_entries[i]->adr.type != NA_IP) continue; line[0] = iplog_entries[i]->adr.address.ip[2]; line[1] = iplog_entries[i]->adr.address.ip[1]; line[2] = iplog_entries[i]->adr.address.ip[0]; line[3] = 0; strncpy(line+4, iplog_entries[i]->name, sizeof(line)-4); IPLog_Write_Fucked(f, line, sizeof(line)); //convert \n to \r\n, to avoid fucking up any formatting with binary data (inside the address part, so *.13.10.* won't corrupt the file) } } else { VFS_PRINTF(f, "//generated by "FULLENGINENAME"\n"); for (i = 0; i < iplog_num; i++) { char ip[512]; char buf[1024]; char buf2[1024]; VFS_PRINTF(f, log_dosformat.value?"%s %s\r\n":"%s %s\n", COM_QuotedString(NET_AdrToStringMasked(ip, sizeof(ip), &iplog_entries[i]->adr, &iplog_entries[i]->mask), buf2, sizeof(buf2), false), COM_QuotedString(iplog_entries[i]->name, buf, sizeof(buf), false)); } } VFS_CLOSE(f); return true; } static void IPLog_Dump_f(void) { char displaypath[MAX_OSPATH]; const char *fname = Cmd_Argv(1); if (FS_DisplayPath(fname, FS_GAMEONLY, displaypath, sizeof(displaypath))) Q_strncpyz(displaypath, fname, sizeof(displaypath)); IPLog_Merge_File(fname); //merge from the existing file, so that we're hopefully more robust if multiple processes are poking the same file. switch (IPLog_Dump(fname)) { case 0: Con_Printf("unable to write %s\n", fname); break; default: case 1: Con_Printf("wrote %s\n", displaypath); break; case 2: Con_Printf("nothing to write\n"); break; } } static void IPLog_Merge_f(void) { const char *fname = Cmd_Argv(1); if (!IPLog_Merge_File(fname)) Con_Printf("unable to read iplog \"%s\" for merging\n", fname); } #endif #if defined(HAVE_DTLS) && defined(HAVE_CLIENT) //requires UI prompts struct certlog_s { link_t l; char *hostname; qboolean trusted; //when true, the user has given explicit trust //when false we buldozed straight through and will only complain when it changes (legacy mode). size_t certsize; qbyte cert[1]; }; #define CERTLOG_FILENAME "knowncerts.txt" static link_t certlog; static qboolean certlog_inited = false; static void CertLog_Import(const char *filename); static struct certlog_s *CertLog_Find(const char *hostname) { struct certlog_s *l; for (l = (struct certlog_s*)certlog.next ; l != (struct certlog_s*)&certlog ; l = (struct certlog_s*)l->l.next) { if (!strcmp(l->hostname, hostname)) return l; } return NULL; } static void CertLog_Update(const char *hostname, const void *cert, size_t certsize, qboolean trusted) { struct certlog_s *l = CertLog_Find(hostname); if (l) { RemoveLink(&l->l); Z_Free(l); } l = Z_Malloc(sizeof(*l) + certsize + strlen(hostname)); l->trusted = trusted; l->certsize = certsize; l->hostname = l->cert + l->certsize; memcpy(l->cert, cert, certsize); strcpy(l->hostname, hostname); InsertLinkAfter(&l->l, &certlog); } static void CertLog_Write(void) { struct certlog_s *l; vfsfile_t *f = FS_OpenVFS(CERTLOG_FILENAME, "wb", FS_ROOT); if (f) { VFS_PRINTF(f, "version 1.1\n"); for (l=(struct certlog_s*)certlog.next ; l != (struct certlog_s*)&certlog ; l = (struct certlog_s*)l->l.next) { char certhex[32768]; size_t i; const char *hex = "0123456789abcdef"; for (i = 0; i < l->certsize; i++) { certhex[i*2+0] = hex[l->cert[i]>>4]; certhex[i*2+1] = hex[l->cert[i]&0xf]; } certhex[i*2] = 0; VFS_PRINTF(f, "%s \"", l->hostname); VFS_PUTS(f, certhex); VFS_PRINTF(f, "\" %i\n", l->trusted?true:false); } VFS_CLOSE(f); } else Con_Printf(CON_ERROR"Unable to write %s\n", CERTLOG_FILENAME); } static void CertLog_Purge(void) { while (certlog.next != &certlog) { struct certlog_s *l = (struct certlog_s*)certlog.next; RemoveLink(&l->l); Z_Free(l); } certlog_inited = false; } static int hexdecode(char c) { if (c >= '0' && c <= '9') return c - '0'; else if (c >= 'a' && c <= 'f') return c - 'a' + 10; else if (c >= 'A' && c <= 'F') return c - 'A' + 10; return 0; } static void CertLog_Import(const char *filename) { char addressstring[512]; char certhex[32768]; char certdata[16384]; char trusted[16]; char line[65536], *l; size_t i, certsize; vfsfile_t *f; if (!certlog_inited && filename) CertLog_Import(NULL); certlog_inited |= !filename; f = FS_OpenVFS(filename?filename:CERTLOG_FILENAME, "rb", FS_ROOT); if (!f) return; //CertLog_Purge(); VFS_GETS(f, line, sizeof(line)); if (strncmp(line, "version 1.", 10)) return; //unsupported... while (VFS_GETS(f, line, sizeof(line))) { l = line; l = COM_ParseOut(l, addressstring, sizeof(addressstring)); l = COM_ParseOut(l, certhex, sizeof(certhex)); l = COM_ParseOut(l, trusted, sizeof(trusted)); certsize = 0; for (i = 0; certsize < sizeof(certdata); i++) { if (!certhex[(i<<1)+0] || !certhex[(i<<1)+1]) break; certdata[certsize++] = (hexdecode(certhex[(i<<1)+0])<<4)|hexdecode(certhex[(i<<1)+1]); } CertLog_Update(addressstring, certdata, certsize, atoi(trusted)); } VFS_CLOSE(f); } static void CertLog_UntrustAll_f(void) { CertLog_Purge(); } static void CertLog_Import_f(void) { const char *fname = Cmd_Argv(1); if (Cmd_IsInsecure()) return; if (!*fname) fname = NULL; CertLog_Import(fname); } struct certprompt_s { char *hostname; size_t certsize; qbyte cert[1]; }; static struct certprompt_s *certlog_curprompt; static void CertLog_Add_Prompted(void *vctx, promptbutton_t button) { struct certprompt_s *ctx = vctx; if (button == PROMPT_YES) //button_yes / button_left { CertLog_Update(ctx->hostname, ctx->cert, ctx->certsize, true); CertLog_Write(); CL_BeginServerReconnect(); } else CL_Disconnect("Server certificate rejected"); certlog_curprompt = NULL; } qboolean CertLog_ConnectOkay(const char *hostname, void *cert, size_t certsize, unsigned int certlogproblems) { //this is specifically for dtls certs. struct certlog_s *l; qboolean trusted = (net_enable_dtls.ival >= 2); char digest[DIGEST_MAXSIZE]; char fp[DIGEST_MAXSIZE*2+1]; if (certlog_curprompt) return false; COM_AssertMainThread("CertLog_ConnectOkay"); if (!certlog_inited) CertLog_Import(NULL); l = CertLog_Find(hostname); if (!l && !trusted) { //cert is new, but we don't care about full trust. don't bother to prompt when the user doesn't much care. //(but do pin so we at least know when its MITMed after the fact) Con_Printf(CON_WARNING"Auto-Pinning certificate for %s."CON_DEFAULT" ^[/seta %s 2^]+ for actual security.\n", hostname, net_enable_dtls.name); if (certsize) Base64_EncodeBlockURI(digest, CalcHash(&hash_certfp, digest, sizeof(digest), cert, certsize), fp, sizeof(fp)); else strcpy(fp, ""); Con_Printf(S_COLOR_GRAY" fp: %s\n", fp); CertLog_Update(hostname, cert, certsize, false); CertLog_Write(); } else if (!l || l->certsize != certsize || memcmp(l->cert, cert, certsize) || (trusted && !l->trusted)) { //new or different if (certsize) Base64_EncodeBlockURI(digest, CalcHash(&hash_certfp, digest, sizeof(digest), cert, certsize), fp, sizeof(fp)); else strcpy(fp, ""); if (qrenderer) { unsigned int i; size_t len; char *text; const char *accepttext; const char *lines[] = { va(localtext("Certificate for %s\n(fp:"S_COLOR_GRAY"%s"S_COLOR_WHITE")\n"), hostname, fp), (certlogproblems&CERTLOG_WRONGHOST)?localtext("^1Certificate does not match host\n"):"", ((certlogproblems&(CERTLOG_MISSINGCA|CERTLOG_WRONGHOST))==CERTLOG_MISSINGCA)?localtext("^1Certificate authority is untrusted.\n"):"", (certlogproblems&CERTLOG_EXPIRED)?localtext("^1Expired Certificate\n"):"", l?localtext("\n^1WARNING: Certificate has changed since previously trusted."):""}; struct certprompt_s *ctx = certlog_curprompt = Z_Malloc(sizeof(*ctx)+certsize + strlen(hostname)); ctx->hostname = ctx->cert + certsize; ctx->certsize = certsize; memcpy(ctx->cert, cert, certsize); strcpy(ctx->hostname, hostname); if (l) //FIXME: show expiry info for the old cert, warn if more than a month? accepttext = localtext("Replace"); else if (!certlogproblems) accepttext = localtext("Pin"); else accepttext = localtext("Trust"); for (i = 0, len = 0; i < countof(lines); i++) len += strlen(lines[i]); text = alloca(len+1); for (i = 0, len = 0; i < countof(lines); i++) { strcpy(text+len, lines[i]); len += strlen(lines[i]); } text[len] = 0; //FIXME: display some sort of fingerprint Menu_Prompt(CertLog_Add_Prompted, ctx, text, accepttext, NULL, localtext("Disconnect"), true); } return false; //can't connect yet... } else if (!l->trusted) Con_Printf(CON_WARNING"Server certificate for %s was previously auto-pinned."CON_DEFAULT" ^[/seta %s 2^]+ for actual security.\n", hostname, net_enable_dtls.name); return true; } #endif #if defined(HAVE_SERVER) && defined(HAVE_CLIENT) static struct maplog_entry { struct maplog_entry *next; float bestkills; float bestsecrets; float besttime; //updated when besttime=newkills char name[1]; } *maplog_enties; static void Log_MapsRead(void) { struct maplog_entry *m, **link = &maplog_enties; vfsfile_t *f; static qboolean maplog_loaded; char line[8192], *s; if (maplog_loaded) return; maplog_loaded = true; f = FS_OpenVFS("maptimes.txt", "rb", FS_ROOT); if (!f) return; //no info yet. while (VFS_GETS(f, line, sizeof(line))) { s = line; s = COM_Parse(s); m = Z_Malloc(sizeof(*m) + strlen(com_token)); strcpy(m->name, com_token); s = COM_Parse(s); m->besttime = atof(com_token); s = COM_Parse(s); m->fulltime = atof(com_token); s = COM_Parse(s); m->bestkills = atof(com_token); s = COM_Parse(s); m->bestsecrets = atof(com_token); *link = m; link = &m->next; } VFS_CLOSE(f); } struct maplog_entry *Log_FindMap(const char *purepackage, const char *mapname) { char name[MAX_OSPATH]; struct maplog_entry *m; if (Q_snprintfz(name, sizeof(name), "%s/%s", purepackage, mapname)) return NULL; Log_MapsRead(); for (m = maplog_enties; m; m = m->next) { if (!strcmp(m->name, name)) break; } return m; } static void Log_MapsDump(void) { if (maplog_enties) { struct maplog_entry *m; vfsfile_t *f = FS_OpenVFS("maptimes.txt", "wbp", FS_ROOT); if (f) { for(m = maplog_enties; m; m = m->next) { VFS_PRINTF(f, "\"%s\" %.9g %.9g %.9g %.9g\n", m->name, m->besttime, m->fulltime, m->bestkills, m->bestsecrets); } VFS_CLOSE(f); } } } qboolean Log_CheckMapCompletion(const char *packagename, const char *mapname, float *besttime, float *fulltime, float *bestkills, float *bestsecrets) { struct maplog_entry *m; if (!packagename) { flocation_t loc; if (!FS_FLocateFile(mapname, FSLF_DONTREFERENCE|FSLF_IGNORELINKS, &loc)) return false; //no idea which package, don't guess. packagename = FS_GetRootPackagePath(&loc); if (!packagename) return false; } m = Log_FindMap(packagename, mapname); if (m) { *besttime = m->besttime; *fulltime = m->fulltime; *bestkills = m->bestkills; *bestsecrets = m->bestsecrets; return true; } return false; } void Log_MapNowCompleted(void) { struct maplog_entry *m; flocation_t loc; float kills, secrets, oldprogress, newprogress, maptime; const char *packagename; //don't log it if its deathmatch/coop/cheating. extern int sv_allow_cheats; if (deathmatch.ival || coop.ival || sv_allow_cheats == 1) return; if (!FS_FLocateFile(sv.world.worldmodel->name, FSLF_DONTREFERENCE|FSLF_IGNORELINKS, &loc)) { Con_Printf("completion log: unable to determine logical path for map\n"); return; //don't know } packagename = FS_GetRootPackagePath(&loc); if (!packagename) { Con_Printf("completion log: unable to determine logical path for map\n"); return; } m = Log_FindMap(packagename, sv.world.worldmodel->name); if (!m) { m = Z_Malloc(sizeof(*m)+strlen(packagename)+strlen(sv.world.worldmodel->name)+2); sprintf(m->name, "%s/%s", packagename, sv.world.worldmodel->name); m->fulltime = m->besttime = FLT_MAX; m->bestkills = m->bestsecrets = 0; m->next = maplog_enties; maplog_enties = m; } kills = pr_global_struct->killed_monsters; secrets = pr_global_struct->found_secrets; maptime = sv.world.physicstime; newprogress = secrets*10+kills; oldprogress = m->bestsecrets*10+m->bestkills; //if they got a new time record, update. if (maptimebesttime) m->besttime = maptime; //if they got a new kills record, update if (newprogress > oldprogress || (newprogress==oldprogress && maptimefulltime)) { m->bestkills = kills; m->bestsecrets = secrets; m->fulltime = maptime; } } #endif void Log_ShutDown(void) { #if defined(HAVE_SERVER) && defined(HAVE_CLIENT) Log_MapsDump(); #endif #ifdef IPLOG if (iplog_autodump.ival) IPLog_Dump("iplog.txt"); // IPLog_Dump("iplog.dat"); while(iplog_num > 0) { iplog_num--; BZ_Free(iplog_entries[iplog_num]); } BZ_Free(iplog_entries); iplog_entries = NULL; iplog_max = iplog_num = 0; #endif } void Log_Init(void) { int i; // register cvars for (i = 0; i < LOG_TYPES; i++) { #ifdef CLIENTONLY if (i != LOG_CONSOLE) continue; #endif Cvar_Register (&log_enable[i], CONLOGGROUP); Cvar_Register (&log_name[i], CONLOGGROUP); log_newline[i] = true; #ifdef HAVE_LEGACY Cmd_AddCommand(legacylog[i].commandname, Log_Logfile_f); #endif } Cvar_Register (&log_dir_var, CONLOGGROUP); Cvar_Register (&log_readable, CONLOGGROUP); Cvar_Register (&log_developer, CONLOGGROUP); Cvar_Register (&log_rotate_size, CONLOGGROUP); Cvar_Register (&log_rotate_files, CONLOGGROUP); Cvar_Register (&log_dosformat, CONLOGGROUP); Cvar_Register (&log_timestamps, CONLOGGROUP); #ifdef IPLOG Cmd_AddCommandD("identify", IPLog_Identify_f, "Looks up a player's ip to see if they're using a different name"); Cmd_AddCommand("ipmerge", IPLog_Merge_f); Cmd_AddCommand("ipdump", IPLog_Dump_f); Cvar_Register (&iplog_autodump, CONLOGGROUP); #endif // cmd line options, debug options #ifdef CRAZYDEBUGGING Cvar_ForceSet(&log_enable[LOG_CONSOLE], "1"); TRACE(("dbg: Con_Init: log_enable forced\n")); #endif if (COM_CheckParm("-condebug")) Cvar_ForceSet(&log_enable[LOG_CONSOLE], "1"); #if defined(HAVE_DTLS) && defined(HAVE_CLIENT) ClearLink(&certlog); Cmd_AddCommand("dtls_untrustall", CertLog_UntrustAll_f); Cmd_AddCommand("dtls_importtrust", CertLog_Import_f); #endif }