Development:Network:process login
From Ghoulwiki
Revision as of 20:19, 17 June 2012 by Ghoulsblade (talk | contribs)
MMO mode is meant for more persistent gameplay than deathmatch mode, for this a accountserver is needed.
- to join an MMO Server, select "Online Account Server" under vegastrike multiplayer dialog
- at the time of writing there are no public MMO servers available (see forum for tharin server, in case it gets back online someday), but it can be run locally:
- see "HOWTO: Setup and configure vegaserver." http://forums.vega-strike.org/viewtopic.php?f=37&t=17701
STUB article, some incomplete notes:
- instead of logging into the game server directly, the game first logs into the account server via http request
- the account server replies via http with success/failure status, and in case of success the ip and port of the gameserver to log in to
Contents
account server protocol
- the reply of the account server (http answer payload) is plaintext using the format <number>SPACE
- see also data/cgi-accountserver/accountserver.py
- first char is message type :
- ACCT_LOGIN='l'
- ACCT_LOGIN_DATA='d',(field username),(field warning),(field serverip),(field serverport) -- sent by server when login is accepted
- ACCT_LOGIN_ERROR='e'
- ACCT_LOGIN_ALREADY='f'
- ACCT_LOGIN_NEW='n'
- ACCT_LOGIN_ACCEPT='a'
- ACCT_LOGOUT='o'
- ACCT_SAVE_LOGOUT='S'
- ACCT_RESYNC='r'
- ACCT_SAVE='s'
- ACCT_NEWCHAR='c'
- ACCT_NEWSUBSCRIBE='u'
- ACCT_SUCCESS='!'
login request
- client sends http "d6 asdasd6 asdasd" (ACCT_LOGIN_DATA, username=asdasd password=asdasd)
- server sends http "d6 asdasd0 9 127.0.0.14 6777" (ACCT_LOGIN_DATA, username=asdasd, warning=emptystring, serverip=127.0.0.1, port=6777)
example packetlog
packetlog by wireshark, accountserver part (http:8080)
// username=asdasd password=asdasd serverip=192.168.178.26 serverport=6777 // client to accountserver 00000000 50 4f 53 54 20 2f 63 67 69 2d 62 69 6e 2f 61 63 POST /cg i-bin/ac 00000010 63 6f 75 6e 74 73 65 72 76 65 72 2e 70 79 20 48 countser ver.py H 00000020 54 54 50 2f 31 2e 31 0d 0a 48 6f 73 74 3a 20 31 TTP/1.1. .Host: 1 00000030 39 32 2e 31 36 38 2e 31 37 38 2e 32 36 3a 38 30 92.168.1 78.26:80 00000040 38 30 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 80..User -Agent: 00000050 56 73 6e 65 74 2f 31 2e 30 0d 0a 43 6f 6e 6e 65 Vsnet/1. 0..Conne 00000060 63 74 69 6f 6e 3a 20 6b 65 65 70 2d 61 6c 69 76 ction: k eep-aliv 00000070 65 0d 0a 41 63 63 65 70 74 3a 20 6d 65 73 73 61 e..Accep t: messa 00000080 67 65 2f 78 2d 76 73 6e 65 74 2d 70 61 63 6b 65 ge/x-vsn et-packe 00000090 74 0d 0a 4b 65 65 70 2d 41 6c 69 76 65 3a 20 33 t..Keep- Alive: 3 000000A0 30 30 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 00..Cont ent-Type 000000B0 3a 20 6d 65 73 73 61 67 65 2f 78 2d 76 73 6e 65 : messag e/x-vsne 000000C0 74 2d 70 61 63 6b 65 74 0d 0a 43 6f 6e 74 65 6e t-packet ..Conten 000000D0 74 2d 4c 65 6e 67 74 68 3a 20 31 37 0d 0a 0d 0a t-Length : 17.... 000000E0 64 36 20 61 73 64 61 73 64 36 20 61 73 64 61 73 d6 asdas d6 asdas 000000F0 64 d // accountserver to client 00000000 48 54 54 50 2f 31 2e 30 20 32 30 30 20 53 63 72 HTTP/1.0 200 Scr 00000010 69 70 74 20 6f 75 74 70 75 74 20 66 6f 6c 6c 6f ipt outp ut follo 00000020 77 73 0d 0a ws.. // accountserver to client 00000024 53 65 72 76 65 72 3a 20 42 61 73 65 48 54 54 50 Server: BaseHTTP 00000034 2f 30 2e 33 20 50 79 74 68 6f 6e 2f 32 2e 37 2e /0.3 Pyt hon/2.7. 00000044 31 2b 0d 0a 44 61 74 65 3a 20 53 75 6e 2c 20 31 1+..Date : Sun, 1 00000054 37 20 4a 75 6e 20 32 30 31 32 20 31 35 3a 35 39 7 Jun 20 12 15:59 00000064 3a 32 38 20 47 4d 54 0d 0a 0d 0a 64 36 20 61 73 :28 GMT. ...d6 as 00000074 64 61 73 64 30 20 31 34 20 31 39 32 2e 31 36 38 dasd0 14 192.168 00000084 2e 31 37 38 2e 32 36 34 20 36 37 37 37 0a .178.264 6777.
tcp part from wireshark parsed, full log here : https://github.com/ghoulsblade/vegaogre/blob/master/packetlogs/login-mmo-2-tcp.c
-- packetlogs/login-mmo-2-tcp.c Packet({from=client,cmd=CMD_CONNECT,head={{len=16,pri=1,flags=0x0},{cmd=46,serial=4995,datalen=0,flags=0x0}}}) Packet({from=server,cmd=CMD_CONNECT,head={{len=38,pri=1,flags=0x7a},{cmd=46,serial=0,datalen=22,flags=0x0}}}) Packet({from=client,cmd=CMD_LOGIN,head={{len=36,pri=1,flags=0x0},{cmd=1,serial=0,datalen=20,flags=0x0}}}) Packet({from=server,cmd=LOGIN_ACCEPT,head={{len=9927,pri=1,flags=0x7a},{cmd=4,serial=132,datalen=9911,flags=0x0}}}) Packet({from=server,cmd=CMD_TXTMESSAGE,head={{len=58,pri=1,flags=0x7a},{cmd=33,serial=0,datalen=42,flags=0x0}}}) Packet({from=client,cmd=CMD_DOWNLOAD,head={{len=52,pri=1,flags=0x0},{cmd=30,serial=0,datalen=36,flags=0x10}}}) Packet({from=server,cmd=CMD_DOWNLOAD,head={{len=52,pri=1,flags=0x7a},{cmd=30,serial=0,datalen=36,flags=0x10}}}) Packet({from=client,cmd=CMD_DOWNLOAD,head={{len=52,pri=1,flags=0x0},{cmd=30,serial=0,datalen=36,flags=0x10}}}) Packet({from=server,cmd=CMD_DOWNLOAD,head={{len=1030,pri=1,flags=0x7a},{cmd=30,serial=0,datalen=1014,flags=0x10}}}) Packet({from=server,cmd=CMD_DOWNLOAD,head={{len=1027,pri=1,flags=0x7a},{cmd=30,serial=0,datalen=1011,flags=0x10}}}) Packet({from=server,cmd=CMD_DOWNLOAD,head={{len=1027,pri=1,flags=0x7a},{cmd=30,serial=0,datalen=1011,flags=0x10}}}) Packet({from=server,cmd=CMD_DOWNLOAD,head={{len=1027,pri=1,flags=0x7a},{cmd=30,serial=0,datalen=1011,flags=0x10}}}) Packet({from=server,cmd=CMD_DOWNLOAD,head={{len=1027,pri=1,flags=0x7a},{cmd=30,serial=0,datalen=1011,flags=0x10}}}) Packet({from=server,cmd=CMD_DOWNLOAD,head={{len=296,pri=1,flags=0x7a},{cmd=30,serial=0,datalen=280,flags=0x10}}}) Packet({from=client,cmd=CMD_SERVERTIME,head={{len=19,pri=1,flags=0x0},{cmd=0,serial=0,datalen=3,flags=0x0}}}) Packet({from=client,cmd=CMD_SERVERTIME,head={{len=19,pri=1,flags=0x0},{cmd=0,serial=0,datalen=3,flags=0x0}}}) Packet({from=client,cmd=CMD_SERVERTIME,head={{len=19,pri=1,flags=0x0},{cmd=0,serial=0,datalen=3,flags=0x0}}}) Packet({from=client,cmd=CMD_SERVERTIME,head={{len=19,pri=1,flags=0x0},{cmd=0,serial=0,datalen=3,flags=0x0}}}) Packet({from=client,cmd=CMD_SERVERTIME,head={{len=19,pri=1,flags=0x0},{cmd=0,serial=0,datalen=3,flags=0x0}}}) Packet({from=client,cmd=CMD_SERVERTIME,head={{len=19,pri=1,flags=0x0},{cmd=0,serial=0,datalen=3,flags=0x0}}}) Packet({from=client,cmd=CMD_SERVERTIME,head={{len=19,pri=1,flags=0x0},{cmd=0,serial=0,datalen=3,flags=0x0}}}) Packet({from=client,cmd=CMD_SERVERTIME,head={{len=19,pri=1,flags=0x0},{cmd=0,serial=0,datalen=3,flags=0x0}}}) Packet({from=client,cmd=CMD_SERVERTIME,head={{len=19,pri=1,flags=0x0},{cmd=0,serial=0,datalen=3,flags=0x0}}}) Packet({from=client,cmd=CMD_SERVERTIME,head={{len=19,pri=1,flags=0x0},{cmd=0,serial=0,datalen=3,flags=0x0}}}) Packet({from=client,cmd=CMD_ADDCLIENT,head={{len=16,pri=1,flags=0x0},{cmd=12,serial=132,datalen=0,flags=0x0}}}) Packet({from=server,cmd=CMD_SAVEDATA,head={{len=37,pri=1,flags=0x7a},{cmd=49,serial=0,datalen=21,flags=0x0}}}) Packet({from=server,cmd=CMD_ADDEDYOU,head={{len=67,pri=1,flags=0x7a},{cmd=15,serial=132,datalen=51,flags=0x0}}}) Packet({from=server,cmd=CMD_ENTERCLIENT,head={{len=10397,pri=1,flags=0x7a},{cmd=13,serial=0,datalen=10381,flags=0x0}}}) Packet({from=server,cmd=CMD_SNAPCARGO,head={{len=20,pri=1,flags=0x7a},{cmd=40,serial=0,datalen=4,flags=0x0}}}) Packet({from=server,cmd=CMD_CREDITS,head={{len=21,pri=1,flags=0x7a},{cmd=42,serial=132,datalen=5,flags=0x0}}}) Packet({from=server,cmd=CMD_SNAPCARGO,head={{len=37368,pri=1,flags=0x7a},{cmd=40,serial=0,datalen=37352,flags=0x0}}})