2023-02-16 06:06:42 +01:00
|
|
|
from twisted.internet.protocol import Factory, Protocol
|
|
|
|
import logging, coloredlogs
|
|
|
|
from Crypto.Cipher import AES
|
|
|
|
import struct
|
|
|
|
from typing import Dict, Any
|
|
|
|
from logging.handlers import TimedRotatingFileHandler
|
|
|
|
|
|
|
|
from core.config import CoreConfig
|
|
|
|
from core.data import Data
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
class AimedbProtocol(Protocol):
|
|
|
|
AIMEDB_RESPONSE_CODES = {
|
|
|
|
"felica_lookup": 0x03,
|
|
|
|
"lookup": 0x06,
|
2023-03-09 17:38:58 +01:00
|
|
|
"log": 0x0A,
|
|
|
|
"campaign": 0x0C,
|
|
|
|
"touch": 0x0E,
|
2023-02-16 06:06:42 +01:00
|
|
|
"lookup2": 0x10,
|
|
|
|
"felica_lookup2": 0x12,
|
|
|
|
"log2": 0x14,
|
2023-03-09 17:38:58 +01:00
|
|
|
"hello": 0x65,
|
2023-02-16 06:06:42 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
request_list: Dict[int, Any] = {}
|
|
|
|
|
|
|
|
def __init__(self, core_cfg: CoreConfig) -> None:
|
|
|
|
self.logger = logging.getLogger("aimedb")
|
|
|
|
self.config = core_cfg
|
|
|
|
self.data = Data(core_cfg)
|
|
|
|
if core_cfg.aimedb.key == "":
|
|
|
|
self.logger.error("!!!KEY NOT SET!!!")
|
|
|
|
exit(1)
|
2023-03-09 17:38:58 +01:00
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
self.request_list[0x01] = self.handle_felica_lookup
|
|
|
|
self.request_list[0x04] = self.handle_lookup
|
|
|
|
self.request_list[0x05] = self.handle_register
|
2023-03-09 17:38:58 +01:00
|
|
|
self.request_list[0x09] = self.handle_log
|
|
|
|
self.request_list[0x0B] = self.handle_campaign
|
|
|
|
self.request_list[0x0D] = self.handle_touch
|
|
|
|
self.request_list[0x0F] = self.handle_lookup2
|
2023-02-16 06:06:42 +01:00
|
|
|
self.request_list[0x11] = self.handle_felica_lookup2
|
|
|
|
self.request_list[0x13] = self.handle_log2
|
|
|
|
self.request_list[0x64] = self.handle_hello
|
|
|
|
|
|
|
|
def append_padding(self, data: bytes):
|
|
|
|
"""Appends 0s to the end of the data until it's at the correct size"""
|
|
|
|
length = struct.unpack_from("<H", data, 6)
|
|
|
|
padding_size = length[0] - len(data)
|
|
|
|
data += bytes(padding_size)
|
|
|
|
return data
|
|
|
|
|
|
|
|
def connectionMade(self) -> None:
|
|
|
|
self.logger.debug(f"{self.transport.getPeer().host} Connected")
|
|
|
|
|
|
|
|
def connectionLost(self, reason) -> None:
|
2023-03-09 17:38:58 +01:00
|
|
|
self.logger.debug(
|
|
|
|
f"{self.transport.getPeer().host} Disconnected - {reason.value}"
|
|
|
|
)
|
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
def dataReceived(self, data: bytes) -> None:
|
|
|
|
cipher = AES.new(self.config.aimedb.key.encode(), AES.MODE_ECB)
|
|
|
|
|
|
|
|
try:
|
|
|
|
decrypted = cipher.decrypt(data)
|
|
|
|
except:
|
|
|
|
self.logger.error(f"Failed to decrypt {data.hex()}")
|
|
|
|
return None
|
|
|
|
|
|
|
|
self.logger.debug(f"{self.transport.getPeer().host} wrote {decrypted.hex()}")
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
if not decrypted[1] == 0xA1 and not decrypted[0] == 0x3E:
|
2023-02-16 06:06:42 +01:00
|
|
|
self.logger.error(f"Bad magic")
|
|
|
|
return None
|
|
|
|
|
|
|
|
req_code = decrypted[4]
|
|
|
|
|
|
|
|
if req_code == 0x66:
|
|
|
|
self.logger.info(f"goodbye from {self.transport.getPeer().host}")
|
|
|
|
self.transport.loseConnection()
|
|
|
|
return
|
|
|
|
|
|
|
|
try:
|
|
|
|
resp = self.request_list[req_code](decrypted)
|
|
|
|
encrypted = cipher.encrypt(resp)
|
|
|
|
self.logger.debug(f"Response {resp.hex()}")
|
|
|
|
self.transport.write(encrypted)
|
|
|
|
|
|
|
|
except KeyError:
|
|
|
|
self.logger.error(f"Unknown command code {hex(req_code)}")
|
|
|
|
return None
|
|
|
|
|
|
|
|
except ValueError as e:
|
|
|
|
self.logger.error(f"Failed to encrypt {resp.hex()} because {e}")
|
|
|
|
return None
|
2023-03-09 17:38:58 +01:00
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
def handle_campaign(self, data: bytes) -> bytes:
|
|
|
|
self.logger.info(f"campaign from {self.transport.getPeer().host}")
|
2023-03-09 17:38:58 +01:00
|
|
|
ret = struct.pack(
|
|
|
|
"<5H",
|
|
|
|
0xA13E,
|
|
|
|
0x3087,
|
|
|
|
self.AIMEDB_RESPONSE_CODES["campaign"],
|
|
|
|
0x0200,
|
|
|
|
0x0001,
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
return self.append_padding(ret)
|
2023-03-09 17:38:58 +01:00
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
def handle_hello(self, data: bytes) -> bytes:
|
|
|
|
self.logger.info(f"hello from {self.transport.getPeer().host}")
|
2023-03-09 17:38:58 +01:00
|
|
|
ret = struct.pack(
|
|
|
|
"<5H", 0xA13E, 0x3087, self.AIMEDB_RESPONSE_CODES["hello"], 0x0020, 0x0001
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
return self.append_padding(ret)
|
|
|
|
|
|
|
|
def handle_lookup(self, data: bytes) -> bytes:
|
2023-03-09 17:38:58 +01:00
|
|
|
luid = data[0x20:0x2A].hex()
|
2023-02-16 06:06:42 +01:00
|
|
|
user_id = self.data.card.get_user_id_from_card(access_code=luid)
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
if user_id is None:
|
|
|
|
user_id = -1
|
2023-02-16 06:06:42 +01:00
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
self.logger.info(
|
|
|
|
f"lookup from {self.transport.getPeer().host}: luid {luid} -> user_id {user_id}"
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
ret = struct.pack(
|
|
|
|
"<5H", 0xA13E, 0x3087, self.AIMEDB_RESPONSE_CODES["lookup"], 0x0130, 0x0001
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
ret += bytes(0x20 - len(ret))
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
if user_id is None:
|
|
|
|
ret += struct.pack("<iH", -1, 0)
|
|
|
|
else:
|
|
|
|
ret += struct.pack("<l", user_id)
|
2023-02-16 06:06:42 +01:00
|
|
|
return self.append_padding(ret)
|
|
|
|
|
|
|
|
def handle_lookup2(self, data: bytes) -> bytes:
|
|
|
|
self.logger.info(f"lookup2")
|
|
|
|
|
|
|
|
ret = bytearray(self.handle_lookup(data))
|
|
|
|
ret[4] = self.AIMEDB_RESPONSE_CODES["lookup2"]
|
|
|
|
|
|
|
|
return bytes(ret)
|
|
|
|
|
|
|
|
def handle_felica_lookup(self, data: bytes) -> bytes:
|
2023-03-09 17:38:58 +01:00
|
|
|
idm = data[0x20:0x28].hex()
|
|
|
|
pmm = data[0x28:0x30].hex()
|
2023-02-16 06:06:42 +01:00
|
|
|
access_code = self.data.card.to_access_code(idm)
|
2023-03-09 17:38:58 +01:00
|
|
|
self.logger.info(
|
|
|
|
f"felica_lookup from {self.transport.getPeer().host}: idm {idm} pmm {pmm} -> access_code {access_code}"
|
|
|
|
)
|
|
|
|
|
|
|
|
ret = struct.pack(
|
|
|
|
"<5H",
|
|
|
|
0xA13E,
|
|
|
|
0x3087,
|
|
|
|
self.AIMEDB_RESPONSE_CODES["felica_lookup"],
|
|
|
|
0x0030,
|
|
|
|
0x0001,
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
ret += bytes(26)
|
|
|
|
ret += bytes.fromhex(access_code)
|
|
|
|
|
|
|
|
return self.append_padding(ret)
|
|
|
|
|
|
|
|
def handle_felica_lookup2(self, data: bytes) -> bytes:
|
2023-03-09 17:38:58 +01:00
|
|
|
idm = data[0x30:0x38].hex()
|
|
|
|
pmm = data[0x38:0x40].hex()
|
2023-02-16 06:06:42 +01:00
|
|
|
access_code = self.data.card.to_access_code(idm)
|
|
|
|
user_id = self.data.card.get_user_id_from_card(access_code=access_code)
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
if user_id is None:
|
|
|
|
user_id = -1
|
2023-02-16 06:06:42 +01:00
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
self.logger.info(
|
|
|
|
f"felica_lookup2 from {self.transport.getPeer().host}: idm {idm} ipm {pmm} -> access_code {access_code} user_id {user_id}"
|
|
|
|
)
|
|
|
|
|
|
|
|
ret = struct.pack(
|
|
|
|
"<5H",
|
|
|
|
0xA13E,
|
|
|
|
0x3087,
|
|
|
|
self.AIMEDB_RESPONSE_CODES["felica_lookup2"],
|
|
|
|
0x0140,
|
|
|
|
0x0001,
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
ret += bytes(22)
|
2023-03-09 17:38:58 +01:00
|
|
|
ret += struct.pack("<lq", user_id, -1) # first -1 is ext_id, 3rd is access code
|
2023-02-16 06:06:42 +01:00
|
|
|
ret += bytes.fromhex(access_code)
|
|
|
|
ret += struct.pack("<l", 1)
|
2023-03-09 17:38:58 +01:00
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
return self.append_padding(ret)
|
2023-03-09 17:38:58 +01:00
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
def handle_touch(self, data: bytes) -> bytes:
|
|
|
|
self.logger.info(f"touch from {self.transport.getPeer().host}")
|
2023-03-09 17:38:58 +01:00
|
|
|
ret = struct.pack(
|
|
|
|
"<5H", 0xA13E, 0x3087, self.AIMEDB_RESPONSE_CODES["touch"], 0x0050, 0x0001
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
ret += bytes(5)
|
2023-03-09 17:38:58 +01:00
|
|
|
ret += struct.pack("<3H", 0x6F, 0, 1)
|
2023-02-16 06:06:42 +01:00
|
|
|
|
|
|
|
return self.append_padding(ret)
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
def handle_register(self, data: bytes) -> bytes:
|
|
|
|
luid = data[0x20:0x2A].hex()
|
2023-02-19 06:07:14 +01:00
|
|
|
if self.config.server.allow_user_registration:
|
2023-02-16 06:06:42 +01:00
|
|
|
user_id = self.data.user.create_user()
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
if user_id is None:
|
2023-02-16 06:06:42 +01:00
|
|
|
user_id = -1
|
|
|
|
self.logger.error("Failed to register user!")
|
|
|
|
|
|
|
|
else:
|
|
|
|
card_id = self.data.card.create_card(user_id, luid)
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
if card_id is None:
|
2023-02-16 06:06:42 +01:00
|
|
|
user_id = -1
|
|
|
|
self.logger.error("Failed to register card!")
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
self.logger.info(
|
|
|
|
f"register from {self.transport.getPeer().host}: luid {luid} -> user_id {user_id}"
|
|
|
|
)
|
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
else:
|
2023-03-09 17:38:58 +01:00
|
|
|
self.logger.info(
|
|
|
|
f"register from {self.transport.getPeer().host} blocked!: luid {luid}"
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
user_id = -1
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
ret = struct.pack(
|
|
|
|
"<5H",
|
|
|
|
0xA13E,
|
|
|
|
0x3087,
|
|
|
|
self.AIMEDB_RESPONSE_CODES["lookup"],
|
|
|
|
0x0030,
|
|
|
|
0x0001 if user_id > -1 else 0,
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
ret += bytes(0x20 - len(ret))
|
|
|
|
ret += struct.pack("<l", user_id)
|
|
|
|
|
|
|
|
return self.append_padding(ret)
|
|
|
|
|
|
|
|
def handle_log(self, data: bytes) -> bytes:
|
|
|
|
# TODO: Save aimedb logs
|
|
|
|
self.logger.info(f"log from {self.transport.getPeer().host}")
|
2023-03-09 17:38:58 +01:00
|
|
|
ret = struct.pack(
|
|
|
|
"<5H", 0xA13E, 0x3087, self.AIMEDB_RESPONSE_CODES["log"], 0x0020, 0x0001
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
return self.append_padding(ret)
|
|
|
|
|
|
|
|
def handle_log2(self, data: bytes) -> bytes:
|
|
|
|
self.logger.info(f"log2 from {self.transport.getPeer().host}")
|
2023-03-09 17:38:58 +01:00
|
|
|
ret = struct.pack(
|
|
|
|
"<5H", 0xA13E, 0x3087, self.AIMEDB_RESPONSE_CODES["log2"], 0x0040, 0x0001
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
ret += bytes(22)
|
|
|
|
ret += struct.pack("H", 1)
|
|
|
|
|
|
|
|
return self.append_padding(ret)
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
class AimedbFactory(Factory):
|
|
|
|
protocol = AimedbProtocol
|
2023-03-09 17:38:58 +01:00
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
def __init__(self, cfg: CoreConfig) -> None:
|
|
|
|
self.config = cfg
|
|
|
|
log_fmt_str = "[%(asctime)s] Aimedb | %(levelname)s | %(message)s"
|
|
|
|
log_fmt = logging.Formatter(log_fmt_str)
|
|
|
|
self.logger = logging.getLogger("aimedb")
|
|
|
|
|
2023-03-09 17:38:58 +01:00
|
|
|
fileHandler = TimedRotatingFileHandler(
|
|
|
|
"{0}/{1}.log".format(self.config.server.log_dir, "aimedb"),
|
|
|
|
when="d",
|
|
|
|
backupCount=10,
|
|
|
|
)
|
2023-02-16 06:06:42 +01:00
|
|
|
fileHandler.setFormatter(log_fmt)
|
2023-03-09 17:38:58 +01:00
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
consoleHandler = logging.StreamHandler()
|
|
|
|
consoleHandler.setFormatter(log_fmt)
|
|
|
|
|
|
|
|
self.logger.addHandler(fileHandler)
|
|
|
|
self.logger.addHandler(consoleHandler)
|
2023-03-09 17:38:58 +01:00
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
self.logger.setLevel(self.config.aimedb.loglevel)
|
2023-03-09 17:38:58 +01:00
|
|
|
coloredlogs.install(
|
|
|
|
level=cfg.aimedb.loglevel, logger=self.logger, fmt=log_fmt_str
|
|
|
|
)
|
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
if self.config.aimedb.key == "":
|
|
|
|
self.logger.error("Please set 'key' field in your config file.")
|
|
|
|
exit(1)
|
|
|
|
|
|
|
|
self.logger.info(f"Ready on port {self.config.aimedb.port}")
|
2023-03-09 17:38:58 +01:00
|
|
|
|
2023-02-16 06:06:42 +01:00
|
|
|
def buildProtocol(self, addr):
|
|
|
|
return AimedbProtocol(self.config)
|