|
You last visited: Today at 19:53
Advertisement
[Teaching Units] ProxyParadise! A step by step proxy tutorial!
Discussion on [Teaching Units] ProxyParadise! A step by step proxy tutorial! within the CO2 Programming forum part of the Conquer Online 2 category.
09/07/2011, 22:23
|
#166
|
elite*gold: 0
Join Date: Mar 2009
Posts: 518
Received Thanks: 238
|
Oh P4N, how lost we would all be without you...
Haven't been active for a while, but just dropped by to say that you have my ongoing support.
Oh, and for the love of *** don't do this
#2: Working bot made with this framework that people could use. Just basic features but something people could use if they wished.
<3 you (no ****)
|
|
|
09/07/2011, 23:50
|
#167
|
elite*gold: 21
Join Date: Jul 2005
Posts: 9,193
Received Thanks: 5,380
|
So not a hugely useful one imo but just going through structuring some packets and showing some different methods of writing them.
|
|
|
09/15/2011, 13:20
|
#168
|
elite*gold: 0
Join Date: Nov 2006
Posts: 286
Received Thanks: 38
|
Does TQ change something ? bcouse today i cant login to game server, but yesterday everything was fine
|
|
|
09/15/2011, 13:42
|
#169
|
elite*gold: 0
Join Date: Jul 2011
Posts: 67
Received Thanks: 84
|
Quote:
Originally Posted by TomasLT
Does TQ change something ? bcouse today i cant login to game server, but yesterday everything was fine
|
EDIT: I've cleared this post as I've been asked not to share the information yet.
|
|
|
09/15/2011, 20:35
|
#170
|
elite*gold: 0
Join Date: Nov 2006
Posts: 286
Received Thanks: 38
|
Haha all proxys are down and i think it wount be fixed in few days
Everything what i noticed it that something is changed in DiffieHelman packet encryption/decryption
|
|
|
09/15/2011, 22:01
|
#171
|
elite*gold: 0
Join Date: Jul 2011
Posts: 67
Received Thanks: 84
|
DiffieHellman is not an encryption system it is a method of deriving a secret key FOR the encryption system. In the case of CO the encryption system is Cast128 and the key exchange is DiffieHellman.
|
|
|
09/15/2011, 22:06
|
#172
|
elite*gold: 28
Join Date: Jun 2010
Posts: 2,225
Received Thanks: 868
|
Hybrid, Where are yhoo?
|
|
|
09/15/2011, 22:15
|
#173
|
elite*gold: 0
Join Date: Nov 2006
Posts: 286
Received Thanks: 38
|
I think u dont understand me. After auth is done then client(proxy) is redicting to game server and when:
1. Server first generates a pair of DH parameters, P (a large prime number), G, (a generator base, usually is 3 or 5 or 7).
2. using this pair of DH parameters, server generates a DH key pair; this includes a public key of 128bytes long and a private key not longer than public key.
3. Up till this point, the server side DH information is complete. But TQ wants to be more efficient in sending packets. They decided to include some blowfish info as well. Blowfish cfb64 encryption requires a Initialization Vector (IV) of 8 bytes long. TQ decides to use a predefined IV for server->client encryption, and another for client->server encryption. These 2 IVs are included in the first packet as well. Note: these 2 IVs will be reserved for later use.
4. The first packet from server, and the first packet sent by client are considered DH packets. They are encrypted using Blowfish cfb64 with an initialization vector of 8 bytes of zeros.
And i think wanna say that this (4) encryption is changed !
|
|
|
09/15/2011, 22:36
|
#174
|
elite*gold: 0
Join Date: Jul 2011
Posts: 67
Received Thanks: 84
|
Blowfish hasnt been used for a long time, it switched to Cast128 months ago. The first 2 packets you are talking about are the DH key exchange, they are encrypted using Cast128 and a vanilla key (BC234xs45nme7HU9). They are used to exchange DH public keys so the client and server can derive a shared secret (using their private keys and a common prime and generator) which is then applied to the cast128 encryption.
I know exactly how it works, I've written my own proxy.
|
|
|
09/15/2011, 22:52
|
#175
|
elite*gold: 0
Join Date: Nov 2006
Posts: 286
Received Thanks: 38
|
Quote:
Originally Posted by Cyanogen
Blowfish hasnt been used for a long time, it switched to Cast128 months ago. The first 2 packets you are talking about are the DH key exchange, they are encrypted using Cast128 and a vanilla key (BC234xs45nme7HU9). They are used to exchange DH public keys so the client and server can derive a shared secret (using their private keys and a common prime and generator) which is then applied to the cast128 encryption.
I know exactly how it works, I've written my own proxy.
|
Me too but i dont looked at it almost 4 months  Thanks for clear explanation
|
|
|
09/15/2011, 23:09
|
#176
|
elite*gold: 0
Join Date: Jul 2011
Posts: 67
Received Thanks: 84
|
EDIT: Cleared this post. I've been asked not to share the information yet.
My proxy is working again, yayyyyyyy.
You're gonna have to do better than that TQ ROFL.....
|
|
|
09/15/2011, 23:43
|
#177
|
elite*gold: 20
Join Date: Aug 2007
Posts: 1,749
Received Thanks: 2,199
|
Quote:
Originally Posted by Cyanogen
EDIT: Cleared this post. I've been asked not to share the information yet.
My proxy is working again, yayyyyyyy.
You're gonna have to do better than that TQ ROFL.....
|
Were you on Royalty testing your ****? Or was that someone else?
|
|
|
09/15/2011, 23:48
|
#178
|
elite*gold: 0
Join Date: Jul 2011
Posts: 67
Received Thanks: 84
|
No, I'm on Storm mostly.
My proxy isn't really a bot, it's just a proxy I use for packet sniffing and a few automatic functions. It's probably someone from CAI or COG getting theirs up again. I doubt it will/would take them long to suss it out either.
Isn't Trig' on Royalty?
|
|
|
09/15/2011, 23:51
|
#179
|
elite*gold: 28
Join Date: Jun 2010
Posts: 2,225
Received Thanks: 868
|
Bang. Pop. Whallop. Crash. BOOM.
Post editied.
|
|
|
09/15/2011, 23:55
|
#180
|
elite*gold: 0
Join Date: Jul 2011
Posts: 67
Received Thanks: 84
|
I don't want to get anyone in trouble or anything so probs best not to say.
c#???? Urgh!!
|
|
|
All times are GMT +1. The time now is 19:55.
|
|