|
You last visited: Today at 02:01
Advertisement
New Encryption (Key) [Patch 5509]
Discussion on New Encryption (Key) [Patch 5509] within the CO2 Programming forum part of the Conquer Online 2 category.
07/07/2011, 21:17
|
#1
|
elite*gold: 0
Join Date: Dec 2007
Posts: 108
Received Thanks: 42
|
New Encryption (Key) [Patch 5509]
"BC234xs45nme7HU9"
Still doesn't seem to decrypt the server's key exchange packet. Did something else change or am I doing something wrong?
|
|
|
07/07/2011, 21:24
|
#2
|
elite*gold: 21
Join Date: Jul 2005
Posts: 9,193
Received Thanks: 5,376
|
|
|
|
07/07/2011, 22:28
|
#3
|
elite*gold: 80
Join Date: Sep 2007
Posts: 642
Received Thanks: 168
|
Must be Tqs new "proxy protection"
|
|
|
07/10/2011, 05:06
|
#4
|
elite*gold: 0
Join Date: Jun 2006
Posts: 457
Received Thanks: 67
|
yeah, i was wondering why CO closes after the auth process.
|
|
|
07/12/2011, 13:43
|
#5
|
elite*gold: 0
Join Date: Jul 2006
Posts: 2,216
Received Thanks: 793
|
Is the encryption replaced? Or a new layer was added? What did I miss?
|
|
|
07/13/2011, 15:39
|
#6
|
elite*gold: 0
Join Date: Jun 2006
Posts: 457
Received Thanks: 67
|
encryption wise, looks like nothing has changed. just changed the default blowfish key.
|
|
|
07/13/2011, 23:08
|
#7
|
elite*gold: 21
Join Date: Jul 2005
Posts: 9,193
Received Thanks: 5,376
|
Quote:
Originally Posted by shitboi
encryption wise, looks like nothing has changed. just changed the default blowfish key.
|
So I may be way off base here cause I've barely looked into it at all but I'd say a few things from just observations.
#1: It's a new layer to blowfish: The encryption key is still in client (changed as people already pointed out)
2: It's not JUST the key: Proof being that no bots were working including my basic packet logger. If you try to use the new encryption key you will not be able to set up your blowfish properly (***** up trying to read the exchange packets).
Again just going off observations here but I'd say it's a new layer to blowfish but not a full encryption change.
|
|
|
07/14/2011, 11:48
|
#8
|
elite*gold: 80
Join Date: Sep 2007
Posts: 642
Received Thanks: 168
|
Quote:
Originally Posted by pro4never
#1: It's a new layer to blowfish: The encryption key is still in client (changed as people already pointed out)
|
I've just gotta say. Most encryptions use an encryption key.
With that being said, there are numerous possibilities. But it is TQ.
|
|
|
07/14/2011, 16:11
|
#9
|
elite*gold: 0
Join Date: Jan 2007
Posts: 118
Received Thanks: 20
|
Quote:
Originally Posted by shitboi
encryption wise, looks like nothing has changed. just changed the default blowfish key.
|
Sounds like you have made your proxy work again. And it's nice to see that you've finished your proxy already man.
I've been out for many months because of work so I did not able to contact you last time when you were working on it.
|
|
|
07/15/2011, 16:02
|
#10
|
elite*gold: 0
Join Date: Jun 2006
Posts: 457
Received Thanks: 67
|
Quote:
Originally Posted by xmen01235
Sounds like you have made your proxy work again. And it's nice to see that you've finished your proxy already man.
I've been out for many months because of work so I did not able to contact you last time when you were working on it.
|
It worked. yeah! haha.
Well, it is not working now.
I was actually looking at the packet sequences/sizes when i arrived at my previous conclusion. I guess I was jumping to conclusion too early.
Just for a side note, when i compared the login packets from English CO to Chinese CO, there only difference i saw is that Chinese attempted to get a response from another Server right after obtained the DiffieHellsman info packet.
Again like Pro4never has suggested, this might be another layer or encoding before the actual blowfish implementation. N
|
|
|
07/15/2011, 16:34
|
#11
|
elite*gold: 0
Join Date: Jul 2006
Posts: 2,216
Received Thanks: 793
|
RSA
|
|
|
07/15/2011, 18:21
|
#12
|
elite*gold: 28
Join Date: Jun 2010
Posts: 2,223
Received Thanks: 867
|
No.
|
|
|
07/15/2011, 19:54
|
#13
|
elite*gold: 0
Join Date: Jul 2006
Posts: 2,216
Received Thanks: 793
|
I meant parts of the RSA headers are surely used in the code, I`m pretty bad when it comes to RE.
|
|
|
07/15/2011, 20:09
|
#14
|
elite*gold: 28
Join Date: Jun 2010
Posts: 2,223
Received Thanks: 867
|
Uhm, afaik, no.
I know what your getting at, The client does contain RSA but has nothing todo with the new enc.
|
|
|
07/15/2011, 21:54
|
#15
|
elite*gold: 0
Join Date: Jul 2011
Posts: 67
Received Thanks: 84
|
I think the RSA has to do with the Server.dat decryption, they keep the private key to themselves so no one can create an encrypted Server.dat. If they used that technique on the encryption all proxies would be ******.
|
|
|
|
|
Similar Threads
|
encryption
08/17/2010 - CO2 Private Server - 0 Replies
anybody can explain this?
I got it from another site about encryptions and cryptographers.
but didn't understand much of it, so if anybody can explain better.
//********************
//KEYS
//********************
//Binary
//********************
01000101 01111000 01111000 00100000 01111011 00100000 00101111 00101111 01000101 01111000 01111000 00100000 01001000 01100101 01111000 00100000 01100011 01110010 01111001 01110000 01110100 01101111 00001101 00001010 01111000 00101000 01001000...
|
Encryption
12/04/2008 - CO2 Private Server - 23 Replies
What is so good about having a client that is 5017+?
And this encryption......what is it?
|
RF CM encryption??
05/20/2008 - RF Online - 5 Replies
I was playing a little with WPE and now it seems all packets are ciphered, cause for example, when you throw away an item you could recognise a pattern, but now all i can see are random bytes in the throw away packets. Could it be cause of the last patch that CM has applied? Has anyone experienced this?
Sorry pls move this thread to the other forum
|
All times are GMT +2. The time now is 02:01.
|
|