|
You last visited: Today at 01:14
Advertisement
[Workshop] Updating code to work post client V.5018
Discussion on [Workshop] Updating code to work post client V.5018 within the CO2 Private Server forum part of the Conquer Online 2 category.
01/01/2009, 13:28
|
#16
|
elite*gold: 20
Join Date: Aug 2005
Posts: 1,734
Received Thanks: 1,000
|
Bobo you may also use the high6's modified Conquer.exe and decrypted Server.dat you can find this in the hacks/tools section.
|
|
|
01/02/2009, 15:28
|
#17
|
elite*gold: 20
Join Date: Jun 2005
Posts: 1,013
Received Thanks: 381
|
carrots
|
|
|
01/02/2009, 18:10
|
#18
|
elite*gold: 0
Join Date: Apr 2006
Posts: 64
Received Thanks: 32
|
So if I understand correctly, the *old* encryption/decryption of the key files are no longer used. This is the new way to encrypt/decrypt the packets. It may sound like a stupid question, but since I'm rewriting the proxy in a different language, I don't to waste time porting over old code when not needed
BTW, is there a test server up and running that we can test our proxy code against? That way I don't have to worry about getting my ip banned by TQ.
Thank you.
Quote:
Originally Posted by unknownone
Update.
CipherContext is apparently broken for Blowfish. It uses the EVP part of openssl, and interprets the KeyLength of blowfish as 16 (which is correct - 16 in32s anyway). ManagedOpenSsl only allocates 16 bytes, so it breaks when trying to set the key for blowfish. Rather than all the messing about, add this Blowfish.cs file to the ManagedOpenSsl project and rebuild it. (Also, in Native.cs, change internal class Native to internal partial class Native)
|
|
|
|
01/02/2009, 21:12
|
#19
|
elite*gold: 20
Join Date: Apr 2006
Posts: 1,341
Received Thanks: 886
|
Quote:
Originally Posted by BoboDundo
So if I understand correctly, the *old* encryption/decryption of the key files are no longer used. This is the new way to encrypt/decrypt the packets. It may sound like a stupid question, but since I'm rewriting the proxy in a different language, I don't to waste time porting over old code when not needed
BTW, is there a test server up and running that we can test our proxy code against? That way I don't have to worry about getting my ip banned by TQ.
Thank you.
|
Could always try AcidCo :P
|
|
|
01/02/2009, 21:13
|
#20
|
elite*gold: 0
Join Date: Feb 2008
Posts: 1,590
Received Thanks: 154
|
Quote:
Originally Posted by andyd123
Could always try AcidCo :P
|
They just/are upgrading to 5090 for ninjas :P
|
|
|
01/02/2009, 21:38
|
#21
|
elite*gold: 0
Join Date: Apr 2006
Posts: 64
Received Thanks: 32
|
Thanks, will give it a whirl.
Quote:
Originally Posted by andyd123
Could always try AcidCo :P
|
|
|
|
01/03/2009, 19:33
|
#22
|
elite*gold: 20
Join Date: Jan 2008
Posts: 1,042
Received Thanks: 252
|
#Bump
Just wondering how people are getting on with this....
Haven't tried anything myself yet, and i can't this laptop isnt even capable of running C# without it freezing >.>
I will give it ago when i finish building my PC
|
|
|
01/04/2009, 03:22
|
#23
|
elite*gold: 20
Join Date: Jan 2008
Posts: 1,042
Received Thanks: 252
|
Quote:
Originally Posted by andyd123
Could always try AcidCo :P
|
Im Fairly Sure AcidCO Has Anti-Proxy Systems....
Sorry for duble bost men
|
|
|
01/04/2009, 08:30
|
#24
|
elite*gold: 0
Join Date: Apr 2006
Posts: 64
Received Thanks: 32
|
I just want to get the Login code working properly. As long as they have the current login process that TQ is using, I should be good.
If not, I can always add the necessary code to Future's server code. I know that would work, but would it be the same implementation as TQ
Quote:
Originally Posted by © Haydz
Im Fairly Sure AcidCO Has Anti-Proxy Systems....
Sorry for duble bost men
|
|
|
|
01/04/2009, 18:11
|
#25
|
elite*gold: 20
Join Date: Mar 2006
Posts: 6,125
Received Thanks: 2,518
|
I know a few people have been succesful with this for proxys, has anyone else had any luck?
Yesturday i chucked the entire ManagedOpenSSL.dll in the bin since i, for some time now have been having no luck with it from a server point of view, and to my knowledge only inf and Ultimation have been able to sort it out for a server and it had nothing to do with ManagedOpenSSL.dll :P, and that was a long time ago.
So, i cant imagine anyone here will be able to get a server working with it :P, but best of luck to you all, lol.
|
|
|
01/05/2009, 04:32
|
#26
|
elite*gold: 0
Join Date: Apr 2006
Posts: 64
Received Thanks: 32
|
unknownone,
I'm ready for the next step. Please let us know how to proceed. Thank you.
Quote:
Originally Posted by unknownone
Update.
CipherContext is apparently broken for Blowfish. It uses the EVP part of openssl, and interprets the KeyLength of blowfish as 16 (which is correct - 16 in32s anyway). ManagedOpenSsl only allocates 16 bytes, so it breaks when trying to set the key for blowfish. Rather than all the messing about, add this Blowfish.cs file to the ManagedOpenSsl project and rebuild it. (Also, in Native.cs, change internal class Native to internal partial class Native)
And the new crypt
Code:
public class GameProtocolCryptographer
{
OpenSSL.Blowfish _blowfish;
public GameProtocolCryptographer(string key)
{
_blowfish = new OpenSSL.Blowfish(OpenSSL.BlowfishAlgorithm.CFB64);
_blowfish.SetKey(Encoding.ASCII.GetBytes(key));
}
void Decrypt(byte[] packet)
{
byte[] buffer = _blowfish.Decrypt(packet);
System.Buffer.BlockCopy(buffer, 0, packet, 0, buffer.Length);
}
void Encrypt(byte[] packet)
{
byte[] buffer = _blowfish.Encrypt(packet);
System.Buffer.BlockCopy(buffer, 0, packet, 0, buffer.Length);
}
public OpenSSL.Blowfish Blowfish
{
get { return _blowfish; }
}
}
|
|
|
|
01/05/2009, 04:42
|
#27
|
elite*gold: 0
Join Date: Feb 2008
Posts: 277
Received Thanks: 52
|
Quote:
Originally Posted by Korvacs
I know a few people have been succesful with this for proxys, has anyone else had any luck?
Yesturday i chucked the entire ManagedOpenSSL.dll in the bin since i, for some time now have been having no luck with it from a server point of view, and to my knowledge only inf and Ultimation have been able to sort it out for a server and it had nothing to do with ManagedOpenSSL.dll :P, and that was a long time ago.
So, i cant imagine anyone here will be able to get a server working with it :P, but best of luck to you all, lol.
|
agreed proxy yeh but when i try getting the client to connect to the server. I get disconnected at gameserver loggin x.x.
|
|
|
01/05/2009, 15:52
|
#28
|
elite*gold: 20
Join Date: Jun 2005
Posts: 1,013
Received Thanks: 381
|
asparagus
|
|
|
01/05/2009, 19:19
|
#29
|
elite*gold: 0
Join Date: Apr 2006
Posts: 64
Received Thanks: 32
|
No problem. I just wasn't sure if there were anymore changes that TQ had made that you were going to share. I don't have any problem with implementing the information you have provided and appreciate what you have done for the community.
Thank you for your help!!
Quote:
Originally Posted by unknownone
You're obviously not, because there is no next step. I told you, I'm giving generic code that isn't specific to any server implementation, and it's already all in this thread. If you don't know what to do with it, try reading again several times over. It might help to understand how a Diffie-Hellman key exchange works (The key is only computable when both parties have the other's public key, and their own private key). I'm not doing any more work for you.
|
|
|
|
01/06/2009, 03:24
|
#30
|
elite*gold: 20
Join Date: Mar 2006
Posts: 6,125
Received Thanks: 2,518
|
Little updated:
Im now <-> this close.
Night all lol.
|
|
|
Similar Threads
|
sunworld client not updating
07/18/2009 - SRO Private Server - 7 Replies
i have downloaded the the client but its not updating
its matter thats im using windows 7?
i did "run as administrator"
|
omg most hack wont work in new patch 5018
03/18/2008 - Conquer Online 2 - 14 Replies
most of hack doesnt work sv,and most of all cotobo :(
|
Multi Client for patch 5018
03/18/2008 - CO2 Exploits, Hacks & Tools - 3 Replies
Hi all ... This is my 1st time 2 post a work for me .. feel free 2 ask or say ur opinion.
If any1 no how 2 make multi client work for cotobo or hook it wid cotobo .. i ll be thankful
Good Luck.
|
All times are GMT +2. The time now is 01:14.
|
|