Register for your free account! | Forgot your password?

Go Back   elitepvpers > MMORPGs > Conquer Online 2 > CO2 Private Server
You last visited: Today at 01:14

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[Workshop] Updating code to work post client V.5018

Discussion on [Workshop] Updating code to work post client V.5018 within the CO2 Private Server forum part of the Conquer Online 2 category.

Closed Thread
 
Old 01/01/2009, 13:28   #16
 
elite*gold: 20
Join Date: Aug 2005
Posts: 1,734
Received Thanks: 1,000
Bobo you may also use the high6's modified Conquer.exe and decrypted Server.dat you can find this in the hacks/tools section.
tanelipe is offline  
Old 01/02/2009, 15:28   #17
 
unknownone's Avatar
 
elite*gold: 20
Join Date: Jun 2005
Posts: 1,013
Received Thanks: 381
carrots
unknownone is offline  
Thanks
11 Users
Old 01/02/2009, 18:10   #18
 
elite*gold: 0
Join Date: Apr 2006
Posts: 64
Received Thanks: 32
So if I understand correctly, the *old* encryption/decryption of the key files are no longer used. This is the new way to encrypt/decrypt the packets. It may sound like a stupid question, but since I'm rewriting the proxy in a different language, I don't to waste time porting over old code when not needed

BTW, is there a test server up and running that we can test our proxy code against? That way I don't have to worry about getting my ip banned by TQ.

Thank you.

Quote:
Originally Posted by unknownone View Post
Update.

CipherContext is apparently broken for Blowfish. It uses the EVP part of openssl, and interprets the KeyLength of blowfish as 16 (which is correct - 16 in32s anyway). ManagedOpenSsl only allocates 16 bytes, so it breaks when trying to set the key for blowfish. Rather than all the messing about, add this Blowfish.cs file to the ManagedOpenSsl project and rebuild it. (Also, in Native.cs, change internal class Native to internal partial class Native)
BoboDundo is offline  
Old 01/02/2009, 21:12   #19
 
andyd123's Avatar
 
elite*gold: 20
Join Date: Apr 2006
Posts: 1,341
Received Thanks: 886
Quote:
Originally Posted by BoboDundo View Post
So if I understand correctly, the *old* encryption/decryption of the key files are no longer used. This is the new way to encrypt/decrypt the packets. It may sound like a stupid question, but since I'm rewriting the proxy in a different language, I don't to waste time porting over old code when not needed

BTW, is there a test server up and running that we can test our proxy code against? That way I don't have to worry about getting my ip banned by TQ.

Thank you.
Could always try AcidCo :P
andyd123 is offline  
Old 01/02/2009, 21:13   #20
 
elite*gold: 0
Join Date: Feb 2008
Posts: 1,590
Received Thanks: 154
Quote:
Originally Posted by andyd123 View Post
Could always try AcidCo :P
They just/are upgrading to 5090 for ninjas :P
tao4229 is offline  
Old 01/02/2009, 21:38   #21
 
elite*gold: 0
Join Date: Apr 2006
Posts: 64
Received Thanks: 32
Thanks, will give it a whirl.

Quote:
Originally Posted by andyd123 View Post
Could always try AcidCo :P
BoboDundo is offline  
Old 01/03/2009, 19:33   #22
 
© Haydz's Avatar
 
elite*gold: 20
Join Date: Jan 2008
Posts: 1,042
Received Thanks: 252
#Bump

Just wondering how people are getting on with this....

Haven't tried anything myself yet, and i can't this laptop isnt even capable of running C# without it freezing >.>

I will give it ago when i finish building my PC
© Haydz is offline  
Old 01/04/2009, 03:22   #23
 
© Haydz's Avatar
 
elite*gold: 20
Join Date: Jan 2008
Posts: 1,042
Received Thanks: 252
Quote:
Originally Posted by andyd123 View Post
Could always try AcidCo :P
Im Fairly Sure AcidCO Has Anti-Proxy Systems....


Sorry for duble bost men
© Haydz is offline  
Old 01/04/2009, 08:30   #24
 
elite*gold: 0
Join Date: Apr 2006
Posts: 64
Received Thanks: 32
I just want to get the Login code working properly. As long as they have the current login process that TQ is using, I should be good.

If not, I can always add the necessary code to Future's server code. I know that would work, but would it be the same implementation as TQ

Quote:
Originally Posted by © Haydz View Post
Im Fairly Sure AcidCO Has Anti-Proxy Systems....


Sorry for duble bost men
BoboDundo is offline  
Old 01/04/2009, 18:11   #25


 
Korvacs's Avatar
 
elite*gold: 20
Join Date: Mar 2006
Posts: 6,125
Received Thanks: 2,518
I know a few people have been succesful with this for proxys, has anyone else had any luck?

Yesturday i chucked the entire ManagedOpenSSL.dll in the bin since i, for some time now have been having no luck with it from a server point of view, and to my knowledge only inf and Ultimation have been able to sort it out for a server and it had nothing to do with ManagedOpenSSL.dll :P, and that was a long time ago.

So, i cant imagine anyone here will be able to get a server working with it :P, but best of luck to you all, lol.
Korvacs is offline  
Old 01/05/2009, 04:32   #26
 
elite*gold: 0
Join Date: Apr 2006
Posts: 64
Received Thanks: 32
unknownone,

I'm ready for the next step. Please let us know how to proceed. Thank you.

Quote:
Originally Posted by unknownone View Post
Update.

CipherContext is apparently broken for Blowfish. It uses the EVP part of openssl, and interprets the KeyLength of blowfish as 16 (which is correct - 16 in32s anyway). ManagedOpenSsl only allocates 16 bytes, so it breaks when trying to set the key for blowfish. Rather than all the messing about, add this Blowfish.cs file to the ManagedOpenSsl project and rebuild it. (Also, in Native.cs, change internal class Native to internal partial class Native)

And the new crypt
Code:
    public class GameProtocolCryptographer
    {
        OpenSSL.Blowfish _blowfish;

        public GameProtocolCryptographer(string key)
        {
            _blowfish = new OpenSSL.Blowfish(OpenSSL.BlowfishAlgorithm.CFB64);
            _blowfish.SetKey(Encoding.ASCII.GetBytes(key));
        }

        void Decrypt(byte[] packet)
        {
            byte[] buffer = _blowfish.Decrypt(packet);
            System.Buffer.BlockCopy(buffer, 0, packet, 0, buffer.Length);
        }

        void Encrypt(byte[] packet)
        {
            byte[] buffer = _blowfish.Encrypt(packet);
            System.Buffer.BlockCopy(buffer, 0, packet, 0, buffer.Length);
        }

        public OpenSSL.Blowfish Blowfish
        {
            get { return _blowfish; }
        }
    }
BoboDundo is offline  
Old 01/05/2009, 04:42   #27
 
Ultimatum's Avatar
 
elite*gold: 0
Join Date: Feb 2008
Posts: 277
Received Thanks: 52
Quote:
Originally Posted by Korvacs View Post
I know a few people have been succesful with this for proxys, has anyone else had any luck?

Yesturday i chucked the entire ManagedOpenSSL.dll in the bin since i, for some time now have been having no luck with it from a server point of view, and to my knowledge only inf and Ultimation have been able to sort it out for a server and it had nothing to do with ManagedOpenSSL.dll :P, and that was a long time ago.

So, i cant imagine anyone here will be able to get a server working with it :P, but best of luck to you all, lol.
agreed proxy yeh but when i try getting the client to connect to the server. I get disconnected at gameserver loggin x.x.
Ultimatum is offline  
Old 01/05/2009, 15:52   #28
 
unknownone's Avatar
 
elite*gold: 20
Join Date: Jun 2005
Posts: 1,013
Received Thanks: 381
asparagus
unknownone is offline  
Thanks
3 Users
Old 01/05/2009, 19:19   #29
 
elite*gold: 0
Join Date: Apr 2006
Posts: 64
Received Thanks: 32
No problem. I just wasn't sure if there were anymore changes that TQ had made that you were going to share. I don't have any problem with implementing the information you have provided and appreciate what you have done for the community.

Thank you for your help!!

Quote:
Originally Posted by unknownone View Post
You're obviously not, because there is no next step. I told you, I'm giving generic code that isn't specific to any server implementation, and it's already all in this thread. If you don't know what to do with it, try reading again several times over. It might help to understand how a Diffie-Hellman key exchange works (The key is only computable when both parties have the other's public key, and their own private key). I'm not doing any more work for you.
BoboDundo is offline  
Old 01/06/2009, 03:24   #30


 
Korvacs's Avatar
 
elite*gold: 20
Join Date: Mar 2006
Posts: 6,125
Received Thanks: 2,518
Little updated:

Im now <-> this close.

Night all lol.
Korvacs is offline  
Closed Thread


Similar Threads Similar Threads
sunworld client not updating
07/18/2009 - SRO Private Server - 7 Replies
i have downloaded the the client but its not updating its matter thats im using windows 7? i did "run as administrator"
omg most hack wont work in new patch 5018
03/18/2008 - Conquer Online 2 - 14 Replies
most of hack doesnt work sv,and most of all cotobo :(
Multi Client for patch 5018
03/18/2008 - CO2 Exploits, Hacks & Tools - 3 Replies
Hi all ... This is my 1st time 2 post a work for me .. feel free 2 ask or say ur opinion. If any1 no how 2 make multi client work for cotobo or hook it wid cotobo .. i ll be thankful Good Luck.



All times are GMT +2. The time now is 01:14.


Powered by vBulletin®
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2024 elitepvpers All Rights Reserved.