onnrain 0 Posted January 12, 2017 i have problem using this. I done diffing with nemo 3 packet key, and edit the packets.h and enable packet_obfuscation: 2, the server still reject me (wrong packet). i already search and follow guides in forum but still cannot solve my problem. :( Quote Share this post Link to post Share on other sites
0 Kuya Jeo 120 Posted January 13, 2017 i have problem using this. I done diffing with nemo 3 packet key, and edit the packets.h and enable packet_obfuscation: 2, the server still reject me (wrong packet). i already search and follow guides in forum but still cannot solve my problem. :( 1. get the hash codes of your client using this website http://onlinemd5.com/ 2. trunk/conf/login/login-server.conf and find this line of code //================================================================== // Client hash checking system //================================================================== // Note: see doc/md5_hashcheck.txt for more details. hash: { // Client MD5 hash check // If turned on, the login server will check if the client's hash matches // the value below, and will not connect tampered clients. enabled: false // Client MD5 hashes // The client with the specified hash can be used to log in by players with // a group_id equal to or greater than the given value. // If you specify 'disabled' as hash, players with a group_id greater than or // equal to the given value will be able to log in regardless of hash (and even // if their client does not send a hash at all.) MD5_hashes: ( //{ // group_id: group id // hash: client hash //}, //{ // group_id: 0 // hash: "52227DDB3342AEE9C3206FC49B22C138" //}, //{ // group_id: 98 // hash: "52227DDB3342AEE9C3206FC49B22C138" //}, //{ // group_id: 99 // hash: "52227DDB3342AEE9C3206FC49B22C138" //}, ) } // login_configuration.permission.hash 3. Enable them all like this. //================================================================== // Client hash checking system //================================================================== // Note: see doc/md5_hashcheck.txt for more details. hash: { // Client MD5 hash check // If turned on, the login server will check if the client's hash matches // the value below, and will not connect tampered clients. enabled: true // Client MD5 hashes // The client with the specified hash can be used to log in by players with // a group_id equal to or greater than the given value. // If you specify 'disabled' as hash, players with a group_id greater than or // equal to the given value will be able to log in regardless of hash (and even // if their client does not send a hash at all.) MD5_hashes: ( { group_id: group id hash: client hash }, { group_id: 0 hash: "52227DDB3342AEE9C3206FC49B22C138" }, { group_id: 98 hash: "52227DDB3342AEE9C3206FC49B22C138" }, { group_id: 99 hash: "52227DDB3342AEE9C3206FC49B22C138" }, ) } // login_configuration.permission.hash 52227DDB3342AEE9C3206FC49B22C138 is the has code from the site i give in number 1. change it on the hash code you get in your client. This will fix the packet error. And recompile your server if you modified your packets.h Quote Share this post Link to post Share on other sites
0 onnrain 0 Posted January 13, 2017 i have problem using this. I done diffing with nemo 3 packet key, and edit the packets.h and enable packet_obfuscation: 2, the server still reject me (wrong packet). i already search and follow guides in forum but still cannot solve my problem. :( 1. get the hash codes of your client using this website http://onlinemd5.com/ 2. trunk/conf/login/login-server.conf and find this line of code //================================================================== // Client hash checking system //================================================================== // Note: see doc/md5_hashcheck.txt for more details. hash: { // Client MD5 hash check // If turned on, the login server will check if the client's hash matches // the value below, and will not connect tampered clients. enabled: false // Client MD5 hashes // The client with the specified hash can be used to log in by players with // a group_id equal to or greater than the given value. // If you specify 'disabled' as hash, players with a group_id greater than or // equal to the given value will be able to log in regardless of hash (and even // if their client does not send a hash at all.) MD5_hashes: ( //{ // group_id: group id // hash: client hash //}, //{ // group_id: 0 // hash: "52227DDB3342AEE9C3206FC49B22C138" //}, //{ // group_id: 98 // hash: "52227DDB3342AEE9C3206FC49B22C138" //}, //{ // group_id: 99 // hash: "52227DDB3342AEE9C3206FC49B22C138" //}, ) } // login_configuration.permission.hash 3. Enable them all like this. //================================================================== // Client hash checking system //================================================================== // Note: see doc/md5_hashcheck.txt for more details. hash: { // Client MD5 hash check // If turned on, the login server will check if the client's hash matches // the value below, and will not connect tampered clients. enabled: true // Client MD5 hashes // The client with the specified hash can be used to log in by players with // a group_id equal to or greater than the given value. // If you specify 'disabled' as hash, players with a group_id greater than or // equal to the given value will be able to log in regardless of hash (and even // if their client does not send a hash at all.) MD5_hashes: ( { group_id: group id hash: client hash }, { group_id: 0 hash: "52227DDB3342AEE9C3206FC49B22C138" }, { group_id: 98 hash: "52227DDB3342AEE9C3206FC49B22C138" }, { group_id: 99 hash: "52227DDB3342AEE9C3206FC49B22C138" }, ) } // login_configuration.permission.hash 52227DDB3342AEE9C3206FC49B22C138 is the has code from the site i give in number 1. change it on the hash code you get in your client. This will fix the packet error. And recompile your server if you modified your packets.h its not working.. still showing this [Warning]: clif_parse: Received unsupported packet (packet 0x638f (0x094b), 19 bytes received), disconnecting session #7. Quote Share this post Link to post Share on other sites
i have problem using this. I done diffing with nemo 3 packet key, and edit the packets.h and enable packet_obfuscation: 2, the server still reject me (wrong packet). i already search and follow guides in forum but still cannot solve my problem. :(
Share this post
Link to post
Share on other sites