Jump to content

Recommended Posts

Posted (edited)

HOWTO - L2 server with (transparent) proxies

DISCLAIMER: I wrote this HOWTO without really testing it (I've configured it for my server more than year ago), so if you find any mistake, feel free to comment/ask, I'll try to update this HOWTO appropriately.

Purpose of using proxies

The standard old way of setting up L2off server involves one Windows Server that is connected directly to internet and players connect directly to it's IP address. While it's enough for a small server, it may bring few problems:

  • If someone wants to DDoS your server, he just pays for some attack to your IP address. You're screwed.
  • There may be players who experience lags because route from their network to your server isn't perfect (because of bad peering between player's ISP and your datacenter etc). You can't just tell those players "Try better ISP".
  • Players from foreign countries may have good ping to datacenters in their country but not to your data center.

Some of these problems can be mitigated by using proxies for your server:

  • When someone buys DDoS attack to your login server on first proxy, you can just change IP address in your DNS and let your players login on your second proxy (you need to have domain name instead of IP address in your l2.ini).
  • When someone buys DDoS attack to your game server on first proxy, players can still play on second proxy.
  • When player has bad ping on first proxy, login will be bit slower but player can select second proxy with better ping and play on it

You can also do the same with your website, just replace ports 2106 and 7777 with 80 and 443...

What will you need

  • Some basic knowledge about L2off, Linux and networking. Also you'll have to read few manuals.
  • Linux router between your L2 server and internet, you can do it two ways (of course it must be configured to forward IPv4 traffic):
    • real physical Linux router between them
    • Linux as main operating system on your server hardware + L2 server in virtual machine (kvm-qemu).
  • Linux servers (1 core & 512 MB RAM is usually enough) for proxies
  • Copy of patched hauthd - READ INSTRUCTIONS THERE
  • Script that will be able to restart hauthd when L2 server crashes/exits

How to do it

I will use following IP networks and addresses in this example:

  • Networks:
    • Local network 10.0.0.0/24 between Linux router and Windows VM
    • Virtual network 10.0.1.0/24 between Linux router and proxies
  • Addresses:
    • 1.2.3.4 on Linux router eth0
    • 2.3.4.5 on first proxy eth0
    • 3.4.5.6 on second proxy eth0
    • 4.5.6.7 on third proxy eth0
    • 10.0.0.1 on Linux router eth1 (for physical router) or tap0 (for kvm-qemu variant)
    • 10.0.0.2 on Windows server Local network interface
    • 10.0.1.1 on Linux router tun0 (OpenVPN server 1)
    • 10.0.2.1 on Linux router tun1 (OpenVPN server 2)
    • 10.0.3.1 on Linux router tun2 (OpenVPN server 3)
    • 10.0.1.2 on first proxy tun0 (OpenVPN client)
    • 10.0.2.2 on second proxy tun0 (OpenVPN client)
    • 10.0.3.2 on third proxy tun0 (OpenVPN client)

 

Physical network:

 

l2-proxies-physical-network.png.aced8219e6456f630529db2754136d09.png

 

Logical network:

 

l2-proxies-logical-network.png.8dc15fb59fab157a254514dddca94364.png

 

Now proceed with installation and configuration:

  • ROUTER + PROXIES: Install OpenVPN
  • ROUTER: For each proxy, configure one instance of OpenVPN server with static key (it will have to run on different ports, for example 1194, 1195, 1196)
  • PROXY: Copy static key from router, configure OpenVPN client
  • WINDOWS: Make sure windows server can ping linux router (ping 10.0.0.1)
  • PROXY: Make sure proxies can ping server (ping 10.0.1.1 / ping 10.0.2.1 / ping 10.0.3.1)
  • PROXY: Setup NAT (find some way how to run it on every start!)
    iptables -t nat -A PREROUTING -m tcp -p tcp --dport 2106 -j DNAT --to-destination 10.0.0.2:2106
    iptables -t nat -A PREROUTING -m tcp -p tcp --dport 7777 -j DNAT --to-destination 10.0.0.2:7777
    
    You need this to make proxies forward traffic on ports 2106 and 7777 to windows server.
     
  • ROUTER: Setup connmark (find some way how to run it on every start! If it's physical router, use eth1 instead of tap0!):
    iptables -t mangle -A PREROUTING -i tun0 -p tcp -m tcp --dport 7777 -j CONNMARK --set-mark 100
    iptables -t mangle -A PREROUTING -i tun1 -p tcp -m tcp --dport 2106 -j CONNMARK --set-mark 101
    iptables -t mangle -A PREROUTING -i tun1 -p tcp -m tcp --dport 7777 -j CONNMARK --set-mark 101
    iptables -t mangle -A PREROUTING -i tun2 -p tcp -m tcp --dport 2106 -j CONNMARK --set-mark 101
    iptables -t mangle -A PREROUTING -i tun2 -p tcp -m tcp --dport 7777 -j CONNMARK --set-mark 101
    iptables -t mangle -i tap0 -p tcp -m tcp --sport 2106 -j CONNMARK --restore-mark
    iptables -t mangle -i tap0 -p tcp -m tcp --sport 7777 -j CONNMARK --restore-mark
    You need this to mark connections so you know where they came from.
     
  • ROUTER: Setup policy-based routing (find some way how to run it on every start!):
    ip rule add fwmark 100 table 100
    ip route add default via 10.0.1.2 table 100
    ip rule add fwmark 101 table 101
    ip route add default via 10.0.2.2 table 101
    ip rule add fwmark 102 table 102
    ip route add default via 10.0.3.2 table 102

    You need this to make packets go back through the right proxy. Otherwise you'll send those packets out via your router public interface which won't work.
     

  • WINDOWS: Setup hauthd to use multiple proxies and add servers appropriately to dbo.server table
  • WINDOWS: Make sure hauthd restarts every time L2 server restarts

 

Useful resources

 

 

Edited by eressea
  • Like 1
  • Thanks 3
  • Upvote 2
Posted

Would this work with single proxy and no router machine? I am kind of banging my head here trying to make that setup work.

 

My setup: 1 linux proxy running ppp server.

Proxy ppp0 interface with ip 192.168.0.1, windows server client with ip 192.168.0.234.

$ip in the commands is external proxy server ip.

 

iptables -t nat    -A PREROUTING         -p tcp -m multiport --dport 2106,7777        -j DNAT     --to-dest 192.168.0.234
iptables -t mangle -A PREROUTING -i eth0 -p tcp -m multiport --dport 2106,7777 -m tcp -j CONNMARK --set-mark 101
iptables -t mangle -A PREROUTING -i ppp0 -p tcp -m multiport --sport 2106,7777 -m tcp -j CONNMARK --restore-mark
ip rule add fwmark 101 table 101
ip route add default via $ip table 101

Any idea what i do wrong here?

 

This works, but server sees proxy IP as player IP:

iptables -t nat -A PREROUTING  -p tcp -m multiport --dport 2106,7777 -j DNAT       --to-dest 192.168.0.234
iptables -t nat -A POSTROUTING                                       -j MASQUERADE

 

By the way first post has some typos. Chain is missing in commands with "--restore-mark"

Posted (edited)
52 minutes ago, bit said:

Would this work with single proxy and no router machine? I am kind of banging my head here trying to make that setup work.

 

My setup: 1 linux proxy running ppp server.

Proxy ppp0 interface with ip 192.168.0.1, windows server client with ip 192.168.0.234.

$ip in the commands is external proxy server ip.

 


iptables -t nat    -A PREROUTING         -p tcp -m multiport --dport 2106,7777        -j DNAT     --to-dest 192.168.0.234
iptables -t mangle -A PREROUTING -i eth0 -p tcp -m multiport --dport 2106,7777 -m tcp -j CONNMARK --set-mark 101
iptables -t mangle -A PREROUTING -i ppp0 -p tcp -m multiport --sport 2106,7777 -m tcp -j CONNMARK --restore-mark
ip rule add fwmark 101 table 101
ip route add default via $ip table 101

Any idea what i do wrong here?

 

This works, but server sees proxy IP as player IP:


iptables -t nat -A PREROUTING  -p tcp -m multiport --dport 2106,7777 -j DNAT       --to-dest 192.168.0.234
iptables -t nat -A POSTROUTING                                       -j MASQUERADE

 

By the way first post has some typos. Chain is missing in commands with "--restore-mark"

 

You can't do it without Linux router - Windows can't do policy-based routing.

 

You would have to set default gateway on Windows Server to 192.168.0.1 and make all packets out go through it (but you would lose connectivity to it from internet, so you would have to create static route via previous default gateway to your proxy; even that would be very inconvenient because you would have to access your server only from proxy or via the proxy - because there would be no other way to it).

 

Without right default gateway your only option is to use MASQUERADE or SNAT (it's the same, masquerade just automatically assumes new source IP address) which changes sender IP address to proxy IP - that you then see on Windows server.

Edited by eressea
Posted
4 hours ago, eressea said:

HOWTO - L2 server with (transparent) proxies

DISCLAIMER: I wrote this HOWTO without really testing it (I've configured it for my server more than year ago), so if you find any mistake, feel free to comment/ask, I'll try to update this HOWTO appropriately.

Purpose of using proxies

The standard old way of setting up L2off server involves one Windows Server that is connected directly to internet and players connect directly to it's IP address. While it's enough for a small server, it may bring few problems:

  • If someone wants to DDoS your server, he just pays for some attack to your IP address. You're screwed.
  • There may be players who experience lags because route from their network to your server isn't perfect (because of bad peering between player's ISP and your datacenter etc). You can't just tell those players "Try better ISP".
  • Players from foreign countries may have good ping to datacenters in their country but not to your data center.

Some of these problems can be mitigated by using proxies for your server:

  • When someone buys DDoS attack to your login server on first proxy, you can just change IP address in your DNS and let your players login on your second proxy (you need to have domain name instead of IP address in your l2.ini).
  • When someone buys DDoS attack to your game server on first proxy, players can still play on second proxy.
  • When player has bad ping on first proxy, login will be bit slower but player can select second proxy with better ping and play on it

You can also do the same with your website, just replace ports 2106 and 7777 with 80 and 443...

What will you need

  • Some basic knowledge about L2off, Linux and networking. Also you'll have to read few manuals.
  • Linux router between your L2 server and internet, you can do it two ways (of course it must be configured to forward IPv4 traffic):
    • real physical Linux router between them
    • Linux as main operating system on your server hardware + L2 server in virtual machine (kvm-qemu).
  • Linux servers (1 core & 512 MB RAM is usually enough) for proxies
  • Copy of patched hauthd - READ INSTRUCTIONS THERE
  • Script that will be able to restart hauthd when L2 server crashes/exits

How to do it

I will use following IP networks and addresses in this example:

  • Networks:
    • Local network 10.0.0.0/24 between Linux router and Windows VM
    • Virtual network 10.0.1.0/24 between Linux router and proxies
  • Addresses:
    • 1.2.3.4 on Linux router eth0
    • 2.3.4.5 on first proxy eth0
    • 3.4.5.6 on second proxy eth0
    • 4.5.6.7 on third proxy eth0
    • 10.0.0.1 on Linux router eth1 (for physical router) or tap0 (for kvm-qemu variant)
    • 10.0.0.2 on Windows server Local network interface
    • 10.0.1.1 on Linux router tun0 (OpenVPN server 1)
    • 10.0.2.1 on Linux router tun1 (OpenVPN server 2)
    • 10.0.3.1 on Linux router tun2 (OpenVPN server 3)
    • 10.0.1.2 on first proxy tun0 (OpenVPN client)
    • 10.0.2.2 on second proxy tun0 (OpenVPN client)
    • 10.0.3.2 on third proxy tun0 (OpenVPN client)

 

Physical network:

 

l2-proxies-physical-network.png.aced8219e6456f630529db2754136d09.png

 

Logical network:

 

l2-proxies-logical-network.png.8dc15fb59fab157a254514dddca94364.png

 

Now proceed with installation and configuration:

  • ROUTER + PROXIES: Install OpenVPN
  • ROUTER: For each proxy, configure one instance of OpenVPN server with static key (it will have to run on different ports, for example 1194, 1195, 1196)
  • PROXY: Copy static key from router, configure OpenVPN client
  • WINDOWS: Make sure windows server can ping linux router (ping 10.0.0.1)
  • PROXY: Make sure proxies can ping server (ping 10.0.1.1 / ping 10.0.2.1 / ping 10.0.3.1)
  • PROXY: Setup NAT (find some way how to run it on every start!)
    
    iptables -t nat -A PREROUTING -m tcp -p tcp --dport 2106 -j DNAT --to-destination 10.0.0.2:2106
    iptables -t nat -A PREROUTING -m tcp -p tcp --dport 7777 -j DNAT --to-destination 10.0.0.2:7777
    
    You need this to make proxies forward traffic on ports 2106 and 7777 to windows server.
     
  • ROUTER: Setup connmark (find some way how to run it on every start! If it's physical router, use eth1 instead of tap0!):
    
    iptables -t mangle -A PREROUTING -i tun0 -p tcp -m tcp --dport 7777 -j CONNMARK --set-mark 100
    iptables -t mangle -A PREROUTING -i tun1 -p tcp -m tcp --dport 2106 -j CONNMARK --set-mark 101
    iptables -t mangle -A PREROUTING -i tun1 -p tcp -m tcp --dport 7777 -j CONNMARK --set-mark 101
    iptables -t mangle -A PREROUTING -i tun2 -p tcp -m tcp --dport 2106 -j CONNMARK --set-mark 101
    iptables -t mangle -A PREROUTING -i tun2 -p tcp -m tcp --dport 7777 -j CONNMARK --set-mark 101
    iptables -t mangle -i tap0 -p tcp -m tcp --sport 2106 -j CONNMARK --restore-mark
    iptables -t mangle -i tap0 -p tcp -m tcp --sport 7777 -j CONNMARK --restore-mark
    You need this to mark connections so you know where they came from.
     
  • ROUTER: Setup policy-based routing (find some way how to run it on every start!):
    
    ip rule add fwmark 100 table 100
    ip route add default via 10.0.1.2 table 100
    ip rule add fwmark 101 table 101
    ip route add default via 10.0.2.2 table 101
    ip rule add fwmark 102 table 102
    ip route add default via 10.0.3.2 table 102

    You need this to make packets go back through the right proxy. Otherwise you'll send those packets out via your router public interface which won't work.
     

  • WINDOWS: Setup hauthd to use multiple proxies and add servers appropriately to dbo.server table
  • WINDOWS: Make sure hauthd restarts every time L2 server restarts

 

Useful resources

 

 

and it's nice to have people who can teach others how to have a professional server these days, where servers do not exceed 90 days
 Deserves to be Fixed this topic

Posted (edited)

Actually i figured it out. Take a look.

 

Linux proxy server runs OpenVPN server.

OpenVPN network IP of proxy: 10.200.0.1

Windows connects to OpenVPN server, gets IP 10.200.0.10

AuthD/Server both listen on address 10.200.0.10

Do not set default gateway on windows server to 10.200.0.1 This is irrelevant. OpenVPN client does it automatically.

$ip as always - external IP of proxy server

Proxy firewall setup:

iptables        -A INPUT                 -s 10.200.0.0/24 -d 10.200.0.1                         -j ACCEPT
iptables -t nat -A POSTROUTING -o eth0   -s 10.200.0.0/24 -d 10.200.0.10                        -j SNAT --to $ip
iptables -t nat -A PREROUTING  -i eth0 ! -s 10.200.0.10   -p tcp -m multiport --dport 2106,7777 -j DNAT --to 10.200.0.10

To my surprise this setup server can see real client IP address. Also if default gateway is not set on windows everything still works and windows server can still access internet.

 

Can not try it with ppp yet because live server, but i suspect there would be no difference (except for lan IP addresses ofc).

 

Edit:

Turns out windows server indeed can not access internet. Still trying to figure out how to fix openvpn routes so internet works as well as proxied server.

 

Edit:

K i finally figured out how to make internet connection and forwarded server work as well. This is rather dirty solution but it works.

 

Key requirement is that you set default gateway to OpenVPN adapter on windows server. For some reason it is not done automatically.

Add following settings to your OpenVPN.ovpn client config file:

route-nopull
script-security 2
up-delay
up "setgw.bat"

Remove "redirect-gateway" option if you have it.

 

Create setgw.bat script in openvpn config folder with content:

start cmd /c "timeout 10 && netsh interface ipv4 set address %1 static %4 255.255.255.0 %5"

This file will sleep a bit and set default gateway to openvpn network adapter.

 

If you know better solution please share, because this one sucks.

Edited by bit
Posted
17 hours ago, bit said:

If you know better solution please share, because this one sucks.

 

How about

  • install VirtualBox (or use Hyper-V but I don't have any experience with it)
  • create virtual machine with 1 core, 512 MB RAM and 10 GB disk image
  • install Debian Stretch with just only ssh server
  • configure networking so
    • host (windows) will have no IP address set on the primary NIC
    • guest (linux) will have eth0 bridged with windows primary NIC and will have IP address that your windows server had
    • guest (linux) will have eth1 just between host and guest and set some internal address on it (10.0.0.1/24)
    • host (windows) virtual NIC (linux eth1) will have internal address in the same segment (10.0.0.2/24) and default gateway set to linux IP (10.0.0.1)

Then you would have real linux router so you can do all the stuff needed (policy-based routing). But you need to find some way how to start that VM when windows start.

  • Upvote 1
Posted (edited)

This is a great post. Thanks for taking the time to write it!

 

I would like to offer a few improvements as outlined below. This system i propose borrows heavily from my career life and experience. I've deployed and operate several of these systems and use one of my own to host professional business applications.

 

j9rnlY1.png

 

I intentionally did not provide step by step instructions on how to set this up. It is important that you actually spend the time to understand how the system works rather than blindly follow instructions. Nothing presented here is overly complex but it will likely require you to learn something new.

 

/// Resources

Online Diagram: L2 Server Hosting Environment

 

OVH Virtual Mac (Other providers offer this too!)
https://docs.ovh.com/gb/en/dedicated/network-virtual-mac/

 

MikroTik CHR
https://wiki.mikrotik.com/wiki/Manual:CHR

 

 

 

Edited by tk422
  • 5 months later...
Posted

eressea trying to replicate your exact setup. im banging my head here. sure you did not forget anything about proxy setup? you set DNAT to IP of l2server, however here on my end proxy does not know where to route such packet because l2server is on different subnet than openvpn proxies. any ideas?

Posted
11 hours ago, bit said:

eressea trying to replicate your exact setup. im banging my head here. sure you did not forget anything about proxy setup? you set DNAT to IP of l2server, however here on my end proxy does not know where to route such packet because l2server is on different subnet than openvpn proxies. any ideas?

 

Hi, the machine "Linux Router" must be in all networks and route packets between them

Posted
1 hour ago, eressea said:

 

Hi, the machine "Linux Router" must be in all networks and route packets between them

Ah right, when proxy connects to router it gets default gateway set. Well truth is im not doing 100% replica of this setup. I swapped openvpn with wireguard. Things work differently with wireguard. Now it all makes sense. Thanks!

  • 1 month later...
  • 4 months later...
Posted

I finally managed to replicate your setup almost exactly. The only difference is that i used wireguard instead of openvpn. The most notable thing in this setup is rp_filter. I was not aware of it and thus spent multiple weeks figuring it out. Anyone following these directions:

  • Do not customize AllowedIPs thinking you will tighten security - you will break packet routing.
  • Do not forget rp_filter part.
  • You do not have to run windows instance in a VM. Could simply connect windows server to same network using TunSafe client.

eressea thanks for initial guide. it was absolutely essential in making transparent proxying happen for me :)


#### Setup

+--+-------------------+------+              +----------------------------+
|  |                   |      |              |                            |
|  | VM (10.20.0.100)  <---------------------+  Proxy: 10.21.0.101 (wg21) |
|  |                   |      |              |         y.y.y.y     (eth0) |
|  +-------------------+      |              |                            |
|                             |              +----------------------------+
|  Router: 10.20.0.1 (virbr0) |
|          10.21.0.1 (wg21)   |
|          x.x.x.x   (eth0)   |
|                             |
+-----------------------------+

#### Server

 

wg21.conf

    [Interface]
    Address = 10.21.0.1/24
    Table = off
    SaveConfig = true
    ListenPort = 43832
    PrivateKey = <...>
    
    [Peer]
    PublicKey = <...>
    AllowedIPs = 0.0.0.0/0        # Required for preserving original source ip
    Endpoint = y.y.y.y:43832


iptables

    # enable forwarding
    echo 1 > /proc/sys/net/ipv4/ip_forward
    # prevent packets with original source from being dropped
    echo 0 >/proc/sys/net/ipv4/conf/all/rp_filter
    echo 1 >/proc/sys/net/ipv4/conf/eth0/rp_filter
    
    wg-quick up wg21
    
    # transparent proxying
    ip rule add fwmark 101 table 101
    ip route add default via 10.21.0.101 table 101
    iptables -t mangle -A PREROUTING -i wg21   -p tcp -m multiport --dport $gs_ports -j CONNMARK --set-mark 101
    iptables -t mangle -A PREROUTING -i virbr0 -p tcp -m multiport --sport $gs_ports -j CONNMARK --restore-mark
    
    # forwarding
    iptables -t filter -I FORWARD -i wg21 -o virbr0 -p tcp -d $gs -m multiport --dports $gs_ports -j ACCEPT
    iptables -t filter -A FORWARD -i wg21 -j ACCEPT
    iptables -t filter -A FORWARD -o wg21 -j ACCEPT

#### Proxy

wg21.conf

    [Interface]
    Address = 10.21.0.101/32
    Table = off
    SaveConfig = true
    ListenPort = 43832
    PrivateKey = <...>
    
    [Peer]
    PublicKey = <...>
    AllowedIPs = 0.0.0.0/0    # Required so that packets can reach 10.20.0.100
    Endpoint = x.x.x.x:43832

iptables

    wg-quick up wg21
    ip route add 10.20.0.100 dev wg21    # Routing to VM
    ip route add 10.21.0.0/24 dev wg21   # Routing to vlan
    
    iptables -A FORWARD -i wg21 -j ACCEPT
    iptables -A FORWARD -o wg21 -j ACCEPT
    
    # forward incoming packets to VM
    iptables -t nat -A PREROUTING  -i $eth0 -p tcp -m multiport --dport $gs_ports -j DNAT --to 10.20.0.100
    iptables -t nat -A POSTROUTING -s 10.21.0.0/24 -o eth0 -j MASQUERADE

 

  • 1 year later...
Posted

Tell me please, is it possible to set up account registration with binding to static ip, and adding ip to the white list - with the included server login function only from the white list? And enable an additional firewall, which will also filter out all ip addresses except the white list? Will this protect against possible DDoS attacks?

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Posts

    • L2 Kings    Stage 1 – The Awakening Dynasty and Moirai Level Cap: 83 Gear: Dynasty -Moirai & Weapons (Shop for Adena + Drop from mobs/instances ) Masterwork System: Available (Neolithics S required with neolithics u can do armor parts foundation aswell) Class Cloaks: Level 1 - Masterwork sets such us moirai/dynasty stats are boosted also vesper(stage 2) Olf T-Shirt: +6 (fails don’t reset) safe is +2 Dolls: Level 1 Belts: Low & Medium Enchant: Safe +3 / Max +8 / Attribution Easy in Moirai-Dynasty . Main Zones: Varka Outpost: Easy farm, Adena, EXP for new players = > 80- 100kk hour Dragon Valley: Main farm zone — , 100–120kk/hour Weapon Weakness System active (all classes can farm efficiently) Archers get vampiric auto-hits vs mobs Dragon Valley Center: Main Party Zone — boosted drops (Blessed enchants, Neolithics chance) => farm like 150-200kk per hour. Dragon Valley North: Spoil Zone (Asofe + crafting materials for MW) Primeval Isle: Safe autofarm zone (low adena for casual players) ==> 50kk per hour Forge of the Gods & Imperial Tomb: Available from Stage 1 (lower Adena reward in compare with Dragon Valley) Hellbound also avaliable from stage 1 In few words all zones opened but MAIN farm zone with boosted adena and drops is Dragon valley also has more mobs Instances: Zaken (24h Reuse) → Instead of Vespers drop Moirai , 100% chance to drop 1 of 9 dolls lvl 1, Zaken 7-Day Jewelry Raid Bosses (7 RBs): Drop Moirai Parts + Neolithic S grade instead of Vespers parts that has 7 Rb Quest give Icarus Weapons Special Feature 7rb bosses level up soul crystals aswell. Closed Areas : Monaster of SIlence, LOA, ( It wont have mobs) / Mahum Quest/Lizardmen off) Grand Epics: Unlocked on Day 4 of Stage 1 → Antharas, Valakas, Baium, AQ, etc ================================================================================= Stage 2 – Rise of Vespers Level Cap: 85 Gear: Moirai Armors (Adena GM SHOP / Craft/ Drop) Weapons: Icarus Cloaks: Level 2 Olf: +8 Dolls: Level 2 Belts: High & Top Enchant: Safe +3 / Max +8 Masterwork can be with Neolithics S84 aswell but higher so craft will be usefull aswell. 7 Raid Boss Quest Updated: Now works retail give vesper weapons 7rb Bosses Drops : Vespers Instances: Zaken : Drops to retail vespers + the dolls and the extra items that we added on stage 1 New Freya Instance: Added — drops vespers and instead of mid s84 weapons will drop vespers . Extra drops Blessed Bottle of Freya - drops 100% chance 1 of 9 dolls. Farm Areas Dragon Valley remains main farm New Zone : Lair of Antharas (mobs nerfed and added drop Noble stone so solo players can farm too) New Party Zone : LOA Circle   ============================================================================   Stage 3 – The Vorpal ERA Gear: Vorpal Unclock Cloaks: Level 3 Olf: +10 (max cap) Dolls: Level 3 Enchant: Safe +3 / Max +12 Farm Zones : Dragon Valley Center Scorpions becomes a normal solo zone (no longer party zone) Drops:   LOA & Knorik → Mid Weapons avaliable in drop New Party Zone Kariks Instances: Easy Freya Drops Mid Weapons Frintezza Release =================================================================================     Stage 4 – Elegia Era (Final Stage) Elegia Unlock Gear: Elegia Weapons: Elegia TOP s84 ( farmed via H-Freya/ Drops ) Cloaks: Level 5 Dolls: Level 3 (final bonuses) Enchant: Safe +6 / Max +16 Instances: Hard Freya → Drops Elegia Weapons + => The Instance will drop 2-3 parts for sure and also will be able to Join with 7 people . Party Zone will have also drop chances for elegia armor parts and weapons but small   Events (Hourly): Win: 50 Event Medals + 3 GCM + morewards Lose: 25 Medals + 1 GCM + more rewards Tie: 30 Medals + 2 GCM + more rewards   ================================================================================ Epic Fragments Currency Participating in Daily Bosses mass rewarding all players Participating in Instances (zaken freya frintezza etc) all players get reward ================================================================================ Adena - Main server currency (all items in gm shop require adena ) Event Medals (Festival Adena) - Event shop currency Donation coins you can buy with them dressme,cosmetics and premium account Epic Fragments you can buy with them fake epic jewels Olympiad Tokens you can buy many items from olympiad shop (Hero Coin even items that are on next stages) Olympiad Win = 1000 Tokens / Lose = 500 Tokens ================================================================================= Offline Autofarm Allows limited Offline farming requires offline autofarm ticket that you get by voting etc ================================================================================= Grand Epics have Specific Custom NPC that can spawn Epics EU/LATIN TIME ZONE ================================================================================= First Olympiad Day 19 December First Heroes 22 December ( 21 December Last day of 1st Period) After that olympiad will be weekly. ================================================================================= Item price and economy Since adena is main coin of server and NOT donation coins we will always add new items in gm shop with adena in order to burn the adena of server and not be inflation . =================================================================================        
    • Hello, I'd like to change a title color for custom npc.  I created custom NPC, cloned existing. I put unique id for it in npcname-e, npcgrp and database. I have "0" to serverSideName in db, so that it would use npcname-e, but instead it has "NoNameNPC"and no title color change.
    • Trusted Guy 100% ,  I asked him for some work and he did it right away.
  • Topics

×
×
  • Create New...

AdBlock Extension Detected!

Our website is made possible by displaying online advertisements to our members.

Please disable AdBlock browser extension first, to be able to use our community.

I've Disabled AdBlock