Jump to content

Recommended Posts

Posted

last night it was perfectly, now i'm getting verify fail.. i can't understand why everybody is getting the same.. haha Master answer pls :B

 

 

Edit:

maybe helps

most of user are getting this same error:

 

http://img573.imageshack.us/img573/9508/verifyfail.jpg

 

i'm getting exactly the same, someone know a solution? or Master, reply please!!!

Posted

i have the same problem too..

4 days was working fine  and now its says VERIFY FAIL...

i did the guide step by step 5 times..

i did everything right but nothing...

masterwalker help us!!! we are addicted to l2walker!! :)

Posted

same problem here on retail.

verify fail. but authentication done....

we need new ip for WAby probably , but what else changed with no disable gameguard

Posted

lo primero es copiar el nuevo host que les voy a dejar aca abajo

 

60.190.219.211 vip.towalker.com

60.190.219.211 vip1.towalker.com

60.190.219.211 vip2.towalker.com

60.190.219.211 vip3.towalker.com

60.190.219.211 vip4.towalker.com

60.190.219.211 vip5.towalker.com

60.190.219.211 vip6.towalker.com

60.190.219.211 vip7.towalker.com

 

el 2do paso es copiar lo que les voy a dejar abajo en el archivo set

[Verify]

VerifyIP=60.190.217.137

 

les voy a dejar un set de muestra para que vean mas o menos como queda es para gracia epilogue

 

[LANGUAGE]

Language=enUS.lng

[DEFAULT]

CountryList=Servidor;

DefaultCountry=0

DefaultServer=-2

DefaultCharacter=0

DefaultAccount=123456

DefaultPassWord=

[servidor]

LoginServerIP=127.0.0.1

LoginServerPort=2106

ProtocolVersion=152

ServerList=[1]Bartz;[2]Devianne;

LoginServerIPLPM=IP DEL SERVIDOR QUE JUEGAN

LoginServerPortLPM=2106

ProtocolVersionSys=152

[Verify]

VerifyIP=60.190.217.137

 

pd: espero que les sirva la info

 

Guest
This topic is now closed to further replies.



  • Posts

    • I open the l2j server and see 1. XOR->NewCrypt.encXORPass(raw, offset, size, Rnd.nextInt()); ---> xor everything is clear 2. _staticCrypt.crypt(raw, offset, size); -----> private void encryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) { int xl = bytesTo32bits(src, srcIndex); int xr = bytesTo32bits(src, srcIndex + 4); xl ^= P[0]; for (int i = 1; i < ROUNDS; i += 2) { xr ^= func(xl) ^ P[i]; xl ^= func(xr) ^ P[i + 1]; } xr ^= P[ROUNDS + 1]; bits32ToBytes(xr, dst, dstIndex); bits32ToBytes(xl, dst, dstIndex + 4); }   I scroll down the code and see this code   ----->>> /**      * Decrypt the given input starting at the given offset and place the result in the provided buffer starting at the given offset. The input will be an exact multiple of our blocksize.      * @param src      * @param srcIndex      * @param dst      * @param dstIndex      */     private void decryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex)     {         int xl = bytesTo32bits(src, srcIndex);         int xr = bytesTo32bits(src, srcIndex + 4);         xl ^= P[ROUNDS + 1];         for (int i = ROUNDS; i > 0; i -= 2)         {             xr ^= func(xl) ^ P[i];             xl ^= func(xr) ^ P[i - 1];         }         xr ^= P[0];         bits32ToBytes(xr, dst, dstIndex);         bits32ToBytes(xl, dst, dstIndex + 4);     }   ===================================================   I'm transferring this code to C# private void decryptBlock(byte[] src, uint srcIndex, byte[] dst, uint dstIndex)    {        uint xl = BytesTo32bits(src, srcIndex);        uint xr = BytesTo32bits(src, srcIndex + 4);        xl ^= P[ROUNDS + 1];        for (int i = ROUNDS; i > 0; i -= 2)        {            xr ^= F(xl) ^ P[i];            xl ^= F(xr) ^ P[i - 1];        }        xr ^= P[0];        Bits32ToBytes(xr, dst, dstIndex);        Bits32ToBytes(xl, dst, dstIndex + 4);    }   And in c# I first do decryptBlock and then XOR and everything works, I get the package and the first 2 bytes have already been removed as far as I remember   This only works for the login server for the game server, I think it’s not much different  
    • Ask him what you know, and what I know hahaha.
    • https://prnt.sc/2G_hOHfUIGLM   not sure what you mean Teddy boi  
    • Hello first of all thank you for your prompt response and the time you are taking to read this and answer, I am aware that not everyone takes the time and for that I thank you. On the other hand the specific problem is when decrypting this package and being able to parse it,  In some places it says that it is only encrypted with xor, in others that only a static blowfish is used and in others that both are used in the order of xor and then blowfish, this is the problem in spite of being able to see the encryption mechanisms of the servers, I can not put together the function that reverses this encryption to obtain the keys sent by the init packet.   Thanks for your time, hopefully the rest can contribute something because it is a super useful module to extend any functionality to the client and I will publish it in an opensource way when it is finished.
  • Topics

×
×
  • Create New...