Page 3 of 4 FirstFirst 1234 LastLast
Results 31 to 45 of 59

Thread: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

  1. #31
    Registered User
    Join Date
    Jul 2014
    Posts
    10

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    I was going to try your XOR method but I can't seem to keep SEQ from crashing before the client finishes loading. Have you checked world and zone data for the presence of your key in any packets? They must calibrate the client somehow if it's not the same key for everybody...

  2. #32
    Registered User
    Join Date
    Jul 2014
    Posts
    6

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    I had one character that kept crashing SEQ on zone, but the other younger characters kept SEQ somewhat stable.

  3. #33
    Registered User
    Join Date
    Jul 2014
    Posts
    2

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    How's it going with the decoding? Is there a process I can follow to update the client with the key based on knowing my char name? I miss my alerts when the boats are zoning in and whatnot

  4. #34
    Registered User
    Join Date
    Jul 2014
    Posts
    10

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    So it's pretty easy to get your session key from a combination of ClientZoneEntryStruct which is in cleartext and the ServerZoneEntryStruct which contains the player name with the XOR encryption. However, if the player's name is not 10 characters long or longer you don't get the entire 10 byte key.

  5. #35
    Registered User
    Join Date
    Jul 2014
    Posts
    10

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    Also of note, between the time that the client sends the ClientZoneEntryStruct in plaintext and the server sends back CharInfoStruct, the server now sends a packet with opcode 1234 that did not exist in my older logs. The content of this opcode appears to be static, and also appears to be the last thing the server sends to the client before the encryption starts.

  6. #36
    Registered User
    Join Date
    Jul 2014
    Posts
    10

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    news flash

    the client cleartexts the key to the the server in the login packet.

    Jul 09 2014 13:51:22:888 [Decoded] [Client->Server] [Size: 464]
    [OPCode: 0x4dd0]
    [Name: OP_SendLoginInfo][Updated: 10/27/05]
    000 | 31 32 33 34 35 36 00 AB EE CD 4a FF 32 44 FF 56 | 123456.38ICZ2XYV
    016 | 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | K...............
    (values obfuscated intentionally)

    The 10 digit ascii above is the encryption key for this session, sent by client to server. It's a cyclic xor encryption like everyone suspected. They put it into the "password" field. Special thanks to another friend who is working on this as well.
    Last edited by ohhello; 08-30-2014 at 03:36 PM.

  7. #37
    Registered User
    Join Date
    Jul 2014
    Posts
    10

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    This puzzle has been solved. Perhaps not elegantly, but it works.

    here's a patch for showeq 5.2.2.0:
    http://s000.tinyupload.com/?file_id=82338680233971885187

    Be sure to do a 'make install' to copy the opcode xml changes to /usr/local/share/showeq

    I don't know if logging is still crashing the client or not but honestly once I got the skittles back I didn't care about logging anymore.

    Also as an added bonus staticspells.h has been updated with their latest version of us_spells.txt.

    Again special thanks to a buddy who helped figure out the decryption and to wanlor for pointing everybody in the right direction.
    Last edited by ohhello; 08-31-2014 at 01:09 PM.

  8. #38
    Did you SEQ today? BlueAdept's Avatar
    Join Date
    Dec 2001
    Posts
    2,033

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    Nice work. I will make a new zip when I can and put it in the file section.
    If you think we should make a new branch, I will set that up but will need someone to maintain it.
    Filters for ShowEQ can now be found here. filters-5xx-06-20-05.tar.gz

    ShowEQ file section is here. https://sourceforge.net/project/show...roup_id=10131#

    Famous Quotes:

    Ratt: WTF you talkin' about BA? (Ok.. that sounds like a bad combo of Diffrent Strokes and A-Team)

    Razzle: I showeq my wife

  9. #39
    Developer
    Join Date
    Jul 2004
    Posts
    920

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    The only real issue with the diff to me (except it is kinda noisy but whatever) is that you're keeping a list of opcodes that need to be decoded in a case statement hiding in packetstream.cpp. It would be better to either add a decode element to opcodes.xml (default to false and then add decode="true" for the ones you want decoded) or find something in the network stream that indicates the opcode needs decoding. That's probably just being nitpicky though and working is working.

    Nice job.

  10. #40
    Did you SEQ today? BlueAdept's Avatar
    Join Date
    Dec 2001
    Posts
    2,033

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    Just an FYI. I found this protocol information file. I know the solution has been found and that this is probably older than what the 1999 version is, but it might be good reading for those who want to understand what is going on.

    Code:
    Everquest Protocol Layer
    
    This is a rough draft document for the Everquest protocol used by 
    Verant Interactive.  It is a work in progress, and as such, if you 
    would like to contribute information please email me at
    [email protected].
    
    General Information
    
    The EQ layer is used over the UDP layer.  UDP is a connectionless
    protocol, and packets sent using UDP are not guaranteed to reach
    their destination.  The EQ layer adds error checking, acknowledgements,
    sequencing, and fragmentation.
    
    Header Flags Map
    
    Each packet start with a header containing various flags and sequence
    information.  The first 16 bits of each packet containes the following
    flags (broken into 4 4-bit nibbles):
    
               /=+=+=+=\/=+=+=+=\ /=+=+=+=\/=+=+=+=\
               |8|4|2|1||8|4|2|1| |8|4|2|1||8|4|2|1|
               \=+=+=+=/\=+=+=+=/ \=+=+=+=/\=+=+=+=/
    (8) SEQEnd -/ | | |  | | |                |   |
    (4) Closing --/ | |  | | |                |   |
    (2) SEQStart ---/ |  | | |                |   |
    (1) ASQ ----------/  | | |                |   |
    =============        | | |                |   |
    (8) Fragment --------/ | |                |   |
    (4) Closing -----------/ |                |   |
    (2) ARQ -----------------/                |   |
    (1) ?                                     |   |
    =============                             |   |
    (8) ?                                     |   |
    (4) ?                                     |   |
    (2) ?                                     |   |
    (1) ?                                     |   |
    =============                             |   |
    (8) ?                                     |   |
    (4) ARSP ---------------------------------/   |
    (2) ?                                         |
    (1) SpecARQ ----------------------------------/
    
    Full Packet Map
    
    The full header of each packet can be of varying sizes, depending
    on which bits are set in the Flags-word.
    
    /=======+=======+=(ARSP?)=+=(ARQ?)=\     /==========(Fragment?)=========\
    | Flags | dwSEQ | dwARSP  | dwARQ  | ... | dwFragSEQ | dwCurr | dwTotal | ...
    \= 16b =+= 16b =+== 16b ==+= 16b ==/     \=== 16b ===+= 16b ==+== 16b ==/
    
        /==(ASQ?)==+=(ASQ && ARQ?)=\     /=(!ACKSize?)=\
    ... | ASQ_high |    ASQ_low    | ... |  dwOpCode   | ...
        \=== 8b ===+===== 8b ======/     \==== 16b ====/
    
        /==(!ACKSize?)==\     /=======\
    ... |  ..(data)..   | ... | CRC32 |
        \===== ?b ======/     \= 32b =/
    
    
    Mapping Information
    
    As you can see, some header data is not present, depending on which flags
    are set.
    
    dwSEQ: Seqence number.
    
    This is always sent.  If the SEQStart bit is set, then this value
    is used as the new current sequence number.  If not, then this can
    be used to see if the packet is a resend.
    
    dwARSP: ACK Response.
    
    This is only sent if the ARSP bit is set in the Flags word.  This should
    equal the 16-bit dwARQ of the packet being responded to.
    
    dwARQ: ACK Request.
    
    This is only sent if the ARQ bit is set in the Flags word.  This 16-bit
    value should be used as the dwARSP in the packet used to respond.
    
    dwFragSEQ, dwCurr, dwTotal:  Fragmentation Information.
    
    These three 16-bit values are only set if the Fragment bit is set
    in the Flags word.  
    
    dwFragSEQ - Fragment Sequence this packet belongs to.
    dwCurr - Fragment number in this fragment sequence.
    dwTotal - Total number of fragments in this fragment sequence.
    
    ASQ_high: ?.
    
    This is only sent if the ASQ bit is set in the Flags word.  I'm still
    trying to figure out exactly what this is used for.
    
    ASQ_low: ?.
    
    This is only sent if the ASQ bit and ARQ bit are set in the Flags word.
    I'm still trying to figure out exactly what this is used for.
    
    dwOpCode: Op Code (Used for dispatching).
    
    This is only sent if the packet is not a pure acknowledgement or a
    pure request.
    
    CRC32: 32-bit CRC check.
    
    This is always sent.  It is used for error checking in tranmissions.
    See the Integrity_Task for more information.
    
    
    Pure ACKnowledgements
    
    A pure acknowledgement is sent if a ARQ is pending, but no packet is sent
    in a certain amount of time (around 0.1 seconds I think).  If a packet is
    sent out before this timeout has occured, the ARSP bit, and dwARSP is set
    to dwARQ from the requesting packet.  If no packets are sent out before
    the timeout occurs, then a pure acknowledgement packet is sent with only
    ARSP and dwARSP (no OpCode or data).
    
    Pure Requests
    
    A pure request seems to be used as a sort of 'ping' to see if the other
    side of the connection is still there.  In this case, ARQ, dwARQ, and 
    SpecARQ are set.  When SpecARQ is set, this requests that a reponse
    be sent immediately, without waiting for a timeout.
    
    
    Packet Resends
    
    If an ARQ is sent, then a ARSP is expected to be received in a certain
    amount of time (again not sure but I think its 0.1 seconds or so).  If
    no ARSP is receive when the timeout occurs, the packet is resent.
    
    
    Example Session
    
    Here is an example of a session between the client and the login server.
    
    (1) Client requests version information.
    23:57:05.755261 client.1538 > server.10002: 14
    0x0000   3200 0000 09b5 0100 5900 a361 6da7             2.......Y..am.
    
    Flags set:
    SEQStart - This is the start of the client sequence.
    ASQ - Not quite sure yet.
    ARQ - The client is request the client acknowledgement receipt of packet.
    
    Header Data:
    dwSEQ - 0x0000: The client is starting its sequence at 0x0000.
    dwARQ - 0x09bd: Use this word as dwARSP when responding.
    ASQ_high - 0x01: Not sure.
    ASQ_low - 0x00: Not sure.
    OpCode - 0x5900: Request Version.
    CRC32 - 0xa3616da7: Used to check for errors in transmission.
    
    (2) Server sends version information.
    23:57:05.756179 server.10002 > client.1538: 32
    0x0000   3204 0000 09bd 339a 0100 5900 322d 3234        2.....3...Y.2-24
    0x0010   2d32 3030 3120 3133 3a31 3700 5bee b95a        -2001.13:17.[..Z
    
    Flags set:
    SEQStart - This is the start of the server sequence.
    ASQ - Not sure.
    ARQ - The server is requesting ACK.
    ARSP - This is a response to an ARQ sent by the client.
    
    Header Data:
    dwSEQ - 0x0000: The server is starting its sequence at 0x0000.
    dwARSP - 0x09bd: Respond to ARQ 0x09bd.
    dwARQ - 0x339a: Use this word as dwARSP when responding.
    ASQ_high - 0x01: Not sure.
    ASQ_low - 0x00: Not sure.
    OpCode - 0x5900: Send Version.
    CRC32 - 0x5beeb95a: CRC check.
    
    Data:
    This sends a null terminated string: "2-24-2001.13:17" as its version.
    
    
    (3) Client sends login info.
    23:57:05.842104 client.1538 > server.10002: 61
    0x0000   1204 0001 339a 09be 0101 0100 4669 7a62        ....3..$....Fizb
    0x0010   616e 3100 1db5 28f1 02a5 cde2 a513 23da        an1...X2..b.V..!
    0x0020   19d5 5dae b12d e6af e53b ed50 6e6f 6e65        ...O.,...e..none
    0x0030   0000 0000 0000 0000 00e4 a6e1 e2               ...........m.
    
    Flags set:
    ASQ - Not sure.
    ARQ - ACK Request.
    ARSP - ACK Response.
    
    Header Data:
    dwSEQ - 0x0001: This is seqence number 0x0001 from the client.
                    Upon receiving, ignore any further packets <= dwSEQ.
    dwARSP - 0x339a: Response to ARQ 0x339a.
    dwARQ - 0x09be: Use this for responding.
    ASQ_high - 0x01: Not sure.
    ASQ_low - 0x01: Not sure.
    dwOpCode - 0x0100: Send Login Info.
    CRC32 - 0xe4a6e1e2: CRC Check.
    
    Data:
    The first thing sent is a null terminated username ("Fizban1" in this case).
    After that, a 24-byte password hash is sent.  The rest of the packet
    doesn't seem to change between logins (not sure what 'none' is for).
    
    (4) Server sends session id.
    23:57:05.84957 server.10002 > client.1538: 33
    0x0010   1204 0001 09be 339b 0101 0400 3132 3334        ......3.....1234
    0x0020   3536 3738 3900 756e 7573 6564 00b9 85f1        56789.unused....
    0x0030   98                                             .
    
    Flags set:
    ASQ - Not sure.
    ARQ - ACK Request.
    ARSP - ACK Response.
    
    Header data:
    dwSEQ - 0x0001: This is seqence number 0x0001 from the server.
                    Upon receiving, ignore any further packets <= dwSEQ.
    dwARSP - 0x09be: Response to ARQ 0x09be.
    dwARQ - 0x339b: Use this for responding.
    ASQ_high - 0x01: Not sure.
    ASQ_low - 0x01: Not sure.
    dwOpCode - 0x0400: Send Login Info.
    CRC32 - 0xb985f1: CRC Check.
    
    Data:
    The first thing sent is a string which contains the session id.
    In this case it is "123456789".  The string 'unused' is always
    sent, it seems.
    
    
    (5) Client sends pure acknowledement.
    23:57:06.293296 client.1552 > xylor.10002: 10
    0x0000   0004 0002 339b d470 fcf1                       ....3..p..
    
    Flags set:
    ARSP - This is only a response to an ARQ.
    
    Header Data:
    dwSEQ - 0x0002: This is client sequence number 0x0002.
    dwARSP - 0x339b: This is a response to ARQ 0x339b.
    CRC32 - 0xd470fcf1: CRC Check.
    
    dwARSP - 0x339a: Response to ARQ 0x339a.
    dwARQ - 0x09be: Use this for responding.
    
    
    (6) Client requests update.
    23:57:06.578329 client.1552 > xylor.10002: 14
    0x0000   1200 0003 09bf 0102 5200 2346 be93             ........R.#F..
    
    Flags set:
    ASQ - Not sure.
    ARQ - ACK Request.
    
    Header Data:
    dwSEQ - 0x0003: This is client sequence number 0x0003.
    dwARQ - 0x09bf: Use this for responding.
    ASQ_high - 0x01: Not sure.
    ASQ_low - 0x02: Not sure.
    dwOpCode - 0x5200: Request update.
    CRC32 - 0x2346be93: CRC Check.
    
    Data:
    N/A
    
    (7) Client requests server list.
    23:57:06.578861 client.1552 > xylor.10002: 18
    0x0000   1200 0004 09c0 0103 4600 0000 0000 365f        ........F.....6_
    0x0010   e8ce                                           ..
    
    Flags set:
    ASQ - Not Sure.
    ARQ - ACK Request.
    
    Header Data:
    dwSEQ - 0x0004: This is client sequence number 0x0004.
    dwARQ - 0x09bf: Use this for responding.
    ASQ_high - 0x01: Not sure.
    ASQ_low - 0x02: Not sure.
    dwOpCode - 0x4600: Request server list.
    CRC32 - 0x365fe8ce: CRC Check.
    
    Data:
    Not sure.
    
    
    (8) Server sends update.
    23:57:06.586646 xylor.10002 > client.1552: 47
    0x0000   1204 0002 09bf 339c 0102 5200 0100 0000        ......3...R.....
    0x0010   4f70 656e 5175 6573 7420 456d 756c 6174        OpenQuest.Emulat
    0x0020   6f72 202d 2058 796c 6f72 0076 07fb 58          or.-.Xylor.v..X
    
    Flags set:
    ASQ - Not sure.
    ARQ - ACK Request.
    ARSP - ACK Response.
    
    Header Data:
    dwSEQ - Server sequence number 0x0002.
    dwARSP - Responding to ARQ 0x09bf.
    dwARQ - Use this for responding.
    ASQ_high - 0x01: Not sure.
    ASQ_low - 0x02: Not sure.
    dwOpCodes - 0x5200: Send update.
    CRC32 - 0x7607fb58: CRC Check.
    
    Data:
    First 32-bits seems to be flags of some sort.  After that is a 
    null terminated Banner that is shown on the server selection screen.
    
    (9) Server sends server list.
    23:57:06.587935 xylor.10002 > client.1552: 63
    0x0000   1204 0003 09c0 339d 0103 4600 0100 0000        ......3...F.....
    0x0010   4f70 656e 5175 6573 7420 5465 7374 2057        OpenQuest.Test.W
    0x0020   6f72 6c64 006f 7065 6e71 7565 7374 2e64        orld.openquest.d
    0x0030   6873 2e6f 7267 00e8 0300 007f 93b9 cd          hs.org.........
    
    Flags set:
    ASQ - Not sure.
    ARQ - ACK Request.
    ARSP - ACK Response.
    
    Header Data:
    dwSEQ - 0x0003: Server sequence number 0x0003.
    dwARSP - 0x09c0: Reponding to ARQ number 0x09c0.
    dwARQ - 0x339d: Use this for responding.
    ASQ_high - 0x01: Not sure.
    ASQ_low - 0x03: Not sure.
    dwOpCode - 0x4600: Send server list.
    CRC32 - 0x7f93b9cd: CRC Check.
    
    Data:
    A list of servers to list on the selection screen.  The chat server
    also seems to be sent in this packet.  The format seems to be
    32-bits first (number of people on server?), null terminated 
    server-name string, null terminated hostname, and 32-bit value (flags?).
    
    (10) Client sends pure acknowledement.
    23:57:06.633771 client.1552 > xylor.10002: 10
    0x0000   0004 0005 339d 385c 4f41                       ....3.8\OA
    
    Flags set:
    ARSP - ACK Response only.
    
    Header data:
    dwSEQ - Client sequence number 0x0005.
    dwARSP - Responding to ARQ 0x339d.
    CRC32 - 0x385c4f41: CRC Check.
    
    Data:
    N/A
    Filters for ShowEQ can now be found here. filters-5xx-06-20-05.tar.gz

    ShowEQ file section is here. https://sourceforge.net/project/show...roup_id=10131#

    Famous Quotes:

    Ratt: WTF you talkin' about BA? (Ok.. that sounds like a bad combo of Diffrent Strokes and A-Team)

    Razzle: I showeq my wife

  11. #41
    Developer
    Join Date
    Jul 2004
    Posts
    920

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    That's the original protocol BA. Too old.

  12. #42
    Did you SEQ today? BlueAdept's Avatar
    Join Date
    Dec 2001
    Posts
    2,033

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    Ahh.. Well I wasn't sure. I was hoping it might be of some help. C'est la vie.
    Filters for ShowEQ can now be found here. filters-5xx-06-20-05.tar.gz

    ShowEQ file section is here. https://sourceforge.net/project/show...roup_id=10131#

    Famous Quotes:

    Ratt: WTF you talkin' about BA? (Ok.. that sounds like a bad combo of Diffrent Strokes and A-Team)

    Razzle: I showeq my wife

  13. #43
    Did you SEQ today? BlueAdept's Avatar
    Join Date
    Dec 2001
    Posts
    2,033

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    I start vacation at the end of the day. I should have some time to update the file section with the patch for 1999 in the next day or 2.
    Filters for ShowEQ can now be found here. filters-5xx-06-20-05.tar.gz

    ShowEQ file section is here. https://sourceforge.net/project/show...roup_id=10131#

    Famous Quotes:

    Ratt: WTF you talkin' about BA? (Ok.. that sounds like a bad combo of Diffrent Strokes and A-Team)

    Razzle: I showeq my wife

  14. #44
    Registered User
    Join Date
    Jul 2014
    Posts
    10

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    i worked around the other crash bugs ive run into, which includes logging and exp-based crashes. I also fixed the exp window so it will calculate exp/hour and such. I started adding in support to specify the key at the command line for starting a session without logging all the way out but that was back burner.

    putting the opcodes to decrypt into the xml makes good sense, perhaps ill look into it down the road.


    http://pastebin.com/raw.php?i=5EfBiFuH

    (note, this would be applied after the previous one)
    Last edited by ohhello; 09-15-2014 at 09:33 PM.

  15. #45
    Registered User
    Join Date
    Oct 2011
    Posts
    12

    Re: Looking for ShowEQ update for Project 1999 after v33 6/25 patch

    Thanks for continuing to work on this! I am having an issue with this last patch, any ideas?

    patching file src/interface.cpppatching file src/main.cpp
    patching file src/packetstream.cpp
    patch: **** malformed patch at line 73: diff --git a/src/player.cpp b/src/player.cpp

    Line 73 looks to be the start of your exp changes.

    Ive tried applying with fresh 5.2.2 src after applying your previous patch (and before), with no luck.

    Thanks again.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

You may post new threads
You may post replies
You may post attachments
You may edit your posts
HTML code is Off
vB code is On
Smilies are On
[IMG] code is On