Openkore.com

OpenKore Forums
It is currently 22 Jul 2014, 17:51

All times are UTC - 5 hours [ DST ]





Post new topic Reply to topic  [ 17 posts ]  Go to page Previous  1, 2
Author Message
 Post subject: Re: RO Renewal
PostPosted: 07 Aug 2008, 11:21 
Offline
Perl Monk
Perl Monk

Joined: 04 Apr 2008, 17:26
Posts: 797
Because that's a stupid idea? Let me just go download a gig of Elecom-enabled RO client just to try it out.

_________________
dual 4/3 triple twisted kanthal @ .24Ω, 73.5W


Top
 Profile  
 
 Post subject: Re: RO Renewal
PostPosted: 07 Aug 2008, 19:41 
Offline
Developers
Developers

Joined: 04 Apr 2008, 13:33
Posts: 157
sli wrote:
Because that's a stupid idea? Let me just go download a gig of Elecom-enabled RO client just to try it out.
You just need to download a 3-4mb file, like any other pserver.

Elecom shield injects itself in to to the client through a loader. You run the loader, the loader checks for existing clients, and then the loader launches the RO client and injects a dll. The dll then intercepts loadlibrary/getprocaddress/recv/send/connect calls. It encrypts packets, and probably communicates with the server through elecom specific packets. Its encryption functions are fairly long, and it's possible it doesn't call ws2_32's send/recv but instead uses a custom send/recv function (pure speculation, because that's how I'd have done it had I gone through the trouble of doing what the elecom person did). This is all from a <1hr glance at an elecom shield enabled client.

It would be easy to add support, but then you could potentially get in to an update war. Which is fine, but the people updating anti cheats have a slight advantage because they can ban users.

_________________
Oh no.


Top
 Profile  
 
 Post subject: Re: RO Renewal
PostPosted: 07 Aug 2008, 20:37 
Offline
Perl Monk
Perl Monk

Joined: 04 Apr 2008, 17:26
Posts: 797
I always boycott servers that use any method to prevent users from playing how they wish. I mean servers that use any method to screw their players out of having their own fun. I mean servers that use any method to prevent modification of anything. So I have no idea how most of them are actually implemented.

_________________
dual 4/3 triple twisted kanthal @ .24Ω, 73.5W


Top
 Profile  
 
 Post subject: Re: RO Renewal
PostPosted: 02 Nov 2008, 05:58 
Offline
Noob
Noob

Joined: 09 Apr 2008, 14:32
Posts: 10
the kid just ask you to try out how does elecom shield prevent them to by pass through the server >_>

is that clear? >_>


Top
 Profile  
 
 Post subject: Re: RO Renewal
PostPosted: 02 Nov 2008, 14:42 
Offline
Perl Monk
Perl Monk

Joined: 04 Apr 2008, 17:26
Posts: 797
So I have to fucking spell it out?

I DON'T FUCKING HAVE AN RO CLIENT.

And I'm not wasting my time downloading one. Jesus.

_________________
dual 4/3 triple twisted kanthal @ .24Ω, 73.5W


Top
 Profile  
 
 Post subject: Re: RO Renewal
PostPosted: 02 Nov 2008, 18:28 
Offline
Noob
Noob

Joined: 09 Apr 2008, 14:32
Posts: 10
sli wrote:
So I have to fucking spell it out?

I DON'T FUCKING HAVE AN RO CLIENT.

And I'm not wasting my time downloading one. Jesus.


Crap. >_>

nope. you don't have to fucking with your self to spell it out man >_>

cool man ~_~


Last edited by MrDracula on 06 Apr 2013, 06:59, edited 1 time in total.

Top
 Profile  
 
 Post subject: Re: RO Renewal
PostPosted: 03 Nov 2008, 12:33 
Offline
Perl Monk
Perl Monk

Joined: 04 Apr 2008, 17:26
Posts: 797
Yeah, that post made sense. This isn't much different than telling someone to use Linux when they ask about anti-virus software for Windows, which isn't a solution.

It would be much easier to just troll the eAthena boards for Elecom information than to simply try and play with an Elecom-injected client. Configuration information would be much more helpful (it has to be somewhere). It's not really in my interest to try and crack Elecom, nor have I made the claim that I could if I tried. I'm also not saying it would be terribly difficult to emulate, I imagine it's just shifting key pairs around because there really isn't a good way for Elecom to prevent you from running OpenKore. If the guy who created it (can't remember his name) knows anything, he didn't use a common encryption algo, but chances are he did. I haven't been able to find any information about that. Keep in mind that last encryption that was cracked wasn't actually cracked: it was just emulated with a plugin, and it was just Blowfish.

_________________
dual 4/3 triple twisted kanthal @ .24Ω, 73.5W


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 17 posts ]  Go to page Previous  1, 2

All times are UTC - 5 hours [ DST ]


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
[ Time : 0.042s | 14 Queries | GZIP : On ]