New updates in kRo make openkore not to work. plz help me

Forum closed. All further discussion to be discussed at https://github.com/OpenKore/

Moderators: Moderators, Developers

Message
Author
rlxkzard
Noob
Noob
Posts: 5
Joined: 17 Jul 2010, 15:24
Noob?: Yes

New updates in kRo make openkore not to work. plz help me

#1 Post by rlxkzard »

10 Aug 2010, there was new update in korea, kRo
after this, it's been changed to login and start style to execute Ragnarok.
it need to login at web-site to play Rag, i mean Ragnarok official page and then the start link-image on web-site will make it run.
so, openkore doesn't work anymore and I need some help to work openkore again.
plz reference the file attached, error.txt
and please let me know how I am able to fix it~ thanks
Attachments
errors.txt
(613 Bytes) Downloaded 344 times

Technology
Super Moderators
Super Moderators
Posts: 801
Joined: 06 May 2008, 12:47
Noob?: No

Re: New updates in kRo make openkore not to work. plz help me

#2 Post by Technology »

the bug in your errors.txt was fixed

this new log in thing seems nasty tho... mind giving a detailed explanation?
One ST0 to rule them all? One PE viewer to find them!
One ST_kRO to bring them all and in the darkness bind them...

Mount Doom awaits us, fellowship of OpenKore!

User avatar
kLabMouse
Administrator
Administrator
Posts: 1301
Joined: 24 Apr 2008, 12:02

Re: New updates in kRo make openkore not to work. plz help me

#3 Post by kLabMouse »

OK. They Added OTP (One Time Password) and SSO (Donno what it is)

Code: Select all

// packet: 0x821
struct PACKET_AC_OTP_USER {
  /* this+0x0 */ short PacketType
}

// packet: 0x822
struct PACKET_CA_OTP_AUTH_REQ {
  /* this+0x0 */ short PacketType
  /* this+0x2 */ char OTPCode[7]
}

// ***************************** TODO *****************************
// packet: 0x823
struct PACKET_AC_OTP_AUTH_ACK {
  /* this+0x0 */ short PacketType
  /* this+0x2 */ unsigned short PacketLength
  /* this+0x4 */ unsigned short LoginResult
}
 
// ***************************** TODO *****************************
// packet: 0x825
struct PACKET_CA_SSO_LOGIN_REQ {
  /* this+0x0 */ short PacketType
  /* this+0x2 */ unsigned short PacketLength
}

// ***************************** TODO *****************************
// packet: 0x826
// len: 4
struct PACKET_AC_SSO_LOGIN_ACK {
  /* this+0x0 */ short PacketType
  /* this+0x2 */ short Result
} 

// packet: 0x83e
// len: 26
struct PACKET_AC_REFUSE_LOGIN_R2 {
  /* this+0x0 */ short PacketType
  /* this+0x2 */ unsigned int ErrorCode {
    REFUSE_INVALID_ID =  0x0,
    REFUSE_INVALID_PASSWD =  0x1,
    REFUSE_ID_EXPIRED =  0x2,
    ACCEPT_ID_PASSWD =  0x3,
    REFUSE_NOT_CONFIRMED =  0x4,
    REFUSE_INVALID_VERSION =  0x5,
    REFUSE_BLOCK_TEMPORARY =  0x6,
    REFUSE_BILLING_NOT_READY =  0x7,
    REFUSE_NONSAKRAY_ID_BLOCKED =  0x8,
    REFUSE_BAN_BY_DBA =  0x9,
    REFUSE_EMAIL_NOT_CONFIRMED =  0xa,
    REFUSE_BAN_BY_GM =  0xb,
    REFUSE_TEMP_BAN_FOR_DBWORK =  0xc,
    REFUSE_SELF_LOCK =  0xd,
    REFUSE_NOT_PERMITTED_GROUP =  0xe,
    REFUSE_WAIT_FOR_SAKRAY_ACTIVE =  0xf,
    REFUSE_NOT_CHANGED_PASSWD =  0x10,
    REFUSE_BLOCK_INVALID =  0x11,
    REFUSE_WARNING =  0x12,
    REFUSE_NOT_OTP_USER_INFO =  0x13,
    REFUSE_OTP_AUTH_FAILED =  0x14,
    REFUSE_SSO_AUTH_FAILED =  0x15,
    REFUSE_NOT_ALLOWED_IP_ON_TESTING =  0x16,
    REFUSE_OVER_BANDWIDTH =  0x17,
    REFUSE_OVER_USERLIMIT =  0x18,
    REFUSE_UNDER_RESTRICTION =  0x19,
    REFUSE_BY_OUTER_SERVER =  0x1a,
    REFUSE_BY_UNIQUESERVER_CONNECTION =  0x1b,
    REFUSE_BY_AUTHSERVER_CONNECTION =  0x1c,
    REFUSE_BY_BILLSERVER_CONNECTION =  0x1d,
    REFUSE_BY_AUTH_WAITING =  0x1e,
    REFUSE_DELETED_ACCOUNT =  0x63,
    REFUSE_ALREADY_CONNECT =  0x64,
    REFUSE_TEMP_BAN_HACKING_INVESTIGATION =  0x65,
    REFUSE_TEMP_BAN_BUG_INVESTIGATION =  0x66,
    REFUSE_TEMP_BAN_DELETING_CHAR =  0x67,
    REFUSE_TEMP_BAN_DELETING_SPOUSE_CHAR =  0x68,
    REFUSE_USER_PHONE_BLOCK =  0x69,
    ACCEPT_LOGIN_USER_PHONE_BLOCK =  0x6a,
    ACCEPT_LOGIN_CHILD =  0x6b,
    REFUSE_IS_NOT_FREEUSER =  0x6c,
    REFUSE_INVALID_ONETIMELIMIT =  0x6d,
    REFUSE_NOT_CHANGE_ACCOUNTID =  0xf0,
    REFUSE_NOT_CHANGE_CHARACTERID =  0xf1,
    REFUSE_SSO_INVALID_TOKEN =  0x1393,
    REFUSE_SSO_BLOCK_USER =  0x1394,
    REFUSE_SSO_GAME_APPLY =  0x1395,
    REFUSE_SSO_INVALID_GAMENUM =  0x1396,
    REFUSE_SSO_INVALID_USER =  0x1397,
    REFUSE_SSO_OTHERS =  0x1398,
    REFUSE_SSO_INVALID_AGE =  0x1399,
  };
  /* this+0x6 */ char blockDate[20]
} 
The Client lunch like this:
RagexeRE.exe -t:AAAAAAAAA BBBBBBBB Event -1rag1
RagexeRE.exe -t:AAAAAAAAA BBBBBBBB NonPayRag -2rag2
each or new params could be max 500 char len.

Technology
Super Moderators
Super Moderators
Posts: 801
Joined: 06 May 2008, 12:47
Noob?: No

Re: New updates in kRo make openkore not to work. plz help me

#4 Post by Technology »

SSO (single sign on)
One ST0 to rule them all? One PE viewer to find them!
One ST_kRO to bring them all and in the darkness bind them...

Mount Doom awaits us, fellowship of OpenKore!

rlxkzard
Noob
Noob
Posts: 5
Joined: 17 Jul 2010, 15:24
Noob?: Yes

Re: New updates in kRo make openkore not to work. plz help me

#5 Post by rlxkzard »

kLabMouse wrote:OK. They Added OTP (One Time Password) and SSO (Donno what it is)

Code: Select all

// packet: 0x821
struct PACKET_AC_OTP_USER {
  /* this+0x0 */ short PacketType
}

// packet: 0x822
struct PACKET_CA_OTP_AUTH_REQ {
  /* this+0x0 */ short PacketType
  /* this+0x2 */ char OTPCode[7]
}

// ***************************** TODO *****************************
// packet: 0x823
struct PACKET_AC_OTP_AUTH_ACK {
  /* this+0x0 */ short PacketType
  /* this+0x2 */ unsigned short PacketLength
  /* this+0x4 */ unsigned short LoginResult
}
 
// ***************************** TODO *****************************
// packet: 0x825
struct PACKET_CA_SSO_LOGIN_REQ {
  /* this+0x0 */ short PacketType
  /* this+0x2 */ unsigned short PacketLength
}

// ***************************** TODO *****************************
// packet: 0x826
// len: 4
struct PACKET_AC_SSO_LOGIN_ACK {
  /* this+0x0 */ short PacketType
  /* this+0x2 */ short Result
} 

// packet: 0x83e
// len: 26
struct PACKET_AC_REFUSE_LOGIN_R2 {
  /* this+0x0 */ short PacketType
  /* this+0x2 */ unsigned int ErrorCode {
    REFUSE_INVALID_ID =  0x0,
    REFUSE_INVALID_PASSWD =  0x1,
    REFUSE_ID_EXPIRED =  0x2,
    ACCEPT_ID_PASSWD =  0x3,
    REFUSE_NOT_CONFIRMED =  0x4,
    REFUSE_INVALID_VERSION =  0x5,
    REFUSE_BLOCK_TEMPORARY =  0x6,
    REFUSE_BILLING_NOT_READY =  0x7,
    REFUSE_NONSAKRAY_ID_BLOCKED =  0x8,
    REFUSE_BAN_BY_DBA =  0x9,
    REFUSE_EMAIL_NOT_CONFIRMED =  0xa,
    REFUSE_BAN_BY_GM =  0xb,
    REFUSE_TEMP_BAN_FOR_DBWORK =  0xc,
    REFUSE_SELF_LOCK =  0xd,
    REFUSE_NOT_PERMITTED_GROUP =  0xe,
    REFUSE_WAIT_FOR_SAKRAY_ACTIVE =  0xf,
    REFUSE_NOT_CHANGED_PASSWD =  0x10,
    REFUSE_BLOCK_INVALID =  0x11,
    REFUSE_WARNING =  0x12,
    REFUSE_NOT_OTP_USER_INFO =  0x13,
    REFUSE_OTP_AUTH_FAILED =  0x14,
    REFUSE_SSO_AUTH_FAILED =  0x15,
    REFUSE_NOT_ALLOWED_IP_ON_TESTING =  0x16,
    REFUSE_OVER_BANDWIDTH =  0x17,
    REFUSE_OVER_USERLIMIT =  0x18,
    REFUSE_UNDER_RESTRICTION =  0x19,
    REFUSE_BY_OUTER_SERVER =  0x1a,
    REFUSE_BY_UNIQUESERVER_CONNECTION =  0x1b,
    REFUSE_BY_AUTHSERVER_CONNECTION =  0x1c,
    REFUSE_BY_BILLSERVER_CONNECTION =  0x1d,
    REFUSE_BY_AUTH_WAITING =  0x1e,
    REFUSE_DELETED_ACCOUNT =  0x63,
    REFUSE_ALREADY_CONNECT =  0x64,
    REFUSE_TEMP_BAN_HACKING_INVESTIGATION =  0x65,
    REFUSE_TEMP_BAN_BUG_INVESTIGATION =  0x66,
    REFUSE_TEMP_BAN_DELETING_CHAR =  0x67,
    REFUSE_TEMP_BAN_DELETING_SPOUSE_CHAR =  0x68,
    REFUSE_USER_PHONE_BLOCK =  0x69,
    ACCEPT_LOGIN_USER_PHONE_BLOCK =  0x6a,
    ACCEPT_LOGIN_CHILD =  0x6b,
    REFUSE_IS_NOT_FREEUSER =  0x6c,
    REFUSE_INVALID_ONETIMELIMIT =  0x6d,
    REFUSE_NOT_CHANGE_ACCOUNTID =  0xf0,
    REFUSE_NOT_CHANGE_CHARACTERID =  0xf1,
    REFUSE_SSO_INVALID_TOKEN =  0x1393,
    REFUSE_SSO_BLOCK_USER =  0x1394,
    REFUSE_SSO_GAME_APPLY =  0x1395,
    REFUSE_SSO_INVALID_GAMENUM =  0x1396,
    REFUSE_SSO_INVALID_USER =  0x1397,
    REFUSE_SSO_OTHERS =  0x1398,
    REFUSE_SSO_INVALID_AGE =  0x1399,
  };
  /* this+0x6 */ char blockDate[20]
} 
The Client lunch like this:
RagexeRE.exe -t:AAAAAAAAA BBBBBBBB Event -1rag1
RagexeRE.exe -t:AAAAAAAAA BBBBBBBB NonPayRag -2rag2
each or new params could be max 500 char len.
--------------------------------------------------------
what is the params AAAA~ BBB~ above?
cound u let me know what they mean? are they my Id and password???
I'm not good at coding , just be able to simple macros only.
plz reply~ thanks

User avatar
kLabMouse
Administrator
Administrator
Posts: 1301
Joined: 24 Apr 2008, 12:02

Re: New updates in kRo make openkore not to work. plz help me

#6 Post by kLabMouse »

rlxkzard wrote: what is the params AAAA~ BBB~ above?
cound u let me know what they mean? are they my Id and password???
I'm not good at coding , just be able to simple macros only.
plz reply~ thanks
AAAA~ -- is your User Name (max 24 char long)
BBBB~ -- is your Token (max 500 char long)

BTW. the new login packet do not hold any info about your password.

appleline
Noob
Noob
Posts: 1
Joined: 09 Apr 2008, 07:53

Re: New updates in kRo make openkore not to work. plz help me

#7 Post by appleline »

BBBBBBBBB (cookie session) token -> http://gnb.gravity.co.kr/gnb/gnb.asp

ex) Vy23zFySFx5FASzTyGIDx5FDEMO1zCy1281309640zPy1200zAy33zEyU35UPR7D9Ix7AZu22jopx79lQkF
C5j2JTiCNLPEtChOJCdukXZWx2FSuLP1nEBJe5NW3uKx2FEDKcx7AOsRUurEZx2BmAA6x79bXcJ9nvFheDg0r
WDER4Vjwe4f8jGKqP2eAjI668x78ZhRVo1Ocx78GMEkrr4bP9vGp9q2ARplHcFx7AccRAux7Ax7AV1CG4x7AIx3D
zKyKcYjIhpx78Lx2B8lJYfJb8hQuwedtb9WvPRls5Xx78wb7MXJ0x3DzMyY68YKx79kYhPUx3Dz

must be login.

token is varial length packet by second


New Masterlogin Packet

- Captured by Sucess login packet -
0825 [400 bytes] Aug 7 03:35:02 2010
0> [25 08] (90 01) 13 00 00 00 00 <XX XX XX XX XX XX XX> %........XXXXXXX ※<blind my ID>
16> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 (51 0B) ..............Q.
32> 00 00 00 00 00 00 00 00 (78 1B 1E 04) 00 00 00 00 ........x.......
48> 00 00 00 00 00 00 00 00 00 00 00 00 <45 30 2D 43 ............E0-C ※<Mac-address>
64> 42 2D 34 45 2D 35 34 2D 30 45 2D 34 37> <31 31 31 B-4E-54-0E-47111 ※<IP>
80> 2E 31 31 31 2E 31 31 2E 31 31 31> 00 (56 79 32 33 .111.11.111.Vy23
96> 7A 46 79 53 46 78 35 46 41 53 7A 54 79 47 49 44 zFySFx5FASzTyGID
112> 78 35 46 44 45 4D 4F 31 7A 43 79 31 32 38 31 31 x5FDEMO1zCy12811
128> 31 39 36 38 34 7A 50 79 33 36 30 30 30 7A 41 79 19684zPy36000zAy
144> 33 33 7A 45 79 77 46 31 78 37 38 68 4E 73 6B 37 33zEywF1x78hNsk7
160> 78 37 39 78 37 41 4E 53 50 4E 4E 59 61 68 47 4E x79x7ANSPNNYahGN
176> 4B 78 37 39 59 6A 62 37 37 54 68 65 57 39 48 42 Kx79Yjb77TheW9HB
192> 6E 44 64 77 76 4F 55 68 36 6C 71 63 49 54 53 41 nDdwvOUh6lqcITSA
208> 35 67 6C 63 65 76 45 69 6D 78 32 46 35 67 6C 31 5glcevEimx2F5gl1
224> 37 78 32 42 48 41 72 63 61 43 38 62 31 54 64 6B 7x2BHArcaC8b1Tdk
240> 34 38 5A 37 45 31 57 6E 48 42 33 46 6C 78 32 46 48Z7E1WnHB3Flx2F
256> 6F 4E 59 34 44 34 74 65 72 33 33 66 4A 6A 55 4C oNY4D4ter33fJjUL
272> 44 6F 6B 71 6A 32 4D 44 56 50 50 75 6F 42 78 37 Dokqj2MDVPPuoBx7
288> 39 6B 71 6C 45 61 6B 45 62 69 78 32 42 78 32 42 9kqlEakEbix2Bx2B
304> 5A 36 44 6A 51 4C 74 41 35 48 48 57 66 66 67 78 Z6DjQLtA5HHWffgx
320> 33 44 78 33 44 7A 4B 79 6F 52 31 65 75 52 75 78 3Dx3DzKyoR1euRux
336> 32 46 53 50 6E 51 6A 4D 4B 4C 57 6F 78 37 41 48 2FSPnQjMKLWox7AH
352> 68 4F 78 37 41 41 4B 42 30 44 31 46 64 59 38 38 hOx7AAKB0D1FdY88
368> 46 78 32 46 6A 54 6D 62 50 62 41 78 33 44 7A 4D Fx2FjTmbPbAx3DzM
384> 79 57 6B 31 71 77 77 33 55 54 44 55 78 33 44 7A) yWk1qww3UTDUx3Dz

first (90 01) -> 0825 Packet length (400byte)
next (), () -> Varial Value Packets
next (Vy~) -> gnb session Packet (is a Random Length, Random Value) -> http://gnb.gravity.co.kr/gnb/gnb.asp(must be login)

User avatar
kLabMouse
Administrator
Administrator
Posts: 1301
Joined: 24 Apr 2008, 12:02

Re: New updates in kRo make openkore not to work. plz help me

#8 Post by kLabMouse »

Well. the packet is simple. (We figured out that in first day).

Code: Select all

// ***************************** RECOVERED *****************************
// packet: 0x825
struct PACKET_CA_SSO_LOGIN_REQ {
  /* this+0x0 */ short PacketType
  /* this+0x2 */ unsigned short PacketLength
  /* this+0x4 */ unsigned long Version
  /* this+0x8 */ unsigned char clienttype
  /* this+0x9 */ unsigned char ID[24]
  /* this+0x21 */ unsigned char Unk[27] // Not used Here
  /* this+0x3c */ char MacAdress[17]
  /* this+0x4d */ char IP[15]
  /* this+0x5c */ char t1[...]
} 
The login sequence is pretty strange, and unusual.
OpenKore need to access HTTP ports and work with HTTP COOKIE.
We decided that procedure for getting Token "t1" should be implemented as Plugin.

=====

Just because it's Summer time, I think Dev's got their rest.
Anyone willing to join? :D

Locked