Anybody has an idea about the use of the 128 bytes signature in the 0x50 packet ?
Quote from: OriOn on December 17, 2003, 09:55 PM
Anybody has an idea about the use of the 128 bytes signature in the 0x50 packet ?
http://www.valhallalegends.com/yoni/BNLSProtocolSpec.txt
QuoteBNLS_VERIFYSERVER (0x11)
------------------------
This messages verifies a server's signature, which is based on the server's IP.
The signature is optional (currently sent only with Warcraft 3), and is sent in SID_AUTH_INFO (0x50).
(DWORD) Server's IP.
(128 bytes) Signature.
Response:
---------
(BOOL) Success. (If this is TRUE, the signature matches the server's IP - if this is FALSE, it does not.)
Yes, i have read this document. But i try to understand the processus of the NLS.
I already have reverse the cdkey hash and i want to understand the login process.
Then, reverse this?