• Welcome to Valhalla Legends Archive.
 

About the signature in x50

Started by OriOn, December 17, 2003, 09:55 PM

Previous topic - Next topic

OriOn

Anybody has an idea about the use of the 128 bytes signature in the 0x50 packet ?

Skywing

Quote from: OriOn on December 17, 2003, 09:55 PM
Anybody has an idea about the use of the 128 bytes signature in the 0x50 packet ?
http://www.valhallalegends.com/yoni/BNLSProtocolSpec.txt

QuoteBNLS_VERIFYSERVER (0x11)
------------------------

This messages verifies a server's signature, which is based on the server's IP.
The signature is optional (currently sent only with Warcraft 3), and is sent in SID_AUTH_INFO (0x50).

(DWORD) Server's IP.
(128 bytes) Signature.



Response:
---------

(BOOL) Success. (If this is TRUE, the signature matches the server's IP - if this is FALSE, it does not.)

OriOn

Yes, i have read this document. But i try to understand the processus of the NLS.
I already have reverse the cdkey hash and i want to understand the login process.

iago

This'll make an interesting test for broken AV:
QuoteX5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


Soul Taker


UserLoser.