Welcome!

Welcome to our community forums, full of great people, ideas and excitement. Please register if you would like to take part.

This is extra text with a test link..

Register Now

Announcement

Collapse
No announcement yet.

Not working... no packets being processed

Collapse
X
Collapse
Who has read this thread:
 
  • Filter
  • Time
  • Show
Clear All
new posts

    #16
    It does not appear to be adding items. All I see are a series of dots "..............................." repeating forever. I have assumed that is showing that a certain number of packets have been processed.

    Comment


      #17
      After restarting, zoning so that it starts the capture process, this is what I see:

      .DEVICE=0 is interface: \Device\NPF_Loopback : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
      DEVICE=1 is interface: \Device\NPF_{4EA3A6F0-AC92-4912-B187-4FB53FD280C2} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
      DEVICE=2 is interface: \Device\NPF_{CFC35797-83EA-4364-BAE7-088DF6CA160C} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
      DEVICE=3 is interface: \Device\NPF_{2AE13859-7D80-4328-A1FE-63B969F223D5} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
      DEVICE=4 is interface: \Device\NPF_{38050301-D15D-48B3-A2BF-51ECB553F8B9} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
      DEVICE=5 is interface: \Device\NPF_{DBB1A90A-B736-40B9-BE3E-46B509D1E5E7} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
      DEVICE=6 is interface: \Device\NPF_{D83F5346-1C6D-4645-93A1-9A861D582082} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
      DEVICE=7 is interface: \Device\NPF_{7C8BD631-B553-49C8-9FE2-783C20A20E3B} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
      DEVICE=8 is interface: \Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3
      DEVICE=9 is interface: \Device\NPF_{4C95ABFA-CFF0-403B-AF35-9F34FD1FC8ED} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
      Waiting for client...
      Client Version: 2.4.8.6
      Lore Op Code: 0x74c3
      Book Op Code: 0x9f20
      Link Op Code: 0x555a
      Adv Op Code: 0x6586
      Item Ignore Op Code: 0x0
      Recipe Op Code: 0x0
      RecipeList Op Code: 0x0
      Mode is 0
      Autodection is 1
      Allow Item Discovery 1
      Item Preview Op Code: 0x74c3
      Item Reward Op Code: 0xfec
      Server Operations Completed...
      ItemStore: items.db
      Listening on '\Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3'
      Added PCL
      Downloading Item Fields Definitions for debug purposes...
      Downloading complete
      Downloading Bad CharmFiles...
      Downloading complete
      BAD CHARMS V.0.1 @ 2020-04-20 13:12 UTC
      Good ip count is 1
      Not Filtering packets
      User Name: SwiftyMUSE
      Debugging Level: 0xffff (info, warnings, extra info, zone packet info, sequence debug messages, raw item data, entire instructions, not submitting to itemsdb)
      ItemCollect based on EQitems on 13th-floor.org
      -- Press 'y' to display a * when packet is being processed (switch on / off) --
      -- Press 'z' to display a count of packets processed --
      -- Press 'f' to flush the item store --
      -- Press 'p' to reset pcap filter --
      -- Press 'd' to download latest version --
      -- Press 'c' to reupload all charm text info (it will wipe the file when done) --
      -- Press 'i' to packet filter --
      -- Press 'q' to exit --
      .................................y
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      .PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.1 to 192.168.0.1
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 192.168.0.120 to 192.168.0.120
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.1 to 192.168.0.1
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      yPACKET FROM: 69.174.201.209 to 69.174.201.209
      .PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 69.174.201.209 to 69.174.201.209
      PACKET FROM: 192.168.0.21 to 192.168.0.21
      PACKET FROM: 69.174.201.209 to 69.174.201.209

      .


      My items.db file is 0kb in size. Also, when displaying that packets are being seen (with "y"), why are the source and destination ip addresses the same? Since the device is listed as listening on local ip 192.168.0.21, shouldn't all the packets have that address in either source or destination ip address fields?

      Comment


        #18
        its not setting up the session packet, so its dropping out.

        Code:
         if (packet.getDestinationPort() == EQPacket.PORT_CHATSERVER ||
        packet.getSourcePort() == EQPacket.PORT_CHATSERVER)
        return;
        
        if ( (packet.getDestinationPort() >= EQPacket.PORT_LOGINSERVER_MIN &&
        packet.getDestinationPort() <= EQPacket.PORT_LOGINSERVER_MAX) ||
        (packet.getSourcePort() >= EQPacket.PORT_LOGINSERVER_MIN &&
        packet.getSourcePort() <= EQPacket.PORT_LOGINSERVER_MAX) )
        return;
        
        
        // discard world chat packets
        if ((packet.getDestinationPort() >= EQPacket.PORT_WORLDSERVER_CHAT_MIN &&
        packet.getDestinationPort() <= EQPacket.PORT_WORLDSERVER_CHAT_MAX) ||
        (packet.getSourcePort() >= EQPacket.PORT_WORLDSERVER_CHAT_MIN &&
        packet.getSourcePort() <= EQPacket.PORT_WORLDSERVER_CHAT_MAX))
        return;
        
        // client detection
        if (_detectingClient)
        {
        
        if (packet.getDestinationPort() == EQPacket.PORT_WORLDSERVER_GENERAL)
        {
        
        _testclientAddress = packet.getSourceAddress();
        _testserverAddress = packet.getDestinationAddress();
        
        
        
        _clientAddress = packet.getSourceAddress();
        _serverAddress = packet.getDestinationAddress();
        _detectingClient = false;
        pcap.setFilter("udp[0:2] > 1024 and udp[2:2] > 1024 and " + "ether proto 0x0800 and host " + _clientAddress, true);
        if ((_debugLevel & 1) > 0)
        System.out.println("Found Client>World: " + _clientAddress + " to " + _serverAddress);
        // System.out.println(packet.toString());
        }
        }
        
        // we don't have a client yet
        if (_detectingClient)
        return;
        Last edited by Deillusional; 30-07-2021, 14:17.
        The views represented here does not necessarily reflect the views of the guild (tm).

        Comment


          #19
          i uploaded a new version with more debug code so we can see whats happening.
          The views represented here does not necessarily reflect the views of the guild (tm).

          Comment


            #20
            Downloaded new version, restarted collector, zoned to lobby and back into guild hall. Here is what I got:

            Code:
            DEVICE=0 is interface: \Device\NPF_Loopback : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
            DEVICE=1 is interface: \Device\NPF_{4EA3A6F0-AC92-4912-B187-4FB53FD280C2} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
            DEVICE=2 is interface: \Device\NPF_{CFC35797-83EA-4364-BAE7-088DF6CA160C} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
            DEVICE=3 is interface: \Device\NPF_{2AE13859-7D80-4328-A1FE-63B969F223D5} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
            DEVICE=4 is interface: \Device\NPF_{38050301-D15D-48B3-A2BF-51ECB553F8B9} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
            DEVICE=5 is interface: \Device\NPF_{DBB1A90A-B736-40B9-BE3E-46B509D1E5E7} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
            DEVICE=6 is interface: \Device\NPF_{D83F5346-1C6D-4645-93A1-9A861D582082} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
            DEVICE=7 is interface: \Device\NPF_{7C8BD631-B553-49C8-9FE2-783C20A20E3B} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
            DEVICE=8 is interface: \Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3
            DEVICE=9 is interface: \Device\NPF_{4C95ABFA-CFF0-403B-AF35-9F34FD1FC8ED} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
            Waiting for client...
            Client Version: 2.4.8.7
            Lore Op Code: 0x74c3
            Book Op Code: 0x9f20
            Link Op Code: 0x555a
            Adv Op Code: 0x6586
            Item Ignore Op Code: 0x0
            Recipe Op Code: 0x0
            RecipeList Op Code: 0x0
            Mode is 0
            Autodection is 1
            Allow Item Discovery 1
            Item Preview Op Code: 0x74c3
            Item Reward Op Code: 0xfec
            Server Operations Completed...
            ItemStore: items.db
            Listening on '\Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3'
            Added PCL
            Downloading Item Fields Definitions for debug purposes...
            Downloading complete
            Downloading Bad CharmFiles...
            Downloading complete
            BAD CHARMS V.0.1 @ 2020-04-20 13:12 UTC
            Good ip count is 1
            Not Filtering packets
            User Name: SwiftyMUSE
            Debugging Level: 0xff (info, warnings, extra info, zone packet info, sequence debug messages, raw item data, entire instructions)
            ItemCollect based on EQitems on 13th-floor.org
            -- Press 'y' to display a * when packet is being processed (switch on / off) --
            -- Press 'z' to display a count of packets processed --
            -- Press 'f' to flush the item store --
            -- Press 'p' to reset pcap filter --
            -- Press 'd' to download latest version --
            -- Press 'c' to reupload all charm text info (it will wipe the file when done) --
            -- Press 'i' to packet filter --
            -- Press 'q' to exit --
            y
            PACKET FROM: 69.174.201.195[1801] to 69.174.201.195[65513]
            DETECTING CLIENT 65513[9000]
            NO CLIENT 65513[9000]
            PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801]
            DETECTING CLIENT 1801[9000]
            NO CLIENT 1801[9000]
            PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801]
            DETECTING CLIENT 1801[9000]
            NO CLIENT 1801[9000]
            PACKET FROM: 69.174.201.195[1801] to 69.174.201.195[65513]
            DETECTING CLIENT 65513[9000]
            NO CLIENT 65513[9000]
            PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801]
            DETECTING CLIENT 1801[9000]
            NO CLIENT 1801[9000]
            PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801]
            DETECTING CLIENT 1801[9000]
            NO CLIENT 1801[9000]
            PACKET FROM: 69.174.201.195[1801] to 69.174.201.195[65513]
            DETECTING CLIENT 65513[9000]
            NO CLIENT 65513[9000]
            PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801]
            DETECTING CLIENT 1801[9000]
            NO CLIENT 1801[9000]
            PACKET FROM: 192.168.0.1[32772] to 192.168.0.1[7423]
            DETECTING CLIENT 7423[9000]
            NO CLIENT 7423[9000]
            PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801]
            DETECTING CLIENT 1801[9000]
            NO CLIENT 1801[9000]
            PACKET FROM: 69.174.201.195[1801] to 69.174.201.195[65513]
            DETECTING CLIENT 65513[9000]
            NO CLIENT 65513[9000]
            PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801]
            DETECTING CLIENT 1801[9000]
            NO CLIENT 1801[9000]
            PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500]
            DETECTING CLIENT 17500[9000]
            NO CLIENT 17500[9000]
            PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500]
            DETECTING CLIENT 17500[9000]
            NO CLIENT 17500[9000]
            PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500]
            DETECTING CLIENT 17500[9000]
            NO CLIENT 17500[9000]
            PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500]
            DETECTING CLIENT 17500[9000]
            NO CLIENT 17500[9000]
            PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500]
            DETECTING CLIENT 17500[9000]
            NO CLIENT 17500[9000]
            PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500]
            DETECTING CLIENT 17500[9000]
            NO CLIENT 17500[9000]
            PACKET FROM: 192.168.0.21[17500] to 192.168.0.21[17500]
            DETECTING CLIENT 17500[9000]
            NO CLIENT 17500[9000]
            PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801]
            DETECTING CLIENT 1801[9000]
            NO CLIENT 1801[9000]
            PACKET FROM: 69.174.201.195[1801] to 69.174.201.195[65513]
            DETECTING CLIENT 65513[9000]
            NO CLIENT 65513[9000]
            PACKET FROM: 192.168.0.120[10101] to 192.168.0.120[10101]
            DETECTING CLIENT 10101[9000]
            NO CLIENT 10101[9000]
            PACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801]
            DETECTING CLIENT 1801[9000]
            NO CLIENT 1801[9000]
            yPACKET FROM: 192.168.0.21[65513] to 192.168.0.21[1801]
            DETECTING CLIENT 1801[9000]
            NO CLIENT 1801[9000]

            Comment


              #21
              According to my item collector, I get the following:

              Code:
              Setting up session: Client port 65513, Server port 1801. SKey is 0x29594877.
              Processing player profile.
              server(Xegony): 01.everquest.com, sip: 1086959173, port: 9002
              Processing player inventory.
              New zone detected, xxxxxxxxxxxx has entered Palatial Guild Hall.

              Comment


                #22
                Here is how I detect a new client session. (I have yet to change for the Selos/Povar server merger).

                Code:
                int get_servernum_by_worldid(int worldnum, unsigned long portnum)
                {
                switch (worldnum)
                {
                case 1: // 69.174.201.64
                switch (portnum)
                {
                case 9000: return 1; //Erollisi Marr
                case 9001: return 7; //Tunare
                case 9002: return 8; //Xegony
                case 9003: return 23; //Mangler
                case 9004: return 12; //Firiona Vie
                case 9005: return 6; //Coirnav
                case 9006: return 4; //The Rathe
                default:
                return 0;
                }
                case 2: // 69.174.201.65
                switch (portnum)
                {
                case 9000: return 2; //Cazic-Thule
                case 9001: return 10; //Luclin
                case 9002: return 15; //Bristlebane
                case 9003: return 30; //Rizlona
                case 9004: return 16; //Vox
                case 9005: return 14; //Drinal
                case 9006: return 11; //Povar
                default:
                return 0;
                }
                case 3: // 69.174.201.66
                switch (portnum)
                {
                case 9000: return 3; //Aradune
                case 9001: return 27; //Miragul
                case 9002: return 24; //Selo
                case 9003: return 17; //Ragefire
                case 9004: return 19; //Phinigel
                case 9005: return 22; //Agnarr
                case 9006: return 5; //Zek
                case 9007: return 9; //Bertoxxulous
                default:
                return 0;
                }
                case 20: // 69.174.193.133
                switch (portnum)
                {
                case 9000: return 20; //Antonius Bayle
                default:
                return 0;
                }
                case 25: // 69.174.201.88
                switch (portnum)
                {
                case 9000: return 166; //Test
                default:
                return 0;
                }
                case 26: // 69.174.201.89
                switch (portnum)
                {
                case 9000: return 26; //Beta
                default:
                return 0;
                }
                default: return 0;
                }
                }

                Comment


                  #23
                  pushed another version that will bypass the client detection on the port number until work something out it works on Xegony I just tested. (The previous version didnt).

                  The views represented here does not necessarily reflect the views of the guild (tm).

                  Comment


                    #24
                    The debug text is showing that it is detecting the client and processing packets again.

                    Comment


                      #25
                      its detecting end of session sometimes for me here, how do you determine the end of session?
                      The views represented here does not necessarily reflect the views of the guild (tm).

                      Comment


                        #26
                        Unfortunately we don't actually detect an end-of-session, per se. We just restart a session everytime we detect a new zone entered. It's somewhat working now, except it seems as you said to detect an end-of-session an awful lot which requires me to zone again to restart the capture. I'm also seeing the following:

                        Code:
                        DEVICE=0 is interface: \Device\NPF_Loopback : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
                        DEVICE=1 is interface: \Device\NPF_{4EA3A6F0-AC92-4912-B187-4FB53FD280C2} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
                        DEVICE=2 is interface: \Device\NPF_{CFC35797-83EA-4364-BAE7-088DF6CA160C} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
                        DEVICE=3 is interface: \Device\NPF_{2AE13859-7D80-4328-A1FE-63B969F223D5} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
                        DEVICE=4 is interface: \Device\NPF_{38050301-D15D-48B3-A2BF-51ECB553F8B9} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
                        DEVICE=5 is interface: \Device\NPF_{DBB1A90A-B736-40B9-BE3E-46B509D1E5E7} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
                        DEVICE=6 is interface: \Device\NPF_{D83F5346-1C6D-4645-93A1-9A861D582082} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
                        DEVICE=7 is interface: \Device\NPF_{7C8BD631-B553-49C8-9FE2-783C20A20E3B} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
                        DEVICE=8 is interface: \Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3
                        DEVICE=9 is interface: \Device\NPF_{4C95ABFA-CFF0-403B-AF35-9F34FD1FC8ED} : name:lo (Software Loopback Interface 1) on /127.0.0.1 /0:0:0:0:0:0:0:1
                        Waiting for client...
                        Client Version: 2.4.8.8
                        Lore Op Code: 0x74c3
                        Book Op Code: 0x9f20
                        Link Op Code: 0x555a
                        Adv Op Code: 0x6586
                        Item Ignore Op Code: 0x0
                        Recipe Op Code: 0x0
                        RecipeList Op Code: 0x0
                        Mode is 1
                        Autodection is 1
                        Allow Item Discovery 1
                        Item Preview Op Code: 0x74c3
                        Item Reward Op Code: 0xfec
                        Server Operations Completed...
                        ItemStore: items.db
                        Listening on '\Device\NPF_{98ED437E-51F3-4C94-88D9-A29E6282A2A2} : name:eth3 (Intel(R) Ethernet Connection (2) I219-V) on /192.168.0.21 /fe80:0:0:0:65d4:dab2:c105:a5d1%eth3'
                        Added PCL
                        Downloading Item Fields Definitions for debug purposes...
                        Downloading complete
                        Downloading Bad CharmFiles...
                        Download failed.
                        BAD CHARMS V.0.1 @ 2020-04-20 13:12 UTC
                        Good ip count is 2
                        Filtering packets for local addresses and ...
                        69.174
                        192.168.0.21
                        User Name: SwiftyMUSE
                        Debugging Level: 0xf (info, warnings, extra info, zone packet info)
                        ItemCollect based on EQitems on 13th-floor.org
                        -- Press 'y' to display a * when packet is being processed (switch on / off) --
                        -- Press 'z' to display a count of packets processed --
                        -- Press 'f' to flush the item store --
                        -- Press 'p' to reset pcap filter --
                        -- Press 'd' to download latest version --
                        -- Press 'c' to reupload all charm text info (it will wipe the file when done) --
                        -- Press 'i' to packet filter --
                        -- Press 'q' to exit --
                        *** Session End Detected ***
                        
                        *** New Session Detected ***
                        Charm Read Mode is 1
                        Found Client>World: null to null
                        Session Key: 0x4fb1c87a, Server Port: 9002, Client Port: 65513
                        *** Session End Detected ***
                        
                        *** New Session Detected ***
                        Charm Read Mode is 1
                        Found Client>World: null to 69.174.201.64
                        Session Key: 0x348151d3, Server Port: 1362, Client Port: 65513
                        Stream Sequence Lost Error: Zone or Relog to fix.
                        Expecting : 269
                        Received : 1311
                        Cache Size: 1024
                        *** Session End Detected ***
                        
                        *** New Session Detected ***
                        Charm Read Mode is 1
                        Found Client>World: null to 69.174.201.209
                        Session Key: 0x5ea228bd, Server Port: 9002, Client Port: 65513
                        *** Session End Detected ***
                        
                        *** New Session Detected ***
                        Charm Read Mode is 1
                        Found Client>World: null to 69.174.201.64
                        Session Key: 0x7b273152, Server Port: 1801, Client Port: 65513
                        Stream Sequence Lost Error: Zone or Relog to fix.
                        Expecting : 118
                        Received : 1154
                        Cache Size: 1024

                        Comment


                          #27
                          Let me know how it goes, and thanks for the help/suggestions:


                          Version 2.5.0.0


                          General

                          Removed the timed * echo.


                          IP Filtering

                          Controlled via ipaddresses.ini this file is created on load if it doesn't exist. Otherwise is customisable. To reload it use i


                          [IP_FILTER]
                          COUNT = 1
                          USE = 1
                          LOCAL_IP =
                          IP_1 = 69.174


                          LOCAL_IP is if you want to search for a starting packet of an ip address range or a single IP e.g. 192.168 will take every ip address in 192.168. as valid, 192.168.0.2 will only take 192.168.0.2 as valid

                          the IP_x is enable filters from the external addresses starting with the address.

                          Sessions

                          Client Detection is on ports 9000-9007 now.

                          Session Response takes the size of the packet into account as well as the opcode.
                          Session Disconnect takes the size of the packet into account as well as the opcode.
                          The views represented here does not necessarily reflect the views of the guild (tm).

                          Comment

                          Working...
                          X