View Single Post
  #52  
Old 10-01-2004, 09:45 PM
Camaris
Fire Beetle
 
Join Date: Oct 2004
Posts: 19
Default

Hi all, I really would appreciate any help...i am getting the next problem with minilogin, i am using WoA backpacht then i guess that my client version is correct, i have tried 7-31 , 6-16 and 6-21 servers (all are 5.7-DR 6) and i am getting always the same error, i get to server selection screen, i push play Everquest, then i get back to login account screen... This is the mini.log file that i get using: perl -w minilogin.pl > mini.log

reading : 127.0.0.1 eqemu3 eqemu3
setting 0 to id 591, eqemu3 / eqemu3
udp server listening on port : 5996
tcp server listening on port : 5996
now to work ...
currently on :
currently on :
new incomming server ...
key : 127.0.0.1:1032
key : 127.0.0.1:1032
opcode : 4096, length : 607
World protocol : 0.3.10
World version : 0.5.7-DR6
World account :
World name : Arex's revenge
World key : 127.0.0.1:1032
World passwd :
World url : 127.0.0.1
World type : 0
World category : 34
key : 127.0.0.1:1032
opcode : 4097, length : 16
Status : -2, Clients 0, Zones 0
key : 127.0.0.1:1032
opcode : 4097, length : 16
Status : -2, Clients 0, Zones 0
currently on :
server from 127.0.0.1:1032 : Arex's revenge
key : 127.0.0.1:1032
opcode : 4097, length : 16
Status : -2, Clients 0, Zones 0
key : 127.0.0.1:1032
opcode : 4097, length : 16
Status : -2, Clients 0, Zones 0
currently on :
server from 127.0.0.1:1032 : Arex's revenge
key : 127.0.0.1:1032
opcode : 4097, length : 16
Status : 0, Clients 0, Zones 2
key : 127.0.0.1:1032
opcode : 4097, length : 16
Status : 0, Clients 0, Zones 2
currently on :
server from 127.0.0.1:1032 : Arex's revenge
key : 127.0.0.1:1032
opcode : 4097, length : 16
Status : 0, Clients 0, Zones 2
key : 127.0.0.1:1032
opcode : 4097, length : 16
Status : 0, Clients 0, Zones 2
currently on :
server from 127.0.0.1:1032 : Arex's revenge
key : 127.0.0.1:1032
opcode : 4097, length : 16
Status : 0, Clients 0, Zones 2
key : 127.0.0.1:1032
opcode : 4097, length : 16
Status : 0, Clients 0, Zones 2
currently on :
server from 127.0.0.1:1032 : Arex's revenge
key is : 127.0.0.1:1037

-->incoming
Client 127.0.0.1:1037 sent 14 bytes, message type : 0x01 retry count : 0x00
00 01 00 00 00 02 00 29 48 23 00 00 02 00
new client, sending reply to 127.0.0.1:1037
key is : 127.0.0.1:1037

-->incoming
Client 127.0.0.1:1037 sent 18 bytes, message type : 0x09 retry count : 0x00
00 09 00 00 01 00 01 00 00 00 00 00 00 00 00 00 03 00
opcode 1 , sequence id 0
key is : 127.0.0.1:1037

-->incoming
Client 127.0.0.1:1037 sent 40 bytes, message type : 0x03 retry count : 0x00
00 03 04 00 15 00 00 20 00 09 00 01 02 00 02 00 00 00 00 00 00 00 00 00 65 71 65 6d 75 33 00 65 71 65 6d 75 33 00 00 00
in reply to seq # 0
leading block
leading block
in reply to seq # 0
message in packet is :
00 09 00 01 02 00 02 00 00 00 00 00 00 00 00 00 65 71 65 6d 75 33 00 65 71 65 6d 75 33 00 00 00
opcode 2 , sequence id 1
message type 0009 0001, answer with ... ack
login = eqemu3 eqemu3
login : eqemu3
pass : eqemu3
login match : eqemu3 ( eqemu3,eqemu3)
client id is : 1
auth key : ER1lb3TdJ
sending login key informaion
aknowledging seq id 1 to client (pure ack)
client authentified
key is : 127.0.0.1:1037

-->incoming
Client 127.0.0.1:1037 sent 24 bytes, message type : 0x03 retry count : 0x00
00 03 04 00 15 00 01 10 00 09 00 02 04 00 03 00 00 00 00 00 00 00 00 00
in reply to seq # 1
leading block
leading block
in reply to seq # 1
message in packet is :
00 09 00 02 04 00 03 00 00 00 00 00 00 00 00 00
opcode 4 , sequence id 2
acquired lock for server list
server from 127.0.0.1:1032 : Arex's revenge
4950554648464846490
sending info for 1 servers, total 47 bytes
127.0.0.1:1032
key is : 127.0.0.1:1037

-->incoming
Client 127.0.0.1:1037 sent 4 bytes, message type : 0x15 retry count : 0x02
00 15 00 02
message type 0x15, packet # 2 received and acknowledged by client
key : 127.0.0.1:1032
opcode : 4097, length : 16
Status : 0, Clients 0, Zones 2
key is : 127.0.0.1:1037

-->incoming
Client 127.0.0.1:1037 sent 16 bytes, message type : 0x09 retry count : 0x02
00 09 00 02 04 00 03 00 00 00 00 00 00 00 00 00
opcode 4 , sequence id 2
acquired lock for server list
server from 127.0.0.1:1032 : Arex's revenge
4950554648464846490
sending info for 1 servers, total 47 bytes
127.0.0.1:1032
key is : 127.0.0.1:1037

-->incoming
Client 127.0.0.1:1037 sent 4 bytes, message type : 0x15 retry count
Reply With Quote