Jump to content

sthlwrk

Members
  • Posts

    4
  • Joined

  • Last visited

Everything posted by sthlwrk

  1. Can you tell me anything you know about it? Which compression exactly? And the protocol format too, please. Anything I already got is that First 2 Bytes = Client ID of Sender, Next 2 Bytes = Client ID of Receiver, Next 4 Bytes = CRC16 Thanks. -sthlwrk
  2. I tried to do more matches (but still only with 2 clients), different maps, sending text, moving units, etc. I don't see any similarities, and it seems that analysing the packets in hexadecimal view does not lead to results. Probably the protocol is working on bit level, which makes it analysing much more worse.. Here some findings: There are also datagrams which are longer and shorter. After a long buffer follows a short buffer by the opposite Client. Some acknowledgement datagram after an important datagram? Datagram sizes: Default datagram: 35 bytes Short datagram: 15 bytes Long datagram: > 35 bytes 4 - 7 = Random 8 - 9 = Same on match 10 = Same on match, -1 on long buffers, +1 on short buffers 11 = random, sometimes the same value one after another 12 = changes sometimes 13 = Same on match (changed on some matches, when byte 12 overflows wtf!) 15 = Same on match, +3 on match start 16 = decrements, sometimes decrements by more than 1, sometimes is set to other value, wtf? 17 = increases by 1 or more, but rarely changes 19 = 3B on first client, 3F on second client 20 - 21 = random 22 = 4A on match start, otherwise D0 or rarely D1 23 = Same on match, but different on match start 24 = small increase or small decrease, rarely 25 - 26 = Same on match (changes rarely) 27 = Always 0F 28 - 29 = Same on match 31 = Always 0F 32 - 33 = Same on match (same value as bytes 28 - 29) 14 + 18 + 30 + 34 = 4A, a terminating byte? On some matches 34 Sorry, still analysing.. Nobody?
  3. Hello there! Are there some documents about the networking protocol of Red Alert 1 ? Google did not help. I created a Tunnel Server which dumped all the datagrams of my test games, and tried to reverse engineer the data. But unfortunately I did not get anything. Even chat messages are not transfered as clear text, and I could not find the coresponding datagrams. The only things I know: First 2 Bytes = Client ID of Sender Next 2 Bytes = Client ID of Receiver And some values are the same, a whole match long - but other matches have other values that keep being the same. Also some values just iterate.. maybe some synch values. Further, some values repeat within one datagram. Some Examples: (client 1 sends to client 2): 02 9A 05 39 47 81 B0 12 73 00 4B 6E 77 AA 4A 16 06 AE 4A 3B 4E 52 6B 18 7B AA 45 0F 73 AA 4A 0F 73 AA 4A (client 2 sends to client 1): 05 39 02 9A F6 20 D6 D7 73 00 4B 5B 77 AA 4A 16 14 AE 4A 3F F1 A7 68 18 78 AA 45 0F 73 AA 4A 0F 73 AA 4A Can somebody please help? Thank you for reading! - sthlwrk
×
×
  • Create New...