Author | Message | Time |
---|---|---|
Networks | I can't seem to even establish the slightest connection today. It had worked before but it's not working currently. Just wondering what may be going on. [code] Public Sub Connect_Bot() Call Close_Bot Call clsConnFunc.SelectProduct If clsBotVars.BNLS_Use = True Then 'If InStr(clsBotVars.BNLS_Server, ":") Then ' sckBNLS.Connect Split(clsBotVars.BNLS_Server, ":")(0), Split(clsBotVars.BNLS_Server, ":")(1) 'Else sckBNLS.Connect "bnls.valhallalegends.com", 9367 'End If AddC frmMain.RTB1, vbYellow, "(BNLS) Attempting to connect to the battle.net logon server..." Else If InStr(clsBotVars.Server, ":") Then sckBNET.Connect Split(clsBotVars.Server, ":")(0), Split(clsBotVars.Server, ":")(1) AddC frmMain.RTB1, vbYellow, "(BNET) Attempting to connect battle.net... ( " & clsBotVars.Server & " )" Else sckBNET.Connect clsBotVars.Server, 6112 AddC frmMain.RTB1, vbYellow, "(BNET) Attempting to connect battle.net... ( " & clsBotVars.Server & ":6112 )" End If End If End Sub [/code] [19:50:28] (BNLS) Attempting to connect to the battle.net logon server... [19:50:43] (BNLS) Error ( 11004 ) Valid name, no data record of requested type Thank you for any help in advance. Edit: I'm noticing even the site is having problems and I believe iago told me he was having trouble getting to his email account so I am guessing you guys are playing with things or just having overall troubles and it'll be fixed. Please tell me when everything is back to normal and what is going on currently. Thank you. | December 4, 2004, 2:50 AM |
shadypalm88 | I also noticed this problem. I can't resolve www.valhallalegends.com or bnls.valhallalegends.com. However, mysteriously, a friend of mine's StealthBot was still working, so I looked to see where it was connecting. It's connecting to 63.161.183.207. | December 4, 2004, 3:48 AM |
KkBlazekK | I found this problem aswell, however it doesn't seem to occur anymore. | December 4, 2004, 3:53 AM |
Networks | haha Same thing was happening to me. I couldn't connect to bnls w/ my bot but Stealth bot would. Is stealth hiding something!!!! :P | December 4, 2004, 4:04 AM |
LW-Falcon | [quote] I also noticed this problem. I can't resolve www.valhallalegends.com or bnls.valhallalegends.com. However, mysteriously, a friend of mine's StealthBot was still working, so I looked to see where it was connecting. It's connecting to 63.161.183.207.[/quote] JBLS? | December 4, 2004, 8:33 AM |
hismajesty | [quote author=Falcon[anti-yL] link=topic=9772.msg90994#msg90994 date=1102149239] [quote] I also noticed this problem. I can't resolve www.valhallalegends.com or bnls.valhallalegends.com. However, mysteriously, a friend of mine's StealthBot was still working, so I looked to see where it was connecting. It's connecting to 63.161.183.207.[/quote] JBLS? [/quote] That's what I was thinking. | December 4, 2004, 12:17 PM |
Networks | [quote author=hismajesty[yL] link=topic=9772.msg90995#msg90995 date=1102162669] [quote author=Falcon[anti-yL] link=topic=9772.msg90994#msg90994 date=1102149239] [quote] I also noticed this problem. I can't resolve www.valhallalegends.com or bnls.valhallalegends.com. However, mysteriously, a friend of mine's StealthBot was still working, so I looked to see where it was connecting. It's connecting to 63.161.183.207.[/quote] JBLS? [/quote] That's what I was thinking. [/quote] Are you serious? Stealth Bot uses a JBLS server? Did Stealth ever tell anyone about this? | December 4, 2004, 4:00 PM |
bethra | That is odd. My stealth bot wouldn't connect. Also, not so long ago I had packet logged stealthbot and it used BNLS to hash Warcraft III. I dunno | December 4, 2004, 4:23 PM |
hismajesty | [quote author=Networks link=topic=9772.msg91004#msg91004 date=1102176040] [quote author=hismajesty[yL] link=topic=9772.msg90995#msg90995 date=1102162669] [quote author=Falcon[anti-yL] link=topic=9772.msg90994#msg90994 date=1102149239] [quote] I also noticed this problem. I can't resolve www.valhallalegends.com or bnls.valhallalegends.com. However, mysteriously, a friend of mine's StealthBot was still working, so I looked to see where it was connecting. It's connecting to 63.161.183.207.[/quote] JBLS? [/quote] That's what I was thinking. [/quote] Are you serious? Stealth Bot uses a JBLS server? Did Stealth ever tell anyone about this? [/quote] You can fill in your own server, can't you? JBLS works exactly like BNLS so any BNLS enabled bot will work with it. | December 4, 2004, 4:54 PM |
LW-Falcon | Yah, you just gotta change the server in the config. | December 4, 2004, 5:39 PM |
KkBlazekK | JBLS doesn't do 0x0B though, thats why I don't use it all the time, only for when I use my war3 bots. I told The-Fool to add it and I think he is going to. | December 4, 2004, 5:48 PM |
Networks | Isn't this bad though because we don't know who may be hosting it. I never specified for Stealth Bot to connect to any other server accept BNLS. JBLS sends everything plain-text and if it wanted could log cdkeys/passwords. I am not saying that person will. I just think users should know where they are connecting to... | December 4, 2004, 6:15 PM |
Mephisto | Okay, so BNLS is now able to accept connections and initiate the protocol with the client, but it's giving us invalid configurations which results in an error from Battle.net (0x101 on 0x51 return). Skywing or Yoni? | December 4, 2004, 6:19 PM |
Kp | [quote author=Mephisto link=topic=9772.msg91021#msg91021 date=1102184350]Okay, so BNLS is now able to accept connections and initiate the protocol with the client, but it's giving us invalid configurations which results in an error from Battle.net (0x101 on 0x51 return). Skywing or Yoni?[/quote] To save them the trouble: What? Post a dump of a failed negotiation, and check that it recurs more than once in a short period of time. There's a known issue with BNCS version checking that if the version formula changes while you're computing your answer, you'll be incorrectly told "Wrong answer". If BNLS was responding slowly while you were testing, that would increase the chance of running across this issue. | December 4, 2004, 7:05 PM |
Networks | I got the same thing earilier as well. Edit: And still do. | December 4, 2004, 7:13 PM |
Cyberpenguin | AFAIK Stealthbot tries to connect to bnls.valhallalegends.com and if that does not work, it tries to connect to valhallalegends.com I also encountered this error yesterday, and i changed my valhallalegends address from bnls.valhallalegends.com to valhallalegends.com and it works fine Conclusion, use valhallalegends.com as your BNLS server. | December 4, 2004, 7:24 PM |
Mephisto | [quote author=Kp link=topic=9772.msg91026#msg91026 date=1102187137] [quote author=Mephisto link=topic=9772.msg91021#msg91021 date=1102184350]Okay, so BNLS is now able to accept connections and initiate the protocol with the client, but it's giving us invalid configurations which results in an error from Battle.net (0x101 on 0x51 return). Skywing or Yoni?[/quote] To save them the trouble: What? Post a dump of a failed negotiation, and check that it recurs more than once in a short period of time. There's a known issue with BNCS version checking that if the version formula changes while you're computing your answer, you'll be incorrectly told "Wrong answer". If BNLS was responding slowly while you were testing, that would increase the chance of running across this issue. [/quote] It was my invalid code; my apologies. But interestingly enough I came accross another bug: awhile ago I implemented the WAR3 connection w/ BNLS -- BNLS gave me an incorrect password proof and thus the complete logon failed (though I could logon I could not pass the proof); but when I used JBLS everything worked fine. And I tripple-checked everything in my code and did exactly as is documented on the Battle.net and BNLS protocols. Note: If JBLS does not follow the BNLS protocol and do exactly it 100% then this error may not apply to BNLS; but interestingly enough it worked with JBLS and not BNLS. | December 4, 2004, 7:24 PM |
KkBlazekK | [quote author=Cyberpenguin link=topic=9772.msg91030#msg91030 date=1102188271] Conclusion, use valhallalegends.com as your BNLS server. [/quote] Thats a bad idea. Thats the server that stealth used from stealthbot in 2.4R3 and all of a sudden it went down. Do you know how many idiots were spamming us at stealthbot.net with error reports about this? www.valhallalegends.com:9367 is not the official bnls server. Use bnls.valhallalegends.com:9367. | December 4, 2004, 7:32 PM |
Adron | [quote author=Mephisto link=topic=9772.msg91031#msg91031 date=1102188282] It was my invalid code; my apologies. But interestingly enough I came accross another bug: awhile ago I implemented the WAR3 connection w/ BNLS -- BNLS gave me an incorrect password proof and thus the complete logon failed (though I could logon I could not pass the proof); but when I used JBLS everything worked fine. And I tripple-checked everything in my code and did exactly as is documented on the Battle.net and BNLS protocols. [/quote] If this happened only once or twice, it might be a bug in battle.net. Ask Skywing about it. | December 4, 2004, 7:36 PM |
tA-Kane | I too had this problem, and did a little investigation during the experience. It seemed to me that ns1.vpnsys.org went offline for one reason or another. ns1.vpnsys.org is the main nameserver for a fair amount of the valhallalegends.com domain, including bnls.valhallalegends.com. So, if the nameserver was down, no one could convert the domain bnls.vallhallalegends.com to the proper IP address. The biggest (but not the only) exceptions would be people who still had the domain in their domain resolution cache, or who were using a nameserver which also had the domain resolution in its cache. | December 4, 2004, 7:45 PM |
Mephisto | [quote author=Adron link=topic=9772.msg91036#msg91036 date=1102188966] [quote author=Mephisto link=topic=9772.msg91031#msg91031 date=1102188282] It was my invalid code; my apologies. But interestingly enough I came accross another bug: awhile ago I implemented the WAR3 connection w/ BNLS -- BNLS gave me an incorrect password proof and thus the complete logon failed (though I could logon I could not pass the proof); but when I used JBLS everything worked fine. And I tripple-checked everything in my code and did exactly as is documented on the Battle.net and BNLS protocols. [/quote] If this happened only once or twice, it might be a bug in battle.net. Ask Skywing about it. [/quote] It's an ongoing problem. I tried it on different days, different times of the day, 10 times in a row sometimes, etc. The major difference of JBLS and BNLS is that JBLS uses iago's hashing algorithms and BNLS uses Skywing's so it leads me to believe that Skywing's hashing algorithm produces errors perhaps? But I doubt this since other's have successfully connted with WAR3 using BNLS. | December 4, 2004, 8:31 PM |
iago | Although I didn't read this thread, I think the problem was with dns lookups. I wasn't able to resolve vL's ip for most of yesterday. Coincidentally, Thing's nameserver blew up recently. I would imagine it was just a DNS burp. | December 4, 2004, 9:00 PM |
The-FooL | [quote author=Networks link=topic=9772.msg91020#msg91020 date=1102184124] Isn't this bad though because we don't know who may be hosting it. I never specified for Stealth Bot to connect to any other server accept BNLS. JBLS sends everything plain-text and if it wanted could log cdkeys/passwords. I am not saying that person will. I just think users should know where they are connecting to... [/quote] Stealthbot does not use a JBLS server(at least by default). And, there are no public JBLS servers up, that I know of. | December 5, 2004, 12:30 AM |
Skywing | [quote author=Mephisto link=topic=9772.msg91041#msg91041 date=1102192300] [quote author=Adron link=topic=9772.msg91036#msg91036 date=1102188966] [quote author=Mephisto link=topic=9772.msg91031#msg91031 date=1102188282] It was my invalid code; my apologies. But interestingly enough I came accross another bug: awhile ago I implemented the WAR3 connection w/ BNLS -- BNLS gave me an incorrect password proof and thus the complete logon failed (though I could logon I could not pass the proof); but when I used JBLS everything worked fine. And I tripple-checked everything in my code and did exactly as is documented on the Battle.net and BNLS protocols. [/quote] If this happened only once or twice, it might be a bug in battle.net. Ask Skywing about it. [/quote] It's an ongoing problem. I tried it on different days, different times of the day, 10 times in a row sometimes, etc. The major difference of JBLS and BNLS is that JBLS uses iago's hashing algorithms and BNLS uses Skywing's so it leads me to believe that Skywing's hashing algorithm produces errors perhaps? But I doubt this since other's have successfully connted with WAR3 using BNLS. [/quote] There is a buffer handling bug in Battle.net's checking of "NLS"-style passwords that causes it to incorrectly fail a small percentage of logons. It's actually possible to detect when this will happen clientside, but this can be done so late in the logon process that the only recourse is to abort the connection and retry the whole process again, hoping the server doesn't pick values that make the buffer handling bug visible. At some point, BNLS will be modified to close connections if somebody requests a logon with values that will cause the server to report an incorrect result. | December 5, 2004, 9:19 PM |
tA-Kane | [quote author=Skywing link=topic=9772.msg91160#msg91160 date=1102281565]At some point, BNLS will be modified to close connections if somebody requests a logon with values that will cause the server to report an incorrect result.[/quote]Eww! BNLS should report to client that the data will cause the server to report an incorrect result! Let's not force the client to reconnect to both Battle.net and BNLS, but just Battle.net. | December 7, 2004, 8:20 AM |
Skywing | It would be preferable to extend support to all programs, not those updated after the change goes into effect. I'll see about making it possible to bypass a disconnect if the client specifies some knowledge of an enhanced protocol that has some type of status code. | December 9, 2004, 2:20 PM |