Difference between revisions of "Connectivity Guide"

From OpenKore Wiki
Jump to navigation Jump to search
m
(40 intermediate revisions by 7 users not shown)
Line 1: Line 1:
OpenKore comes with a large list of server information. But some servers are not in the list, and sometimes the server information changes (for instance, when a server changes IP address or upgrades the server software). This guide teaches you several ways to figure out the (new) server information. Read this guide completely and carefully! If you encounter problems, finish reading this guide first before asking questions on the forum or IRC!
+
==Getting Server Information==
 +
OpenKore comes with a list of official servers information only, because of the high amount of private servers, it is impossible to have and keep them updated, so private servers players should follow this guide to get and update their server information.  
 +
Before continuing, read the list of [[unsupported servers]]. Your server might have anti-bot protection resulting in not being supported by Openkore.
 +
 
 +
OpenKore requires the following information about the Ragnarok Online server before it can initialize and login:
 +
* The server name
 +
* The server's [[host]] ([[wikipedia:IP address|IP address]] or [[wikipedia:hostname|hostname]]) and [[wikipedia:computer port (software)|port]]
 +
* The server's [[Connectivity_Guide#Required|master version]] number, [[Connectivity_Guide#Required|version]] number, [[Connectivity_Guide#Required|character encoding]], [[Connectivity_Guide#Required|charBlockSize]]
 +
* [[Connectivity_Guide#Syntax|addTableFolders]] to look for tables in
  
But before you do that, read the list of [[unsupported servers]]. Your server may not be supported at all - in that case reading this guide would be a waste of time.
+
There are detailed instructions on collecting server information with [http://wpepro.net/ WPE] or [http://wireshark.org/ Wireshark]. This kind of packet analyze isn't anything special for OpenKore or Ragnarok Online, so it's up to you to get [[wikipedia:packet analyzer|the tools]] and ways to do it which work for you. It's up to you as well what to do with any so-called "protection" in your server's client that may get in the way.
  
OpenKore needs the following information about the Ragnarok Online server before it can login:
+
There may be problems determining [[Connectivity_Guide#Required|version]] and [[Connectivity_Guide#Required|master_version]] if your server's protocol has some kind of encryption. In that case, merely determining these values won't even help, the main issue is dealing with that encryption.
  
*The server name.
+
===WPE (Winsock Packet Editor)===
*The server's address (IP address or host name) and port number.
+
'''1.''' [http://wpepro.net/index.php?categoryid=4 Download] WPE and extract it.  
*The server's master version number.
 
*The server's server version number. (not the same as the master version number)
 
*The server's character encoding.
 
*The server's type version.  
 
  
 +
:* Before downloading, make a sure to disable your anti-virus as it can mark WPE as a virus and delete it. '''Download at your risk''', we will not be resposabilized if your computer crashes.
 +
:*  You will need some programs to extract it, the common ones are [http://www.rarlab.com/ WinRAR] and [http://www.7-zip.org/ 7zip].
  
==Getting Server Information==
+
'''2.''' Open your ragnarok but '''''don't login yet!''''' Leave it on the login screen and open WPE.
There are two ways for getting them, which is using [http://wpepro.net WPE] or [http://www.wireshark.org Wireshark]. WPE is the easiest one, because most ragnarok players are familiarized with it already or at least know what it does and how it works. But some servers block it's use, so you better use Wireshark.
 
  
===WPE (Winsock Packet Editor)===
+
'''3.''' At WPE's window, click on '''''Target Programs''''' button.
:'''1.''' Download and extract it. Download it [http://wpepro.net/download.html here].
+
:[[File:Targetyc.png]]
::'''<span style="color:red">Before downloading, make a sure to disable your anti-virus as it can mark WPE as a virus and delete it. Also, download at your risk, we will not be resposabilized if your computer crashes.</span>'''
 
  
::'''''Note:''''' You will need some programs to extract it, the common ones are [http://www.rarlab.com/ WinRAR] and [http://www.7-zip.org/ 7zip].
+
'''4.''' A window will open, search for the server's executable and double-click it.
 +
:[[File:clickrag.png]]
  
:'''2.''' Open your ragnarok but '''''don't login yet!''''' Leave it on the login screen and open WPE.
+
:'''Note.''' Some servers "hide" their executables by renaming it (like from xxxRO.exe to xxxx.dll or xxxxx.bin), so don't worry if the executable isn't a .exe one.
  
:'''3.''' At WPE's window, click on '''''Target Programs''''' button.
+
'''5.''' In the WPE's window, click on '''Play button'''.
::[[File:Targetyc.png]]
+
:[[File:play.png]]
  
 +
'''6.''' Switch to your Ragnarok's window, put and try to login.
 +
:'''Note.''' Valid login information are not needed.
  
::A window will open, search for your server's executable and double-click it.
+
'''7.''' Back to WPE's window, click on '''Stop button'''
:::[[File:clickrag.png]]
+
:[[File:stopjw.png]]
  
::'''''Note.''''' Some servers "hide" their executables by renaming it (like from xxxRO.exe to binadds.dll), so don't worry if your executable isn't a .exe one.
+
'''8.''' A window will open with recorded data. One of the packets sent to the server would be '''login packet''' which usually contains the server's '''version''', '''master_version''', '''IP''' and '''port''' - write them down because they are going to be used later. The packets will be different on each server, possible login packets may start with '''64 00''' or '''02 B0'''. Other packets (such as 18-byte-long '''02 04''') may be sent before login packet.
 +
:[[File:inforb.png]]
  
 +
:'''Legend''':
 +
#version (displayed as 4-byte unsigned number in [[wikipedia:endianness|little-endian]], in [[wikipedia:hexadecimal|hex]])
 +
#IP (as is)
 +
#port (as is)
 +
#master version (displayed as 1-byte unsigned number, in hex)
  
:'''4.''' In the WPE's window, click on '''Play button'''.
+
'''9.''' See [[Connectivity Guide#Converting Hexadecimal to Decimal numbers|Converting Hexadecimal to Decimal numbers]] to convert the master_version and version before configuring Kore.
::[[File:play.png]]
 
  
 +
===Wireshark===
 +
'''1.''' [http://www.wireshark.org/download.html Download] and install Wireshark.
  
:'''5.''' Maximize your Ragnarok's window and login. You don't need to login to the map-server, just the login-server is enough.
+
'''2.''' Open your ragnarok but '''''don't login yet!''''' Leave it on the login screen and open Wireshark.
::'''''Note.''''' Valid login information are not needed.
 
  
 +
'''3.''' At Wireshark's window, go to '''Capture > Options''' on the upper menu or press '''Ctrl + K'''.
 +
:[[File:Capiture.png]]
  
:'''6.''' Back to WPE's window, click on '''Stop button'''
+
'''4.''' In the top right box, select the interface that will be used to capture on. If there isn't any specific interface to use, select the one whose IP address is equal to the your ip address or is not '''''unknown'''''. Alternatively you can try all of them and use the one that records the packets. Set the others settings like the images bellow:
::[[File:stopjw.png]]
+
:[[File:Interface.PNG]]
  
 +
'''5.''' Click on '''Start button''' and go back to the Ragnarok window and login.
 +
:'''Note.''' Valid information are not needed.
  
::A window will open with some packets. Here we can find the server's '''version and master_version, IP and port'''.
+
'''6.''' Back to Wireshark and click on '''Stop button'''.
::The packets will be different on each server, but most of the time it will start with '''64 00'''.
+
:[[File:stop.png]]
::These are the packets that contains the version and master_version. Write them down because they are going to be used later.
 
:::[[File:inforb.png]]
 
  
::'''Legend''':
+
'''7.''' In Wireshark main window, you can see the TCP segments that were captured. Fill in the packet filter, but what to fill in depends on the username you used to login.
:#Version.
+
:Enter this in the "Filter" text box:  
:#IP
+
eth contains "xxxxxx" or eth contains xxxxxx
:#Port
 
:#Master version
 
  
 +
:Replace '''''xxxxxx''''' with the username that was used to login and press enter. In the example bellow, username was Mushroom.
 +
:[[File:filter.png]]
  
:'''7.''' Now, the '''version and master version''' need to be converted, because they are a hexadecimal number (base-16) and Kore expects a decimal number (base-10). Use [http://www.statman.info/conversions/hexadecimal.html this calculator]. With the numbers converted, you can now make openkore use it. See [[Connectivity Guide#Passing server information to OpenKore|Passing server information to OpenKore]].
+
'''8.''' There will be only one entry now, click on it to show some information about it. This is where the '''IP and port''' is stored.  
 +
:[[File:ip.png]]
  
 +
: Write down the IP and port.
  
===Wireshark===
+
'''9.''' On the entry again, right-click on it and go to '''Follow TCP Stream'''.
:'''1.''' Download and install Wireshark. (Download link [http://www.wireshark.org/download.html here]).
+
:[[File:tcp.png]]
  
:'''2.''' Open your ragnarok but '''''don't login yet!''''' Leave it on the login screen and open Wireshark.
+
'''10.''' A new window will open, in the bottom left, select '''Hex Dump'''.
 +
:[[File:hex.png]]
  
:'''3.''' At Wireshark's window, go to '''Capture > Options''' on the upper menu or press '''Ctrl + K'''.
+
'''11.''' These are the login packets. Take a look at it and write down the packets that contains the '''version and master version''' numbers. They are marked on the image bellow.
::[[File:Capiture.png]]
+
:[[File:packets.png]]
 +
* version displayed as 4-byte unsigned number in [[wikipedia:endianness|little-endian]], in [[wikipedia:hexadecimal|hex]]
 +
* master version displayed as 1-byte unsigned number, in hex
  
 +
'''12.''' See [[Connectivity Guide#Converting Hexadecimal to Decimal numbers|Converting Hexadecimal to Decimal numbers]] to convert the master_version and version before configuring Kore.
  
:'''4.''' In the "Interface" dropdown box, select an interface which you want to capture on. If you're unsure which interface to use, select the one whose IP address is equal to your ip address or is not '''''unknown'''''. Alternatively you can try all of them and use the one that records the packets. Set the others settings like the images bellow:
+
== Converting Hexadecimal to Decimal numbers ==
::[[File:options.png]]
+
Master_version and server version collected from the login packets are in hexadecimal number (base-16) and Kore expects a decimal number (base-10), so converting those numbers are needed before Kore can read them.
  
 +
Converting can be made using Windows' calculator or any other site that has a hex to dec calculator.
  
:'''5.''' After configuring the options, click on '''Start button''' and go back to your ragnarok and login. Loginning to the map-server is not needed, the login-server is enough.
+
'''1.''' Open Windows calculator '''Start > Accessories > Calculator'''.
::'''''Note.''''' Valid information are not needed.
+
:[[File:calc.PNG]]
  
:'''6.''' After loginning, go back to Wireshark and press the '''Stop button'''.
+
'''2.''' Go to '''View''' on the upper menu and click on '''Scientific'''.
::[[File:stop.png]]
+
:[[File:sci.PNG]]
  
 +
'''3.''' Check the circle beside '''Hex'''.
 +
:[[File:hexa.PNG]]
  
:'''7.''' In the Wireshark main window you can see the TCP segments that were captured. Fill in the packet filter, but what to fill in depends on the username you used to login.
+
'''4.''' On the calculator, type the number that you got for master_version and version. In the example, master_version hexadecimal number is '''10'''.
::Enter this in the "Filter" text box:
+
:[[File:type.PNG]]
  eth contains "xxxxxx" or eth contains xxxxxx
 
  
::Replace '''''xxxxxx''''' with your username that you used to login and press enter. In my example, my username was Mushroom.
+
'''5.''' Check the circle beside '''Dec'''.
:::[[File:filter.png]]
+
:[[File:dec.PNG]]
  
 +
'''6.''' After checking, the number shown should automatically be converted from hexadecimal to decimal.
 +
:[[File:done.PNG]]
  
:'''8.''' You will now have only one entry, click on it and you will have some information about it. This is where you are going to get the server's IP and port.
+
: You must convert '''master_version''' and '''version'''.
::[[File:ip.png]]
 
  
 +
== Configuring Openkore ==
 +
OpenKore reads server information from a file named '''servers.txt'''. The file is on ''tables'' folder.
  
::: Write down your ip and port because you are going to need them later.
+
If your server is not listed in the file, then add a new entry. If your server is already listed, then modify the existing entry.  
  
 +
=== Syntax ===
 +
[<server name>]
 +
ip <number/host>
 +
port <number>
 +
version <number>
 +
master_version <number>
 +
serverType <serverType name>
 +
serverEncoding <[[encoding]]>
 +
charBlockSize <number>
 +
addTableFolders <folder path>
 +
 +
# following options are optional
 +
private <[[boolean]]>
 +
recvpackets <file name>
 +
chatLangCode <[[boolean]]>
 +
storageEncryptKey <encrypt key>
 +
field_<location> <filename>
 +
clientHash <hex string>
 +
captcha <[[boolean]]>
 +
 +
gameGuard <number>
 +
 +
secureLogin <[[boolean]]>
 +
secureLogin_type <type>
 +
secureLogin_requestCode <hex string>
 +
secureLogin_account <[[boolean]]>
 +
 +
paddedPackets <[[boolean]]>
 +
paddedPackets_attackID <packet switches>
 +
paddedPackets_skillUseID <packet switches>
 +
 +
masterLogin_packet <packet switch></pre>
 
   
 
   
:'''9.''' On the entry again, right-click on it and go to '''Follow TCP Stream'''.
+
dead <[[boolean]]>
::[[File:tcp.png]]
+
dead_message <any text>
 +
title <any text>
 +
 
 +
 
 +
==== Required ====
  
 +
; [<server name>]
 +
: The name of the server that you want to bot. The name '''must be''' between '''[ ]'''.
 +
: Developers: avoid changing existing server names, it disrupts configurations. Instead use ''title'' option if you need to change displayed title for a server.
  
:'''10.''' A new window will open, in the bottom left, select '''Hex Dump'''.
+
; ip <number/host>
::[[File:hex.png]]
+
: Server's login IP.
  
 +
; port <number>
 +
: Server's login port number.
  
:'''11.''' Now we got the login packets. Take a look at it and write down the packets that contains the '''version and master version''' numbers. They are marked on the image bellow.
+
; version <number>
::[[File:packets.png]]
+
: Server's version (converted from hex to decimal).
  
 +
; master_version <number>
 +
: Server's master_version (converted from hex to decimal).
  
:'''12.''' With the informations above, you have to convert them, because they're a hexadecimal number (base-16) and Kore expects a decimal number (base-10). You can use [http://www.statman.info/conversions/hexadecimal.html this calculator]. With the numbers converted, you can now make openkore use it. See the section bellow for how to use it.
+
; [[serverType]]
 +
{{Available since 2.1}}
 +
: Server's type. Each official server has its own serverType, private servers must use '''kRO serverTypes''' according to executables dates.
  
 +
; serverEncoding <[[encoding]]>
 +
: Character encoding.
  
==Passing server information to OpenKore==
+
{{:charBlockSize}}
OpenKore reads server information from a file named servers.txt. The file is on ''tables'' folder.
 
  
If your server is not listed in the file, then add a new entry. If your server is already listed, then modify the existing entry. Here is the format:
+
; addTableFolders <folder path>
 +
: Configures Kore to load tables file from the specified path (relative to the tables directory).
 +
: Used only when there is no [[Command Line Arguments|--tables]] specified.
 +
: For english ones, you can use
 +
addTableFolders translated/kRO_english
 +
: or
 +
addTableFolders iRO
  
[Server's Name] -> Your server's name. Must be between '[' and ']'
+
==== Optional ====
ip x.x.x.x -> Your server's IP.
 
port xxxx -> Your server's port number.
 
master_version xx -> Your server's master_version. The one that you converted from hex to
 
  decimal.
 
version xx -> The server's version. The one that you converted from hex to decimal.
 
serverType xxx -> Your serverType. For privates default one is 8_4. Officials one have
 
  their own.
 
charBlockSize xx -> Set this if you are getting wrong char name and job name. Default is 106.
 
serverEncoding xxxx -> Character encoding. More information read bellow.
 
private 1 -> Only set this if the bot connects to the wrong map server IP.
 
  Used by private servers.
 
recvpackets xxxxxx.txt -> Your recvpackets' name file. It this option is not set, it will use
 
  the default one (recvpackets.txt). More informations read bellow.
 
  
 +
; captcha <[[boolean]]>
 +
: Configure Kore to use the captcha 'protocol'.
  
And here is an example:
+
{{:chatLangCode}}
[MushroomRO]
+
<!--
ip 127.0.0.1
+
; field_<location> <filename>
port 6900
+
: Use morocc-old.fld instead morocc.fld: <pre>field_morocc morocc-old</pre>
master_version 16
 
version 20
 
serverType 8_4
 
charBlockSize 108
 
serverEncoding Western
 
recvpackets mush-recvpackets.txt
 
  
After having modified servers.txt, restart OpenKore.
+
; clientHash <hex string>
 +
: ??
 +
-->
  
 +
; gameGuard <number>
 +
: Used for GameGuard and HackShield. See also: [[Poseidon]].
  
===Character encoding===
+
; private <[[boolean]]>
The character encoding cannot be automatically detected, but here's a list of possible character encodings that you can use:  
+
: Set this option if Openkore connects to a wrong map-server IP. Usually for private servers.
 +
<!--
 +
; paddedPackets <[[boolean]]>
 +
: ??
  
{| class="wikitable" border="1" cellspacing="0"
+
; paddedPackets_attackID <packet switches>
|-style=background-color:#F9F9F9;
+
: ??
!Encoding
+
   
!Language used
+
; paddedPackets_skillUseID <packet switches>
|-
+
: ??
|align=center|Western
 
| English, or a language which uses a Roman-based alphabet. For example, German, French, Portuguese, etc., but also Indonesian.
 
|-
 
|align=center|Simplified Chinese
 
|  Simplified Chinese.
 
|-
 
|align=center|Traditional Chinese
 
|  Traditional Chinese.
 
|-
 
|align=center|Korean
 
|  Korean
 
|-
 
|align=center|Russian
 
|  Russian, or a Cyrillic-based language.
 
|-
 
|align=center|Japanese
 
|  Japanese
 
|-
 
|align=center|Thai
 
|  Thai
 
|}
 
  
==Packet Length Extractor==
+
; secureLogin <[[boolean]]>
Packet Length Extractor is a program which retreives the packet lengths from the RO client and stores them in recvpackets.txt.
+
: ??
If you're having server problems, such as:
 
*Packet Tokenizer: Unknown switch: xxxx
 
*Getting disconnected after a few seconds
 
*NPCs, players and monsters are not recognized by Kore
 
  
Then generating a new recvpackets.txt might solve the problem. It's advisable to '''''always''''' extract the recvpackets for any server that you will play. The file must be on tables folder.
+
; secureLogin_type <type>
 +
: ??
  
'''''Note.''''' You may have problems extracting the recvpackets if your server's client has some kind of protection.
+
; secureLogin_requestCode <hex string>
 +
: ??
  
 +
; secureLogin_account <[[boolean]]>
 +
: ??
 +
-->
  
===About Recvpackets===
+
; recvpackets <file name.txt>
The network data that the server sends to Kore, is a byte stream. Kore must be able to recognize messages inside that byte stream to be able to do something with it. But the size of the messages can vary from to server to server. Recvpackets.txt contains information about the size of each message, so Kore can correctly split the byte stream into messages.
+
: Configures file's name for recvpackets. See also: [[Packet Length Extractor]].
  
 +
; masterLogin_packet <packet switch>
 +
: Overrides master login packet switch (but not its structure). Required for [[XKore]] 2 if it's different from 0064.
  
===Download===
+
=== Example ===
There are two programs you can use to extract the recvpackets:
+
[MushroomRO]
*JCV's RO Tools
+
ip 127.0.0.1
*OpenKore Packet Length Extractor
+
port 6900
 +
master_version 16
 +
version 20
 +
serverType kRO_RagexeRE_2010_01_26a
 +
charBlockSize 108
 +
serverEncoding Western
 +
recvpackets mush-recvpackets.txt
 +
addTableFolders iRO
  
It's better to use JCV's RO Tools as it is more up to date and have some fixes for newer clients. Also it's much easier to maintain, but it has undesirable and outdated options in addition to the packet extractor.
+
[[Category:servers.txt]]
*[http://www.megaupload.com/?d=7PXQ9J1N JCV's RO Tools v1.0.3]
 
*[http://www.megaupload.com/?d=MLUVJLSL OpenKore Packet Length Extractor v1.1.0]
 

Revision as of 16:33, 10 February 2019

Getting Server Information

OpenKore comes with a list of official servers information only, because of the high amount of private servers, it is impossible to have and keep them updated, so private servers players should follow this guide to get and update their server information. Before continuing, read the list of unsupported servers. Your server might have anti-bot protection resulting in not being supported by Openkore.

OpenKore requires the following information about the Ragnarok Online server before it can initialize and login:

There are detailed instructions on collecting server information with WPE or Wireshark. This kind of packet analyze isn't anything special for OpenKore or Ragnarok Online, so it's up to you to get the tools and ways to do it which work for you. It's up to you as well what to do with any so-called "protection" in your server's client that may get in the way.

There may be problems determining version and master_version if your server's protocol has some kind of encryption. In that case, merely determining these values won't even help, the main issue is dealing with that encryption.

WPE (Winsock Packet Editor)

1. Download WPE and extract it.

  • Before downloading, make a sure to disable your anti-virus as it can mark WPE as a virus and delete it. Download at your risk, we will not be resposabilized if your computer crashes.
  • You will need some programs to extract it, the common ones are WinRAR and 7zip.

2. Open your ragnarok but don't login yet! Leave it on the login screen and open WPE.

3. At WPE's window, click on Target Programs button.

Targetyc.png

4. A window will open, search for the server's executable and double-click it.

File:clickrag.png
Note. Some servers "hide" their executables by renaming it (like from xxxRO.exe to xxxx.dll or xxxxx.bin), so don't worry if the executable isn't a .exe one.

5. In the WPE's window, click on Play button.

File:play.png

6. Switch to your Ragnarok's window, put and try to login.

Note. Valid login information are not needed.

7. Back to WPE's window, click on Stop button

File:stopjw.png

8. A window will open with recorded data. One of the packets sent to the server would be login packet which usually contains the server's version, master_version, IP and port - write them down because they are going to be used later. The packets will be different on each server, possible login packets may start with 64 00 or 02 B0. Other packets (such as 18-byte-long 02 04) may be sent before login packet.

File:inforb.png
Legend:
  1. version (displayed as 4-byte unsigned number in little-endian, in hex)
  2. IP (as is)
  3. port (as is)
  4. master version (displayed as 1-byte unsigned number, in hex)

9. See Converting Hexadecimal to Decimal numbers to convert the master_version and version before configuring Kore.

Wireshark

1. Download and install Wireshark.

2. Open your ragnarok but don't login yet! Leave it on the login screen and open Wireshark.

3. At Wireshark's window, go to Capture > Options on the upper menu or press Ctrl + K.

Capiture.png

4. In the top right box, select the interface that will be used to capture on. If there isn't any specific interface to use, select the one whose IP address is equal to the your ip address or is not unknown. Alternatively you can try all of them and use the one that records the packets. Set the others settings like the images bellow:

Interface.PNG

5. Click on Start button and go back to the Ragnarok window and login.

Note. Valid information are not needed.

6. Back to Wireshark and click on Stop button.

File:stop.png

7. In Wireshark main window, you can see the TCP segments that were captured. Fill in the packet filter, but what to fill in depends on the username you used to login.

Enter this in the "Filter" text box:
eth contains "xxxxxx" or eth contains xxxxxx
Replace xxxxxx with the username that was used to login and press enter. In the example bellow, username was Mushroom.
File:filter.png

8. There will be only one entry now, click on it to show some information about it. This is where the IP and port is stored.

File:ip.png
Write down the IP and port.

9. On the entry again, right-click on it and go to Follow TCP Stream.

File:tcp.png

10. A new window will open, in the bottom left, select Hex Dump.

File:hex.png

11. These are the login packets. Take a look at it and write down the packets that contains the version and master version numbers. They are marked on the image bellow.

File:packets.png
  • version displayed as 4-byte unsigned number in little-endian, in hex
  • master version displayed as 1-byte unsigned number, in hex

12. See Converting Hexadecimal to Decimal numbers to convert the master_version and version before configuring Kore.

Converting Hexadecimal to Decimal numbers

Master_version and server version collected from the login packets are in hexadecimal number (base-16) and Kore expects a decimal number (base-10), so converting those numbers are needed before Kore can read them.

Converting can be made using Windows' calculator or any other site that has a hex to dec calculator.

1. Open Windows calculator Start > Accessories > Calculator.

File:calc.PNG

2. Go to View on the upper menu and click on Scientific.

File:sci.PNG

3. Check the circle beside Hex.

File:hexa.PNG

4. On the calculator, type the number that you got for master_version and version. In the example, master_version hexadecimal number is 10.

File:type.PNG

5. Check the circle beside Dec.

File:dec.PNG

6. After checking, the number shown should automatically be converted from hexadecimal to decimal.

File:done.PNG
You must convert master_version and version.

Configuring Openkore

OpenKore reads server information from a file named servers.txt. The file is on tables folder.

If your server is not listed in the file, then add a new entry. If your server is already listed, then modify the existing entry.

Syntax

[<server name>]
ip <number/host>
port <number>
version <number>
master_version <number> 
serverType <serverType name>
serverEncoding <encoding>
charBlockSize <number>
addTableFolders <folder path>

# following options are optional
private <boolean> 
recvpackets <file name>
chatLangCode <boolean>
storageEncryptKey <encrypt key>
field_<location> <filename>
clientHash <hex string>
captcha <boolean>

gameGuard <number>

secureLogin <boolean>
secureLogin_type <type>
secureLogin_requestCode <hex string>
secureLogin_account <boolean>

paddedPackets <boolean>
paddedPackets_attackID <packet switches>
paddedPackets_skillUseID <packet switches>

masterLogin_packet <packet switch>

dead <boolean>
dead_message <any text>
title <any text>


Required

[<server name>]
The name of the server that you want to bot. The name must be between [ ].
Developers: avoid changing existing server names, it disrupts configurations. Instead use title option if you need to change displayed title for a server.
ip <number/host>
Server's login IP.
port <number>
Server's login port number.
version <number>
Server's version (converted from hex to decimal).
master_version <number>
Server's master_version (converted from hex to decimal).
serverType
Development.pngThe following documentation describes a feature that was greatly changed in SVN trunk (latest development version) since the last release.
It may work differently or not be available if you're using 2.0.7 or any older version.
Server's type. Each official server has its own serverType, private servers must use kRO serverTypes according to executables dates.
serverEncoding <encoding>
Character encoding.
charBlockSize <value>
Length (in bytes) of data block describing each of your characters in the packet with character list (received_characters) on character selection screen.

Correct value for a server may be not supported by a specific serverType or not supported at all, so merely trying values mentioned here may not be enough.

charBlockSize kRO date Kore version Notes
New charBlockSizes are being constantly introduced.
175 2020-10-07 6b369db HP and SP int64
155 (default) 2017-08-30 a6d3f87 exp int64
147 2014-10-22 df50355 walk_speed long
146 N/A 3aeba6a
145 2014-10-16 3001eab and 8fa8dfa iRO's Doram update
144 2011-10-25 876acab "rename char"
140 2011-09-28 876acab "change slot feature"
136 2011-01-11 b5b8e07 "robe"
132 2010-08-03 b5b8e07 "delete date"
128 daefa83 last_map 16 Bytes
124 3b07ffe bRO (bifröst update)
116 addabe5
112 9862177 Topic on the forum
108 9862177 Topic on the forum
106

Dates are for a reference with default Athena configuration only, any server can reconfigure that.

In Athena code base, function mmo_char_tobuf generates character blocks.

Development.pngImplementation of this feature is expected to become outdated with server updates.
As OpenKore is a free project, if you stumble upon such updates, you are expected to fix the problem and contribute your changes back. Usually, server supporters will do that, but there isn't any for random private servers, and some official ones may not always be covered.


addTableFolders <folder path>
Configures Kore to load tables file from the specified path (relative to the tables directory).
Used only when there is no --tables specified.
For english ones, you can use
addTableFolders translated/kRO_english
or
addTableFolders iRO

Optional

captcha <boolean>
Configure Kore to use the captcha 'protocol'.
chatLangCode <boolean>
Enables support for language codes (a pipe and two hexadecimal digits) in chat messages.


gameGuard <number>
Used for GameGuard and HackShield. See also: Poseidon.
private <boolean>
Set this option if Openkore connects to a wrong map-server IP. Usually for private servers.
recvpackets <file name.txt>
Configures file's name for recvpackets. See also: Packet Length Extractor.
masterLogin_packet <packet switch>
Overrides master login packet switch (but not its structure). Required for XKore 2 if it's different from 0064.

Example

[MushroomRO]
ip 127.0.0.1
port 6900
master_version 16
version 20
serverType kRO_RagexeRE_2010_01_26a
charBlockSize 108
serverEncoding Western
recvpackets mush-recvpackets.txt
addTableFolders iRO