I'm currently trying to build an RCON tool (in C++), but I've come across something strange and apparently undocumented. So far I've only implemented SERVERCOMMAND_AUTH, but this is the output I'm getting on 127.0.0.1 (password is "password", buffer is 255 bytes):
Authentication packet: 0x16 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x3 0x0 0x0 0x0 0x70 0x61 0x73 0x73 0x77 0x6F 0x72 0x64 0x0 0x0 Sent Authentication packet. Bytes received: 16 &☺ Bytes received: 254 <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" " http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>MessageType</key> <string>Result</string> <key>Number</key> <integer>6</in Bytes received: 24 teger> </dict> </plist> Connection closed Since when did Source send PLIST responses? I'm unable to get a packet capture of this as Wireshark can't capture loopback, and Source Multiplayer Dedicated Server (running TF2) is flat out not responding if I query on my adapter's IP, even from another machine. Has the RCON protocol changed?
_______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlcoders