I'm currently trying to build an RCON tool (in C++), but I've come across
something strange and apparently undocumented. So far I've only implemented
SERVERCOMMAND_AUTH, but this is the output I'm getting on 127.0.0.1
(password is "password", buffer is 255 bytes):

Authentication packet:
0x16 0x0 0x0 0x0 0x0 0x0 0x0 0x0 0x3 0x0 0x0 0x0 0x70 0x61 0x73 0x73 0x77
0x6F 0x72 0x64 0x0 0x0
Sent Authentication packet.
Bytes received: 16
&☺

Bytes received: 254
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "
http://www.apple.com/DTDs/PropertyList-1.0.dtd";>
<plist version="1.0">
<dict>
        <key>MessageType</key>
        <string>Result</string>
        <key>Number</key>
        <integer>6</in

Bytes received: 24
teger>
</dict>
</plist>


Connection closed


Since when did Source send PLIST responses? I'm unable to get a packet
capture of this as Wireshark can't capture loopback, and Source Multiplayer
Dedicated Server (running TF2) is flat out not responding if I query on my
adapter's IP, even from another machine. Has the RCON protocol changed?
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlcoders

Reply via email to