Показать сообщение отдельно
Старый 02.08.2010, 04:05   #1
snowlynx
Гость
 
Сообщений: n/a
По умолчанию Проблема с авторизацией

Установил Mangos согласно вот этому гайду

Сервер и реалм запустились без особых проблем. Запускаю клиент WoW, и теперь при попытке авторизоваться говорит что я ввел неправильные данные.

В realmd.accaunt создал своего пользователя, так же менял sha хеши GM,и ADMIN на свои. резултат везед один и тот же. " Вы указали неверные сведения......"

Хотя в монитринге SQL подключение от realmd есть.

Вот что собственно в логах
Код:
MaNGOS/0.16.0-DEV (2010-06-29 20:39:08 Revision 10121 - 198b26dfae644c0d19a83755
f7ad924debfe5b9b) for Win32 (little-endian) [realm-daemon]
<Ctrl-C> to stop.

Using configuration file realmd.conf.
OpenSSL 1.0.0 29 Mar 2010 (Library: OpenSSL 1.0.0 29 Mar 2010)
Using ACE: 5.6.6
Max allowed open files is 4096
Daemon PID: 3936

Database: 127.0.0.1;3306;root;310469;realmd
Connected to MySQL database at 127.0.0.1
MySQL client library: 5.0.56
MySQL server ver: 5.0.24-community-nt
AUTOCOMMIT SUCCESSFULLY SET TO 1
[0 ms] SQL: SELECT required_10008_01_realmd_realmd_db_version FROM realmd_db_version LIMIT 1
Updating Realm List...
[0 ms] SQL: SELECT id, name, address, port, icon, realmflags, timezone, allowedSecurityLevel, population, realmbuilds FROM realmlist WHERE (realmflags & 1) = 0 ORDER BY name
Added realm "Devostator"
realmd process priority class set to HIGH

[0 ms] SQL: SET NAMES `utf8`
[0 ms] SQL: SET CHARACTER SET `utf8`
[0 ms] SQL: UPDATE account_banned SET active = 0 WHERE unbandate<=UNIX_TIMESTAMP
() AND unbandate<>bandate
[0 ms] SQL: DELETE FROM ip_banned WHERE unbandate<=UNIX_TIMESTAMP() AND unbandate<>bandate
Accepting connection from '127.0.0.1'
[Auth] got data for cmd 0 recv length 39
Entering _HandleLogonChallenge
[AuthChallenge] got header, body is 0x23 bytes
[AuthChallenge] got full packet, 0x23 bytes
[AuthChallenge] name(5): 'ADMIN'
[15 ms] SQL: SELECT unbandate FROM ip_banned WHERE (unbandate = bandate OR unban
date > UNIX_TIMESTAMP()) AND ip = '127.0.0.1'
[0 ms] SQL: SELECT sha_pass_hash,id,locked,last_ip,gmlevel,v,s FROM account WHERE username = 'ADMIN'
[AuthChallenge] Account 'ADMIN' is not locked to ip
[0 ms] SQL: SELECT bandate,unbandate FROM account_banned WHERE id = 1 AND active = 1 AND (unbandate > UNIX_TIMESTAMP() OR unbandate = bandate)
database authentication values: v='3811D9961D08F14E9C34C058104499D6726ED555E24D2FA5167E6F1F6E39004E' s='ACAE1D39F9250F84A1EB235A6F238B5C4C4F772CBDC40B720972E09B
BA57B48B'
[AuthChallenge] account ADMIN is using 'ruRU' locale (8)
[Auth] got data for cmd 1 recv length 75
Entering _HandleLogonProof
[AuthChallenge] account ADMIN tried to login with wrong password!
Accepting connection from '127.0.0.1'
[Auth] got data for cmd 0 recv length 39
Entering _HandleLogonChallenge
[AuthChallenge] got header, body is 0x23 bytes
[AuthChallenge] got full packet, 0x23 bytes
[AuthChallenge] name(5): 'ADMIN'
[0 ms] SQL: SELECT unbandate FROM ip_banned WHERE (unbandate = bandate OR unbandate > UNIX_TIMESTAMP()) AND ip = '127.0.0.1'
[0 ms] SQL: SELECT sha_pass_hash,id,locked,last_ip,gmlevel,v,s FROM account WHERE username = 'ADMIN'
[AuthChallenge] Account 'ADMIN' is not locked to ip
[0 ms] SQL: SELECT bandate,unbandate FROM account_banned WHERE id = 1 AND active = 1 AND (unbandate > UNIX_TIMESTAMP() OR unbandate = bandate)
database authentication values: v='3811D9961D08F14E9C34C058104499D6726ED555E24D2FA5167E6F1F6E39004E' s='ACAE1D39F9250F84A1EB235A6F238B5C4C4F772CBDC40B720972E09BBA57B48B'
[AuthChallenge] account ADMIN is using 'ruRU' locale (8)
[Auth] got data for cmd 1 recv length 75
Entering _HandleLogonProof
[AuthChallenge] account ADMIN tried to login with wrong password!