![]() |
If I create a user through the TS backend, the user is added to the MySQL DB fine. The password is hashed as it's not the same as the plain text.
If I create a user through the hack that user also appears in the MySQL DB fine and the password is visible in plain text. However the TS-created user can connect but the hack-created user gets a bad login message. Other than that the hack works perfectly. I'll investigate this as well and let you know if I get anywhere. |
Hmm, in mySQL 4.0 TS users are plain text. I know that as of 4.1 there was some password changes, but didn't realize it would affect the TS password field. I will have to look into that.
|
There's MD5 hashing on my passwords for some reason. Possibly a change in MySQL 5.
|
I'm pretty sure this is to do with the way MySQL 5 hashes passwords. Just to make sure if someone could post me their TS install folder, minus server.ini and server.log so I can try with that I would appreciate it.
|
Quote:
See: http://dev.mysql.com/doc/mysql/en/Ap...sword_use.html Quote:
Teamspeak2 needs this to work, it has nothing to do with this hack. I am quite sure this will work for you. |
I followed that and got the correct mysql output from the command prompt.
The passwords from the hack are still stored in plain text though and this means they don't connect to the server. I have the following in the database : tscreateduser - password : 1d427ce2b82bc4e30b2012c6f6df2e6a (tsuser in plain text) gteamspeakuser - password : tsuser ( stored in plain text ) I'm going to look today at how I might change the PHP to incorporate the new MySQL 5 hashing of passwords. |
There is an option to turn the hashing off. If I am correct its "--disable-hash" but I am not using MySQL 5 and cannot say how this works for a single db.
You can try to check this db with phpMyAdmin and see if you have an option there to turn hashing off. phpMyAdmin often surprises me which such things :-) |
I have done the opposite :) I went into phpMyAdmin and used the MD5 function on a plain text password to create a hashed pass. This then works fine. Now to get it to do this automatically with all passwords :)
EDIT: OK, what I've done is edit gteamspeak.php, Line 98 (password updates) to read Code:
func_gts_query("UPDATE " . $ts2db['name'] . "ts2_clients SET s_client_name = '" . $ts2info['username'] . "', s_client_password = MD5('" . $ts_password . "') WHERE s_client_name = '" . $ts2info['username'] . "' AND i_client_server_id = '" . $ts2db['serverid'] . "'"); Code:
func_gts_query("INSERT INTO " . $ts2db['name'] . "ts2_clients SET i_client_server_id = '" . $ts2db['serverid'] . "', b_client_privilege_serveradmin = '" . $sa_status . "', s_client_name = '" . $ts2info['username'] . "', s_client_password=md5('" . $ts_password . "'), dt_client_created='" . $createtime . "'"); I can live with this for now as I'll just comment out the references and display some text instead and delete the connect links. I'll work on this further if anyone else wants these features to work. |
I'm confused...can I not use this mod if I have a teamspeak server setup somewhere like www.defconservers.com ? I'd really like to incorporate my teamspeak server into my forums if at all possible.
|
Is the following plugin possible ?
via cron : Check if the teamspeak-user has a forumaccount, if not: ban from the ts ? Thank you! |
All times are GMT. The time now is 03:16 AM. |
Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|