|
Author |
Thread Statistics | Show CCP posts - 40 post(s) |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.03.15 12:41:00 -
[1] - Quote
I encountered similar issues with broken downloads.
My case seems to be ISP centric. Been encountering patch issues with every released update dependent on the launcher.
Every time, my troubvles were resolved by running the launcher through an OpenVPN tunnel to another ISP.
I haven't had the time to run a network sniffer yet (network engineer here) but I suspect the TCP sessions are being reset.
I'll do caps if I encounter problems next patch and post em here.
KT |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.03.15 12:53:00 -
[2] - Quote
Traceback (most recent call last): File "lib\update.pyc", line 527, in Update File "lib\update.pyc", line 553, in _Update File "lib\update.pyc", line 277, in Run File "zsync\zsync.pyc", line 1209, in CreatePatch File "zsync\zsync.pyc", line 896, in GetInfo File "stuff\bundle.pyc", line 136, in ReadIndex error: Error -5 while decompressing data: incomplete or truncated stream
==
Pretty clear that something is causing the data transfer to end prematurely resulting in a truncated patch file. Maybe WAN optimisation technologies employed by some ISPs are messing with the data stream?
KT |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.03.15 13:26:00 -
[3] - Quote
Heh therein lies the catch. All the large ISPs around the world use a small number of vendors for their systems... Bluecoat, Juniper Networks, Cisco etc.
Just takes one major vendor's kit to hiccup to affect a large number of people.
I did call my ISP last week at 3am local about a routing loop to a certain /22 in Iceland. It was their problem and they fixed it.
KT |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.03.15 13:42:00 -
[4] - Quote
Abyss Azizora wrote:Now even your freaking link to the updated repair tool is broken...
I confirm this. Just got the download terminated prematurely.
You guys may have a network issue on your hands.
Gonna fire up wireshark.
KT |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.03.15 14:16:00 -
[5] - Quote
Some tests seem to indicate issues with caching proxies. If a lousy copy what ever is being downloaded is stored in the proxy cache, future downloads from that cache will be lousy. Using an open proxy may help in this case. Google will help you with getting a list..
KT |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.03.15 14:26:00 -
[6] - Quote
hiwil wrote:Same problem here, i disabled all firewalls and anything else using the internet. still no fix. So i uninstall and redownload the whole client again, and guess what??? Still broken, i am unable to use the one link download and the three link download it just gives me an unexpected error has occured. Please fix this!
Try downloading using an open proxy.
http://hidemyass.com/proxy/
Paste the download URL in and execute.
I am not sure if they will let you DL the whole multi gig client tho. The repair.exe file went through just fine.
KT |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.03.17 12:06:00 -
[7] - Quote
Well CCP, I think something in your code is triggering a false positive with enterprise intrusion detection/prevention system some ISPs use. See the post from the user in Israel. The same issue is probably why ESET users need to disable a firewall feature.
My ISP probably uses a similar system. And no I have had no luck convincing them to tell me what they use.
I have a private VPN service to fall back upon, but I daresay few folk have that luxury.
I did do some quick packet captures with this patch. The client is receiving an TCP RST packet. Probably injected by the IPS system to kill the transfer.
Good luck fixing this one. I'd say check with ESET to find out what is triggering the false positive and modify the code to no longer trigger...
Not sure how else a fix might be done.
KT |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.03.18 02:58:00 -
[8] - Quote
This should fix most ills but will require you to fork out some money.
Go to a VPN service provider and sign up for their cheapest plan.
Connect to VPN and run repair.exe
It should work then as this will bypass any ISP based system that is killing connections to the EVE download server.
You wil have to google for providers. I personally use Strong***.
==
I wouldn't personally call all the ills CCP's fault. There are some scenarios like this one that no amount of testing will detect.
I hope they compensate affected parties in some way in any case when they eventually fix the problem.
KT |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.03.20 21:38:00 -
[9] - Quote
Thanks for the deep analysis Alunia.
KT |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.03.20 21:43:00 -
[10] - Quote
ZyndeII wrote: Nope. This was one of the first things I tried, using my university's VPN client. Not a chance.
The general problem with the "fixes" in this thread is, that there's a lot of very different issues and each fix will only work in a specific situation if you also have that specific problem.
Chances are your Uni is far more anal about security than your ISP (See Alunia's post) which is why the patch failed. At least mine was. They proxied and scanned everything. You will need to use a commercial VPN service with no fancy hidden ding dongs.
KT |
|

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.03.24 13:58:00 -
[11] - Quote
When you use VPN, traffic is encrypted effectively bypassing any packet inspection software your router or ISP may be operating. It however does not bypass any software firewalls you have on the computer, or that operated by your VPN provider (i.e. your employer)
KT |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.04.25 04:51:00 -
[12] - Quote
CCP, is anything being done to address the issue being security appliances used by the ISP whose configuration is beyond the reach of the end user?
I am getting tired of having to connect to a (paid) VPN service to run repair.exe everytime there is a launcher patch. I am a IT professional and I know my system well enough to know my local software is not to blame for the launcher troubles.
My ISP is Starhub, which is one of the largest service providers in Singapore.
Several other eve players who use the same provider seem to be affected.
Unless some kind of fix is applied, our options are probably limited to using VPN services or changing to a different ISP at this time.
Or not playing Eve.
KT |

Kenryuu Takamachi
Black Thorne Corporation Black Thorne Alliance
0
|
Posted - 2012.05.02 09:59:00 -
[13] - Quote
Well, as mentioned before, my workaround is simple and 100% effective.
Only problem is that it costs money - I have other uses for this so I do not mind... but folk may be hard pressed paying $10 a month just for a service enabling them to patch Eve.
I signed up for a VPN account with StrongVPN.
When the need arises to patch, I turn on VPN so all packets between my terminal and the VPN server in Germany are encrypted. This effectively renders ineffective any packet inspection hardware the my local ISP has, thus allowing me to successfully complete the patch.
KT |
|
|
|