问题描述:

I have been working hard on a Python-based Minecraft server proxy. I have followed the information here, yet I still seem to get more data then I asked for. The problem occurs right after I send the packet 0xCD with a single byte of 0. Logically, the next packet from the server should be a 0x01 login. However, I end up with a large amount of seemingly random data between the send and the 0x01 packet ID. What is up?

All my code is located here:

https://github.com/meta1203/MetaProxy

Thanks!

相关阅读:
Top