Open MarkElf opened 5 years ago
I don’t recall changing anything that would effect this, I’ll have to take a second look though.
Thanks for reporting.
I have confirmed it to be the same prior to any changes made on your end (b1149 and b1139). Sorry for not mentioning that earlier. It is a general issue with NCP.
The client is speeding up/sending a very small burst of packets to simulate a player jumping. This would be a bypass of the MorePackets check than SurvivalFly, which was originally thought. I may rework the MorePackets check just because the false positives it produces and the protection is somewhat limited. I just need to take a further look at a good detection method and what exactly the client is doing.
Full output of /ncp version - pasted from NCP Log.
Server
git-Paper-600 ~MC: 1.13.2~ detected: 1.13.2
NoCheatPlus
Plugin: 1.3-beta.4-CustomFork MCAccess: 1.4.5-1.12.2|? / CB-Reflect Hooks: AllViolations~NCP~ 1.0
Related Plugins
ProtocolLib v4.4.0 | ProtocolSupport v4.29-dev
Describe the issue
Step works going up one block increments in a teleport-like fashion, without generating any VL.
How to reproduce the issue
I've used Wurst (Both legit and simple), and have been told Sigma works as well.
Extra links/Videos (Including debug logs)
https://pastebin.com/Hcy3rkMT - Pretty much just spidering/teleporting up blocks
Any possible config options changed or plugins that may cause interference?
Default configuration.