Jump to content

Recommended Posts

Posted

I'm running the latest version of Forge (build 738) on an MCPC+ (build 649) server for 1.5.2, and the client has the same MC and Forge version.

Both client and server OS are Win 7 Ultimate x64 and my Java version reports it's JRE 7 Update 45, although I have both x64 and x86 versions of both jre6 and jre7 on the client and server computers.

 

When any user tries to connect to the server, they are disconnected with a message that says "Internal server error", and the server console shows the following error: https://gist.github.com/anonymous/ec40cb3b30237593bd25

 

The entire log file is at https://gist.github.com/anonymous/8dbc985e9cc9fcbe3e40/.

 

I have already tried adding the 1.5.2 forge lib files to the lib folder on the server, which only had the files starting in "asm" and "deobfuscation" prior. The client already had all the files. The missing files from the server lib folder appear to be only needed in the client, as they are not marked as in-use when the server is running.

I have also tried copying the jacob-1.17-M2-x86 and x64 dll files into each of my java installation bin folders (x64 jre6, x64 jre7, x86 jre6, and x86 jre7).

I redownloaded the latest Forge build for the client and renamed it to modpack.jar. The only thing in the old modpack.jar was Forge as well.

The version of MCPC I'm using works on an FTB Unleashed server where the client is running Forge build 737.

Also, this issue was tested with Forge builds 734 and 738 on the client, both with the same result.

 

If you need any more information, just ask me. I'm glad to provide anything you need to help fix this issue!

Posted
  Quote
I'm running the latest version of Forge (build 738) on an MCPC+ (build 649) server

 

MCPC+ is not an official build of forge. You should probably take it up with the MCPC+ guys.

 

Also, a 1.5.2 server is very old now - and as such would not get any support here anyway.

Guest
This topic is now closed to further replies.

Announcements



  • Recently Browsing

    • No registered users viewing this page.
  • Posts

    • There is an issue with Modular Force Field System (mffs) Remove it or try other builds
    • I never imagined I would be writing this kind of testimony, but I feel it’s important to share my experience with Malice Cyber Recovery and how they helped me recover $230,000 I lost to crypto scammers. A few months ago, I got involved in a crypto investment opportunity that seemed legitimate at first. The scammers were incredibly convincing. They showed me impressive returns, sent regular updates, and even gave me access to what looked like a real trading platform. I was initially cautious, but after seeing the returns, I began to invest more, ultimately transferring over $230,000. Unfortunately, after a few weeks, when I tried to withdraw my funds, I found that the platform had disappeared, and I could no longer contact anyone involved. It was clear I had been scammed, and I felt completely helpless. For weeks, I tried everything to get my money back—contacting the authorities, reaching out to the platform’s so-called support team (who of course were unreachable), and trying to trace the transactions myself. But everything led to dead ends. The more I researched, the more I realized just how hard it was to recover stolen crypto. I began to lose hope. That’s when I came across Malice Cyber Recovery. At first, I was skeptical. Could they really help me recover my funds after everything I had been through? I decided to reach out anyway, just to see if they could offer any guidance. From the very first conversation, their team was not only professional but also deeply empathetic. They understood exactly how I was feeling and immediately made it clear that they were dedicated to helping me recover my lost funds. Malice Cyber Recovery’s team got to work quickly. They walked me through every step of the process, explaining the methods they would use to track down my stolen crypto. Their knowledge of blockchain technology and how to trace crypto transactions was incredibly impressive. They didn’t just give me vague promises they showed me the action they were taking and the progress they were making, which gave me hope that my money wasn’t gone forever. One of the most reassuring aspects of working with Malice Cyber Recovery was their transparency. They kept me updated regularly, letting me know what they were doing, what obstacles they encountered, and how they were overcoming them. It wasn’t an easy process; tracing funds through blockchain and dealing with scammers who hide behind fake identities and complex networks is incredibly difficult. But Malice Cyber Recovery’s team was relentless. They used advanced tools and techniques to trace the flow of my funds, and within just a few weeks, they managed to locate a significant portion of my lost funds. I couldn’t believe it when they informed me that they had successfully recovered a large chunk of my money. I never thought I’d see that $230,000 again. The recovery process wasn’t instantaneous it  took time, patience, and persistence but Malice Cyber Recovery delivered on their promise.  
    • Almost, just the java -server -Xmx4G -Xms4G -Dlog4j.configurationFile=log4jformattingfix.xml -jar forge-1.12.2-14.23.5.2860.jar nogui and if that doesn't work, try java --version
    • What so just copy and paste " java -server -Xmx4G -Xms4G -Dlog4j.configurationFile=log4jformattingfix.xml -jar forge-1.12.2-14.23.5.2860.jar nogui Pause >nul " into a cmd terminal? If that's what you mean, nothing happens
    • The networking has been far simplified in 1.20.5+ The docs could be old, as Ash has said feel free to submit a PR updating the community docs. However the only real up-to-date reference would be the code itself. So your best bet is to just read the code and give it want it wants.
  • Topics

  • Who's Online (See full list)

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.