while at the web, most people don't know.) Password thefts have been done by reading the "profile.dat" or by sniffing network packets. So my suggestion to you is to make the password encryption(like they are stored in Registry, "profile.dat" and sent to server) one-way- and SSL-like. Like MD5 at example. So you can't decrypt the passwords any more so you can't send them "unencrypted" (only secured by Continuum encryption) to the server and no software can easily decrypt them out of the "profile.dat" any more. So this means it would require a change in the server software, too. The server could just compare the two encrypted values instead of the original password, like almost every webserver with a database does. So people could trust in Continuum a bit more.
| Mr Ekted wrote: |
| MD5 is not an encryption method. Learn before you speak. |
| Quote: |
|
As Qndre is working on a new client, he has a couple of questions every so often. As it varies greatly over the course of his work, they don't fit any forum already created yet, so that is why this has been created. As this may be a bit, please do not criticize his acts. He is working on a project, that when completed, will help the SS community. As a few people have seem to take it upon themselves to not help, this allows them to filter out this questions so they won't interfere with his work. Good luck, Qndre. |
| Mine GO BOOM wrote: |
|
If you would MD5 the password, a person who sniffs the packet would get this MD5'd password, and thus can just use that as a password if they wanted to steal it. |
| Quote: |
| the password, for SSC zones, is hashed |
| Qndre wrote: |
| Even if you can't, then it only works on SSC. |
Code: Show/Hide // One-way encryption algorithms
void HashPassword(BYTE * Password) |
| Cyan~Fire wrote: |
| [..]
So, as long as a server is not running subbill, then your password is fine. But, sadly, most small zones run on subbill. :'( |