Server Help

Trash Talk - Subspace null encryption

Doc Flabby - Tue Jan 09, 2007 12:24 pm
Post subject: Subspace null encryption
What packet do you have to send to continuum to trigger the use of null encryption (ie no encryption of packets) I'm trying to test something and i don't want to add encryption to the mix yet.

Im guessing the packet would be part of the login response in the core protocol.
Doc Flabby - Tue Jan 09, 2007 12:31 pm
Post subject:
solved this myself looking at the asss source

Quote:

sending back the original key without change means no encryption, both to 1.34 and continuum

Bak - Tue Jan 09, 2007 5:11 pm
Post subject:
post the answer then... it's an encryption key of 0
CypherJF - Tue Jan 09, 2007 5:27 pm
Post subject:
Or, send the same key back, correct?
Doc Flabby - Tue Jan 09, 2007 6:13 pm
Post subject:
i did post the answer. you just send back the key the client sends you unchanged.
Maverick - Tue Jan 09, 2007 6:18 pm
Post subject:
Why not crack the encryption and do us all a favour sa_tongue.gif
Mine GO BOOM - Tue Jan 09, 2007 7:34 pm
Post subject:
Maverick wrote:
Why not crack the encryption and do us all a favour :p

Because it won't do anyone a favor. Think of the cheating that is popping back up now, and think of what Twister did to Subspace. Now, with bots being as popular as they are now, think of what an unreliable client would be able to do.

Before Continuum came over, people were just popping out programs to filter SS traffic, so you'd skip certain weapon packets and what not. Some are doing that with Continuum even now, but they can't be completely sure that the packet they are skipping is a weapons packet.
Dr Brain - Tue Jan 09, 2007 8:16 pm
Post subject:
Mine GO BOOM wrote:
Because it won't do anyone a favor. Think of the cheating that is popping back up now, and think of what Twister did to Subspace. Now, with bots being as popular as they are now, think of what an unreliable client would be able to do.


You're wrong. It would be a huge benefit. By creating widespread cheating once again (or at least the threat of it), we'd get PrittK back on the scene with a new client, which would be a huge benefit to this game.
Mine GO BOOM - Tue Jan 09, 2007 8:56 pm
Post subject:
Dr Brain wrote:
we'd get PrittK back on the scene with a new client, which would be a huge benefit to this game.

Priit isn't available anymore. Having wide spread cheating won't bring him back. He has semi-told us that even with the current cheating going on, he won't (or may not be able to) do anything about Continuum anytime soon.
Dr Brain - Tue Jan 09, 2007 9:27 pm
Post subject:
Then better get it over with quickly rather than slowly.
K' - Wed Jan 10, 2007 3:46 am
Post subject:
Yet, one of the reasons for the switch, which mikethenoob was more than happy to over-iterate was how simple it would be to combat future cheating by easily changing the protocols.
While true, in essence, one simple thing that was forgotten is that only Priit has access to the source and only he may recompile a new batch, and so...all's for nothing.

Maverick wrote:

Why not crack the encryption and do us all a favour sa_tongue.gif

Sage386 = already way ahead of you.
Doc Flabby - Wed Jan 10, 2007 9:57 am
Post subject:
Actually i was experimenting with the directory server protocol which happens to by default use VIE encryption (why who knows) and i wanted to turn it off lol.
Smong - Mon Jan 15, 2007 4:02 am
Post subject:
In that case you should know not all dirservs allow encryption to be disabled.
Doc Flabby - Mon Jan 15, 2007 5:07 am
Post subject:
The server was not the problem in this case. Continuum was expecting encrypted data when i wanted to send it unencrypted data.
All times are -5 GMT
View topic
Powered by phpBB 2.0 .0.11 © 2001 phpBB Group