SuSE wrote: |
just to make it easier to find the banned person I would s'pose |
Mr Ekted wrote: |
Each zone runs a billing proxy--a program that sits between the biller and the server. It remembers the login info for the last 1024 players who logged in before the biller died. |
nintendo64 wrote: |
^Banned is a way to tell the subgame to automaticly *shutup and *spec users with these nicknames, which were given by the Biller, the biller can change your nickname. |
nintendo64 wrote: |
If that's confirmed then he will be netbanned |
Smong wrote: |
Actually I was thinking what if someone entered using 'Banned' when the biller was down, would the proxy then rename them to ^Banned? I suppose if it did the player wouldn't be able to speak or fly, but at the same time wouldn't get kicked. |
Quote: |
It means if someone named ^PriitK enters your zone, he isn't Priit, despite what he says. |
Dustpuppy wrote: |
I hear Qndre made a hacked billing proxy in asm that steals passwords. |
Qndre wrote: |
WARNING: I don't create a password-theft server but it's very easy for an ASM experienced person to do so. |
Qndre wrote: |
a proxy for use between client and subgame2 (on both, client and server side) to make the VIE Subspace more secure (524288-bit encryption with packet-checksums to avoid man-in-the-middle actions client side (aka cheating) as well as account thefts).
|
Dr Brain wrote: |
[..]
What does ASM have to do with anything? I know only a small amount AVR ASM, but I could steal SSC passwords without problems, without using ASM. And I imagine that there are numerous others who could accomplish the same feat. While something like this isn't my style, it's a valid security concern. |
Mr Ekted wrote: |
Stealing passwords in only easy if YOU are the one running the server. If you think otherwise, go ahead and steal my password, and post it here. |
Mr Ekted wrote: |
Let's get this straight once and for all Qndre. The number of "bits" in an encryption scheme is the number of bits in the KEY which is THE SAME AS THE SEED. 524288 is the number of bits in your KEY STREAM, which is pitifully small. |
Cyan~Fire wrote: |
Ummm someone client-side could not steal the password, at least for Continuum, because they don't know the protocol (encryption). Someone server-side, however, could steal passwords from the server-biller chatter, for which the protocol is known. |
Dr Brain wrote: |
I know only a small amount AVR ASM, but I could steal SSC passwords without problems, without using ASM. |
Cyan~Fire wrote: |
the server-biller chatter, for which the protocol is known |
Smong wrote: |
Have you run any tests to prove this? I thought when connecting to SSC the player's password is encrypted/hashed in some way, so server ops cannot see the plaintext password. |