Server Help Forum Index Server Help
Community forums for Subgame, ASSS, and bots
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   StatisticsStatistics   RegisterRegister 
 ProfileProfile   Login to check your private messagesLogin to check your private messages   LoginLogin (SSL) 

Server Help | ASSS Wiki (-1) | Shanky.com
Friction?
Goto page Previous  1, 2, 3  Next
 
Post new topic   Reply to topic Printable version
 View previous topic  ?freqkick abuse Post :: Post [Suggestion] ?antiwarp  View next topic  
Author Message
Qndre
Server Help Squatter


Gender:Gender:Male
Joined: Jan 25 2004
Posts: 295
Offline

PostPosted: Sun Apr 25, 2004 11:40 am    Post subject: Reply to topic Reply with quote

Cyan~Fire wrote:
I'm confused though. If you're just going to be using a proxy, then it'll still appear as VIE to subgame...

That's right! You allow VIE and let the proxy connect. Direct access to subgame2 will be refused so no VIE client can join if you don't want it.
Back to top
View users profile Send private message Add User to Ignore List
nintendo64
Seasoned Helper


Age:40
Gender:Gender:Male
Joined: Dec 01 2002
Posts: 104
Location: Dominican Republic
Offline

PostPosted: Sun Apr 25, 2004 6:21 pm    Post subject: Reply to topic Reply with quote

He is just simply controlling what gets in and out of Subgame2, for Qndre is a good idea, it's cleaner than writing-code on the fly, or calling a dll inside the target process.

Here are some links, Qndre, in case you want to have more functionality on Subgame2.

http://its.mine.nu/html/re/essays/dracon-add.html
http://its.mine.nu/html/re/essays/dracon-add2.html

-nintendo64
Back to top
View users profile Send private message Add User to Ignore List
Qndre
Server Help Squatter


Gender:Gender:Male
Joined: Jan 25 2004
Posts: 295
Offline

PostPosted: Mon Apr 26, 2004 7:26 am    Post subject: Reply to topic Reply with quote

nintendo64 wrote:

[..]
Here are some links, Qndre, in case you want to have more functionality on Subgame2.

http://its.mine.nu/html/re/essays/dracon-add.html
http://its.mine.nu/html/re/essays/dracon-add2.html

-nintendo64

Thanks.
Back to top
View users profile Send private message Add User to Ignore List
Cyan~Fire
I'll count you!
I'll count you!


Age:38
Gender:Gender:Male
Joined: Jul 14 2003
Posts: 4608
Location: A Dream
Offline

PostPosted: Mon Apr 26, 2004 6:47 pm    Post subject: Reply to topic Reply with quote

I really doubt whether anyone will want to run a Qndre-hacked subgame2 for their server. Also, I really doubt whether many zone sysops will care enough about your client to personally add users to the VIP list.
_________________
This help is informational only. No representation is made or warranty given as to its content. User assumes all risk of use. Cyan~Fire assumes no responsibility for any loss or delay resulting from such use.
Wise men STILL seek Him.
Back to top
View users profile Send private message Add User to Ignore List Visit posters website
Qndre
Server Help Squatter


Gender:Gender:Male
Joined: Jan 25 2004
Posts: 295
Offline

PostPosted: Tue Apr 27, 2004 8:07 am    Post subject: Reply to topic Reply with quote

Cyan~Fire wrote:
I really doubt whether anyone will want to run a Qndre-hacked subgame2 for their server. Also, I really doubt whether many zone sysops will care enough about your client to personally add users to the VIP list.

I can also run the VIE encryption on the client-side. But that would mean that they'd have to allow VIE clients. And that's what they won't do because they have armageddon-like panic of cheaters.
Back to top
View users profile Send private message Add User to Ignore List
Cyan~Fire
I'll count you!
I'll count you!


Age:38
Gender:Gender:Male
Joined: Jul 14 2003
Posts: 4608
Location: A Dream
Offline

PostPosted: Tue Apr 27, 2004 6:34 pm    Post subject: Reply to topic Reply with quote

Qndre wrote:
And that's what they won't do because they have armageddon-like panic of cheaters.

Uhhh, my point?
Back to top
View users profile Send private message Add User to Ignore List Visit posters website
Mr Ekted
Movie Geek


Gender:Gender:Male
Joined: Feb 09 2004
Posts: 1379
Offline

PostPosted: Tue Apr 27, 2004 8:39 pm    Post subject: Reply to topic Reply with quote

Qndre is implying that our paranoia over cheating is unfounded. icon_eek.gif
_________________
4,691 irradiated haggis!
Back to top
View users profile Send private message Add User to Ignore List
CypherJF
I gargle nitroglycerin


Gender:Gender:Male
Joined: Aug 14 2003
Posts: 2583
Location: USA
Offline

PostPosted: Tue Apr 27, 2004 8:53 pm    Post subject: Reply to topic Reply with quote

rotfl! SS 1.35 :/
_________________
Performance is often the art of cheating carefully. - James Gosling
Back to top
View users profile Send private message Add User to Ignore List
Mr Ekted
Movie Geek


Gender:Gender:Male
Joined: Feb 09 2004
Posts: 1379
Offline

PostPosted: Tue Apr 27, 2004 10:47 pm    Post subject: Reply to topic Reply with quote

Changing the key on the fly means there could be many packets that do not properly decrypt. Do you plan to allow either key for a period of time after the key change is sent?
Back to top
View users profile Send private message Add User to Ignore List
nintendo64
Seasoned Helper


Age:40
Gender:Gender:Male
Joined: Dec 01 2002
Posts: 104
Location: Dominican Republic
Offline

PostPosted: Tue Apr 27, 2004 11:08 pm    Post subject: Reply to topic Reply with quote

Mr Ekted wrote:
Changing the key on the fly means there could be many packets that do not properly decrypt. Do you plan to allow either key for a period of time after the key change is sent?


i never thought about it, but ekted's right!, Qndre i don't think such encryption scheme will work for the proxy.

-nintendo64
Back to top
View users profile Send private message Add User to Ignore List
Mr Ekted
Movie Geek


Gender:Gender:Male
Joined: Feb 09 2004
Posts: 1379
Offline

PostPosted: Tue Apr 27, 2004 11:45 pm    Post subject: Reply to topic Reply with quote

If the encryption method is sound, trust it to stand on its own. If you need to change keys because the first key isn't good enough, then the second one isn't good enough either.
Back to top
View users profile Send private message Add User to Ignore List
Qndre
Server Help Squatter


Gender:Gender:Male
Joined: Jan 25 2004
Posts: 295
Offline

PostPosted: Wed Apr 28, 2004 9:00 am    Post subject: Reply to topic Reply with quote

Mr Ekted wrote:
Changing the key on the fly means there could be many packets that do not properly decrypt.

You're right. I haven't realized it yet because I've only tested the client on the LAN and there the packet order doesn't usually get mixed-up (only one server to pass), but if you play on the internet, packets may come in another order than sent. Someone told me that CONT also changes the "scrty1" after some time or after some bytes sent. Client has to send the new key about 20 packets before it's used and server should use it if this "key-latency-period" (20 packets or so) is over. Thanks for recognizing and telling this problem.
Mr Ekted wrote:
If the encryption method is sound, trust it to stand on its own. If you need to change keys because the first key isn't good enough, then the second one isn't good enough either.

Like I said: CONT also changes the key in-session. And the encryption not bad only because it does. But changing the key will prevent it from being calculated using a known-plaintext attack (feedback doesn't really prevent keys from being attacked).
_
Another thing about the unreliable UDP protocol:
If the keystream continues, and doesn't restart for every packet (which would make it very weak) the decryption may also fail! Example:
Code: Show/Hide

Sent ("Byte #" and "Key for Byte #")
Key: 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22
Data:01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22

Recieved
Key: 01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22
Data:07 01 02 03 04 05 06 08 15 16 17 09 10 11 12 13 14 18 19 20 22 21
- DECRYPTION WILL FAIL -

But if keystream is the same for every packet, it isn't very secure.
_
This means that the proxy and the client also have to put an unencrypted ID in front of every packet and decrypt traffic in the correct order (a bit like the VIE reliability layer works).
Back to top
View users profile Send private message Add User to Ignore List
Mine GO BOOM
Hunch Hunch
What What
Hunch Hunch<br>What What


Age:42
Gender:Gender:Male
Joined: Aug 01 2002
Posts: 3616
Location: Las Vegas
Offline

PostPosted: Wed Apr 28, 2004 10:00 am    Post subject: Reply to topic Reply with quote

Qndre wrote:
Someone told me that CONT also changes the "scrty1" after some time or after some bytes sent. Client has to send the new key about 20 packets before it's used and server should use it if this "key-latency-period" (20 packets or so) is over.
...
CONT also changes the key in-session. And the encryption not bad only because it does. But changing the key will prevent it from being calculated using a known-plaintext attack (feedback doesn't really prevent keys from being attacked).

What did you learn from the last time? Don't trust what everyone says 100%. Whomever told you this knows very little about the encryption Continuum uses. I suggest you look into this a bit more, and you'll see that Continuum in fact uses the same key the whole time, and doesn't change as long as your connected. Granted, the server key may change if you restart the zone, but the server/client key does not change while you are connected.

Want real evidence? Log the packets that go around, and enter a zone that does not have reliable public messages (important!). This way, you can send the same packet twice, at different time intervals. So, type "Hello" and see that packet (or to make it easier to find, make it nice and long message so you only have to find the 100+ byte packet.) Now do some other things, and send that same message. Encrypted packet is the same.

Note this doesn't work for other packet types, because the data that is being encrypted isn't consistent over two intervals, either the timestamp changes (positions) or the reliable ID changes. This does work for laggy clients, ones in which will send the same position packet twice over a small delay, but this won't help prove your key-changing question.
Back to top
View users profile Send private message Add User to Ignore List Send email
Mr Ekted
Movie Geek


Gender:Gender:Male
Joined: Feb 09 2004
Posts: 1379
Offline

PostPosted: Wed Apr 28, 2004 11:21 am    Post subject: Reply to topic Reply with quote

It is possible to design an encryption algorithm that can be restarted at the beginning of every UDP packet, that is also very resistant to plain text attack. Think about the way hashes work: every bit of the input affects every bit of the output.

One of the easiest ways to see how bad VIE encryption is, is to send 2 almost similar text messages and look at the encrypted packets. Like:

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaab

You will see that only the last byte of the packet is different, and only different by 1 bit as expected. This is very poor. With s good algorithm, the above 2 text messages would encrypt to completely different "streams" and be unrecognizable from each other.
Back to top
View users profile Send private message Add User to Ignore List
Qndre
Server Help Squatter


Gender:Gender:Male
Joined: Jan 25 2004
Posts: 295
Offline

PostPosted: Wed Apr 28, 2004 11:28 am    Post subject: Reply to topic Reply with quote

Mine GO BOOM wrote:

[..]
What did you learn from the last time? Don't trust what everyone says 100%. Whomever told you this knows very little about the encryption Continuum uses. I suggest you look into this a bit more, and you'll see that Continuum in fact uses the same key the whole time, and doesn't change as long as your connected.
[..]

Right. "scrty1" doesn't change either... My chat-friend just found some code/data inside CONT which could be able to do so. But he wasn't sure if this code is used. Since I think you are very sure about that the key doesn't change, I'll try to do more "research" on that "constant" key.
Mr Ekted wrote:

It is possible to design an encryption algorithm that can be restarted at the beginning of every UDP packet, that is also very resistant to plain text attack. Think about the way hashes work: every bit of the input affects every bit of the output.

Such algorithms are very difficult to create. You need to hide the encryption key to decrypt the data somewhere within the data itself (so that it can be calculated out of the data) because sending a key through an encrypted connection will make everyone which knows current key knowing the other key as well. I guess the best way is to make the keystream generator and encryption algorithm strong enough so that a keychange isn't required and that it would take ages to calculate the key using a known-plaintext attack. Maybe a new kind of feedback that spans over much of data and changes with the data itself or so.
_
Sorry for bringing this thread so far off topic. It was once a server question about friction. biggrin.gif
Back to top
View users profile Send private message Add User to Ignore List
Cyan~Fire
I'll count you!
I'll count you!


Age:38
Gender:Gender:Male
Joined: Jul 14 2003
Posts: 4608
Location: A Dream
Offline

PostPosted: Wed Apr 28, 2004 4:40 pm    Post subject: Reply to topic Reply with quote

You know, if your dencryption is good enough, you don't need to change the key.

Qndre wrote:
My chat-friend just found some code/data inside CONT which could be able to do so. But he wasn't sure if this code is used.

Your chat friends in the past have turned out to be liars. Don't trust them.
Back to top
View users profile Send private message Add User to Ignore List Visit posters website
Jackmn
Newbie


Joined: Apr 02 2004
Posts: 13
Offline

PostPosted: Wed Apr 28, 2004 8:42 pm    Post subject: Reply to topic Reply with quote

Why not just use a cipher that's generally accepted to be secure?

Something like RC4, working with the Diffie-Hellman key exchange and key signing.

Ultimately the best option is just to use a tried-and-true encryption library; then you don't have to worry about encryption security.

At any rate, it's extremely unlikely that you will iron out a bullet-proof encryption system on your own in your free time. Entire teams of mathmaticians and programmers can take years to do that.
Back to top
View users profile Send private message Add User to Ignore List
Mr Ekted
Movie Geek


Gender:Gender:Male
Joined: Feb 09 2004
Posts: 1379
Offline

PostPosted: Wed Apr 28, 2004 11:02 pm    Post subject: Reply to topic Reply with quote

Also, if your algorithm is greater than 56-bit symmetric key, and you plan on having it available (download source or binaries) on servers in the US, you basically need NSA "permission". This is seriously fucked up, but it's true.
Back to top
View users profile Send private message Add User to Ignore List
Mine GO BOOM
Hunch Hunch
What What
Hunch Hunch<br>What What


Age:42
Gender:Gender:Male
Joined: Aug 01 2002
Posts: 3616
Location: Las Vegas
Offline

PostPosted: Wed Apr 28, 2004 11:19 pm    Post subject: Reply to topic Reply with quote

Mr Ekted wrote:
Also, if your algorithm is greater than 56-bit symmetric key, and you plan on having it available (download source or binaries) on servers in the US, you basically need NSA "permission". This is seriously fucked up, but it's true.

Link to source, such as a newspaper, congress online, or on NSA's site?
Back to top
View users profile Send private message Add User to Ignore List Send email
Mr Ekted
Movie Geek


Gender:Gender:Male
Joined: Feb 09 2004
Posts: 1379
Offline

PostPosted: Wed Apr 28, 2004 11:48 pm    Post subject: Reply to topic Reply with quote

http://www.bxa.doc.gov/encryption/default.htm

It's really cryptic stuff, but everyone I've asked interprets it basically the same way.
Back to top
View users profile Send private message Add User to Ignore List
Qndre
Server Help Squatter


Gender:Gender:Male
Joined: Jan 25 2004
Posts: 295
Offline

PostPosted: Thu Apr 29, 2004 10:11 am    Post subject: Reply to topic Reply with quote

Mr Ekted wrote:
Also, if your algorithm is greater than 56-bit symmetric key, and you plan on having it available (download source or binaries) on servers in the US, you basically need NSA "permission". This is seriously fucked up, but it's true.

1. I am coming from Germany. Here are also some laws which no one needs and which get annoying but you are allowed to develop and use strong cryptography here (not sure but why shouldn't you?).

2. Do you think that VIE had a permission for their encryption (520 byte - 4160 bit) or Priit has a permission for his encryption (2x 80 byte - 1280 bit (2x because there is a 80 byte (640 bit) key for S2C and a 80 byte (640 bit) key C2S))?
Back to top
View users profile Send private message Add User to Ignore List
Mine GO BOOM
Hunch Hunch
What What
Hunch Hunch<br>What What


Age:42
Gender:Gender:Male
Joined: Aug 01 2002
Posts: 3616
Location: Las Vegas
Offline

PostPosted: Thu Apr 29, 2004 12:10 pm    Post subject: Reply to topic Reply with quote

Qndre wrote:
Do you think that VIE had a permission for their encryption (520 byte - 4160 bit) or Priit has a permission for his encryption (2x 80 byte - 1280 bit (2x because there is a 80 byte (640 bit) key for S2C and a 80 byte (640 bit) key C2S))?

VIE uses only a 4 byte encryption. Priit helped with creating Kazaa, and thus I'm pretty sure he wouldn't care about US laws at all either. Even so, Continuum still uses only a 4 byte key. Still wondering where you get your numbers...
Back to top
View users profile Send private message Add User to Ignore List Send email
Qndre
Server Help Squatter


Gender:Gender:Male
Joined: Jan 25 2004
Posts: 295
Offline

PostPosted: Thu Apr 29, 2004 3:41 pm    Post subject: Reply to topic Reply with quote

Mine GO BOOM wrote:
[..]
VIE uses only a 4 byte encryption.
[..]
Still wondering where you get your numbers...

It's the length of the keySTREAM (not of the key).
Back to top
View users profile Send private message Add User to Ignore List
Dr Brain
Flip-flopping like a wind surfer


Age:39
Gender:Gender:Male
Joined: Dec 01 2002
Posts: 3502
Location: Hyperspace
Offline

PostPosted: Thu Apr 29, 2004 4:58 pm    Post subject: Reply to topic Reply with quote

Yet again Qndre decides to reply to something totally unrelated.
_________________
Hyperspace Owner

Smong> so long as 99% deaths feel lame it will always be hyperspace to me
Back to top
View users profile Send private message Add User to Ignore List AIM Address Yahoo Messenger MSN Messenger
Mr Ekted
Movie Geek


Gender:Gender:Male
Joined: Feb 09 2004
Posts: 1379
Offline

PostPosted: Thu Apr 29, 2004 5:01 pm    Post subject: Reply to topic Reply with quote

Qndre, it's the length of the key. If a 32-bit key creates the keystream, then there are only 2^32 possible keystreams. That is the point. This can be brute-forced by any desktop system in less than an hour if you know the algorithm.
Back to top
View users profile Send private message Add User to Ignore List
Display posts from previous:   
Post new topic   Reply to topic    Server Help Forum Index -> ASSS Questions All times are GMT - 5 Hours
Goto page Previous  1, 2, 3  Next
Page 2 of 3

 
Jump to:  
You can post new topics in this forum
You can reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum
View online users | View Statistics | View Ignored List


Software by php BB © php BB Group
Server Load: 63 page(s) served in previous 5 minutes.

phpBB Created this page in 0.210949 seconds : 49 queries executed (78.5%): GZIP compression disabled