Author |
Message |
Sketter Novice
Age:41 Gender: Joined: Dec 14 2002 Posts: 37 Location: Toronto Offline
|
Posted: Sun Jun 13, 2004 2:54 am Post subject: can some1 explain the ^Name ?? |
 |
|
|
|
When the biller is offline i noticed that in some zones players get ^ besides their names. And some don't. Why is that and how can it be set up?
Also
How come when the biller is down, some zones tell you about the no data base info, and some don't. Why is that and how can it be set up?
Thank-u!
Sketter _________________ In the modern world nobody is safe, so enough with your false sense of security. |
|
Back to top |
|
 |
Mr Ekted Movie Geek

Gender: Joined: Feb 09 2004 Posts: 1379 Offline
|
Posted: Sun Jun 13, 2004 3:51 am Post subject: |
 |
|
|
|
Each zone runs a billing proxy--a program that sits between the biller and the server. It remembers the login info for the last 1024 players who logged in before the biller died. If you are not one of those last 1024, it cannot verify your password, so you get a ^ indicating that your actual name cannot be verified. _________________ 4,691 irradiated haggis! |
|
Back to top |
|
 |
Mine GO BOOM Hunch Hunch What What

Age:42 Gender: Joined: Aug 01 2002 Posts: 3615 Location: Las Vegas Offline
|
Posted: Sun Jun 13, 2004 2:34 pm Post subject: |
 |
|
|
|
It means if someone named ^PriitK enters your zone, he isn't Priit, despite what he says. |
|
Back to top |
|
 |
CypherJF I gargle nitroglycerin

Gender: Joined: Aug 14 2003 Posts: 2582 Location: USA Offline
|
Posted: Sun Jun 13, 2004 5:06 pm Post subject: |
 |
|
|
|
Or ^JeffP for that matter..
(lol, i did see this one in TW) _________________ Performance is often the art of cheating carefully. - James Gosling |
|
Back to top |
|
 |
Smong Server Help Squatter

Joined: 1043048991 Posts: 0x91E Offline
|
Posted: Sun Jun 13, 2004 5:59 pm Post subject: |
 |
|
|
|
How about ^Banned?
I suppose this proxy isn't available for download? |
|
Back to top |
|
 |
Mr Ekted Movie Geek

Gender: Joined: Feb 09 2004 Posts: 1379 Offline
|
Posted: Sun Jun 13, 2004 6:18 pm Post subject: |
 |
|
|
|
^Banned shows up when a banned player tries to login. I'm not sure why the protocol was designed this way. Is doesn't need to do this. |
|
Back to top |
|
 |
SuSE Me measures good

Joined: Dec 02 2002 Posts: 2307 Offline
|
Posted: Sun Jun 13, 2004 6:29 pm Post subject: |
 |
|
|
|
just to make it easier to find the banned person I would s'pose |
|
Back to top |
|
 |
nintendo64 Seasoned Helper

Age:39 Gender: Joined: Dec 01 2002 Posts: 104 Location: Dominican Republic Offline
|
Posted: Sun Jun 13, 2004 6:40 pm Post subject: |
 |
|
|
|
SuSE wrote: | just to make it easier to find the banned person I would s'pose |
^Banned is a way to tell the subgame to automaticly *shutup and *spec users with these nicknames, which were given by the Biller, the biller can change your nickname.
I've not checked but i believe a simple lockout will be better or not? after the Auth process, because i've not worked with billers before, i don't remember the protoccol as well as with Client-Subgame.
-nintendo64 |
|
Back to top |
|
 |
Dustpuppy Server Help Squatter

Age:40 Gender: Joined: Jan 23 2003 Posts: 215 Location: England Offline
|
Posted: Sun Jun 13, 2004 6:58 pm Post subject: |
 |
|
|
|
Mr Ekted wrote: | Each zone runs a billing proxy--a program that sits between the biller and the server. It remembers the login info for the last 1024 players who logged in before the biller died. |
I hear Qndre made a hacked billing proxy in asm that steals passwords.
True story. _________________
 |
|
Back to top |
|
 |
Mr Ekted Movie Geek

Gender: Joined: Feb 09 2004 Posts: 1379 Offline
|
Posted: Sun Jun 13, 2004 7:41 pm Post subject: |
 |
|
|
|
That is why you don't trust your passwords to strange zones. Always use different ones for each biller domain. But I doubt Qndre made anything, much less in ASM. |
|
Back to top |
|
 |
nintendo64 Seasoned Helper

Age:39 Gender: Joined: Dec 01 2002 Posts: 104 Location: Dominican Republic Offline
|
Posted: Sun Jun 13, 2004 9:26 pm Post subject: |
 |
|
|
|
If he did one (probably in Visual Basic), it proves his real motives towards his client idea, he just wanted the "power", to feel he is "important". If that's confirmed then he will be netbanned, and his little tool to randomize machineID and permissionID won't do anything to stop the ban.
-nintendo64 |
|
Back to top |
|
 |
Mine GO BOOM Hunch Hunch What What

Age:42 Gender: Joined: Aug 01 2002 Posts: 3615 Location: Las Vegas Offline
|
Posted: Sun Jun 13, 2004 9:33 pm Post subject: |
 |
|
|
|
nintendo64 wrote: | ^Banned is a way to tell the subgame to automaticly *shutup and *spec users with these nicknames, which were given by the Biller, the biller can change your nickname. |
^Banned was done originally because the billing-server protocol didn't have a nice method of saying "don't let this user in because he is banned." Thus, instead of just replying back saying their password was bad or something, Priit thought it would be better to just use the fact that the biller can rename the user (originally design to correct the casing of the name back in VIE days), then send him a message in the game saying they are banned, and send a billing-kick to the user to make him leave.
After a while, people figured out during that time they are entering the zone (because the billing had to wait a bit to make sure they actually got into the game before sending the message/kick), that they could flood ?cheater really bad to annoy the hell out of admins or send massive messages to the public or specific users. Thats when the *shutup too effect. Then some people figured out that they could get into a ship for about 5 seconds or so, and thats when the *spec type lock took effect. |
|
Back to top |
|
 |
Dustpuppy Server Help Squatter

Age:40 Gender: Joined: Jan 23 2003 Posts: 215 Location: England Offline
|
Posted: Mon Jun 14, 2004 8:12 am Post subject: |
 |
|
|
|
nintendo64 wrote: | If that's confirmed then he will be netbanned |
Oh man, I was joking |
|
Back to top |
|
 |
Mine GO BOOM Hunch Hunch What What

Age:42 Gender: Joined: Aug 01 2002 Posts: 3615 Location: Las Vegas Offline
|
|
Back to top |
|
 |
Smong Server Help Squatter

Joined: 1043048991 Posts: 0x91E Offline
|
Posted: Tue Jun 15, 2004 5:02 am Post subject: |
 |
|
|
|
Actually I was thinking what if someone entered using 'Banned' when the biller was down, would the proxy then rename them to ^Banned? I suppose if it did the player wouldn't be able to speak or fly, but at the same time wouldn't get kicked. |
|
Back to top |
|
 |
nintendo64 Seasoned Helper

Age:39 Gender: Joined: Dec 01 2002 Posts: 104 Location: Dominican Republic Offline
|
Posted: Tue Jun 15, 2004 1:06 pm Post subject: |
 |
|
|
|
Smong wrote: | Actually I was thinking what if someone entered using 'Banned' when the biller was down, would the proxy then rename them to ^Banned? I suppose if it did the player wouldn't be able to speak or fly, but at the same time wouldn't get kicked. |
Exactly what it'll happen.
-nintendo64 |
|
Back to top |
|
 |
Lumenesc Novice

Age:37 Gender: Joined: Jun 19 2003 Posts: 58 Location: Texas Offline
|
Posted: Tue Jun 15, 2004 1:42 pm Post subject: |
 |
|
|
|
Quote: | It means if someone named ^PriitK enters your zone, he isn't Priit, despite what he says. |
What if priitk enters the zone for his very first time ever when the billing was down o_O. Or if someone had been using the sn PriitK before the billin went off and you havent ever had more than 1024 players to log before he signed off so he has no ^.
Plus i thought it was possible to enter on someones name even if their logged on, and even with a different sn. I remember once there was 4 Lumenescs when mk's billin went down :/. _________________ Are you sure this questoin involved an answer? |
|
Back to top |
|
 |
Cyan~Fire I'll count you!

Age:37 Gender: Joined: Jul 14 2003 Posts: 4608 Location: A Dream Offline
|
Posted: Tue Jun 15, 2004 8:14 pm Post subject: |
 |
|
|
|
Yeah, you can have duplicate names when the biller goes down. AFAIK, the server communicates to users completely through login-assigned IDs. _________________ This help is informational only. No representation is made or warranty given as to its content. User assumes all risk of use. Cyan~Fire assumes no responsibility for any loss or delay resulting from such use.
Wise men STILL seek Him. |
|
Back to top |
|
 |
Mr Ekted Movie Geek

Gender: Joined: Feb 09 2004 Posts: 1379 Offline
|
Posted: Tue Jun 15, 2004 10:33 pm Post subject: |
 |
|
|
|
ID's are used for message sending in all cases except remote/chat messages across different zones, in which case the biller is involved.  |
|
Back to top |
|
 |
Qndre Server Help Squatter

Gender: Joined: Jan 25 2004 Posts: 295 Offline
|
Posted: Wed Jun 16, 2004 7:28 am Post subject: |
 |
|
|
|
Dustpuppy wrote: |
I hear Qndre made a hacked billing proxy in asm that steals passwords.
|
You shouldn't believe in what you hear because it's not true. I don't want to steal any CONTINUUM accounts or other people's passwords. I didn't even write a billing proxy (??) but a proxy for use between client and subgame2 (on both, client and server side) to make the VIE Subspace more secure (524288-bit encryption with packet-checksums to avoid man-in-the-middle actions client side (aka cheating) as well as account thefts).
So proxy-system works like that:
[Subspace > Client-Hack] > ----- WAN connection (high-encrypted) ----- > [Server-Hack > subgame2]
Subspace (VIE encrypted packets) aren't directly sent to subgame2 server but through a client-side proxy or client-hack (which VIE-decrypts the packets and METAencrypts them).
These packets are sent over a WAN connection (internet) by the client-side hack. They are now high-encrypted and checksummed to avoid man-in-the-middle action by other servers as well as login-thefts or cheating.
These high-encrypted packets arrive on the server-side proxy or server hack (which METAdecrypts them, VIE-encrypts them and passes them on to subgame2).
Neither the server-side hack nor the client-side hack have spyware-like functions like sending the contents of a 00 09 packet to me. I don't know who told you things like this but it's definitally NOT true.
The connection subgame2 <-> oldbill (billing server) isn't being proxied.
_
The only thing that will be "hacked" (or spoofed) by some ASM code will be the sources Subspace uses for generating / reading MachineID and PermissionID. The client-hack itself does NOT modify the content of ANY PACKETS (yet) or spies the connection (so also not the MacID and PermID or any account data). I MAY OR MAY NOT (unsure) add a function to randomize the MacID and PermID before being encrypted by METAenc high-security-encryption and before being checksummed so it's possible to spoof identity (but not accounts) on zones which have the server-side hack installed to unban yourself (and only for THAT reason) without changing the sources where Subspace reads MacID and PermID out. That's the only kind of "hacking" which will be there.
WARNING:
I don't create a password-theft server but it's very easy for an ASM experienced person to do so. So please EVERYONE use another password for Subspace than you use for other things (email, dialup, firewall, ...) because it's really not too difficult to steal accounts in Subspace. The same thing for Forums or other private websites which require registration. Server-side scripts (at example PHP scripts) can be written to store the registration data in a database, ready to be read out by an administrator. My suggestion (like I do it) is: Use a very-secure password for dialup, a secure password for email and trusted websites (companies, etc.) and an insecure passwords for unimportant things like communities, Continuum or any other web service provided by a private person. |
|
Back to top |
|
 |
Dr Brain Flip-flopping like a wind surfer

Age:39 Gender: Joined: Dec 01 2002 Posts: 3502 Location: Hyperspace Offline
|
Posted: Wed Jun 16, 2004 10:45 am Post subject: |
 |
|
|
|
Qndre wrote: |
WARNING:
I don't create a password-theft server but it's very easy for an ASM experienced person to do so. |
What does ASM have to do with anything? I know only a small amount AVR ASM, but I could steal SSC passwords without problems, without using ASM. And I imagine that there are numerous others who could accomplish the same feat. While something like this isn't my style, it's a valid security concern. _________________ Hyperspace Owner
Smong> so long as 99% deaths feel lame it will always be hyperspace to me |
|
Back to top |
|
 |
Mr Ekted Movie Geek

Gender: Joined: Feb 09 2004 Posts: 1379 Offline
|
Posted: Wed Jun 16, 2004 2:05 pm Post subject: |
 |
|
|
|
Qndre wrote: | a proxy for use between client and subgame2 (on both, client and server side) to make the VIE Subspace more secure (524288-bit encryption with packet-checksums to avoid man-in-the-middle actions client side (aka cheating) as well as account thefts).
|
Let's get this straight once and for all Qndre. The number of "bits" in an encryption scheme is the number of bits in the KEY which is THE SAME AS THE SEED. 524288 is the number of bits in your KEY STREAM, which is pitifully small.
Stealing passwords in only easy if YOU are the one running the server. If you think otherwise, go ahead and steal my password, and post it here. |
|
Back to top |
|
 |
Qndre Server Help Squatter

Gender: Joined: Jan 25 2004 Posts: 295 Offline
|
Posted: Wed Jun 16, 2004 2:06 pm Post subject: |
 |
|
|
|
Dr Brain wrote: | [..]
What does ASM have to do with anything? I know only a small amount AVR ASM, but I could steal SSC passwords without problems, without using ASM. And I imagine that there are numerous others who could accomplish the same feat. While something like this isn't my style, it's a valid security concern. |
Because you cannot do spoofing like that in a high-level language such as VB but only in low-level programming languages. And since ASM is the lowest level (just above manually typing the opcodes into a COM file) ...
Mr Ekted wrote: |
Stealing passwords in only easy if YOU are the one running the server. If you think otherwise, go ahead and steal my password, and post it here.
|
Of course it is very easy for the one who runs the server, but it's also possible for men in the middle in some cases, for example the proxy server you are using or your provider. It is possible that there are coming people in between who want to get that kind of information (of course not the password for an online-game but if your email was using the same one and your firewall, ...) It's impossible to forecast which way your packets come so it's impossible for someone to get someone specific's packets and servers which are usually used for internet data transfer are only the ones of ISPs but if you are in someone's LAN for example ... in your company, your employer could sniff the packets, if you are at school, your teachers can, if you are at a LAN party, the one who is providing the lan party can sniff, and so on ...
Of course the more important and major part of encryption in this case is keeping the user (the client-side player) from modifying/reading the packets, for example to keep the settings of a server secure or to avoid client-side spoofing (cheating).
Mr Ekted wrote: |
Let's get this straight once and for all Qndre. The number of "bits" in an encryption scheme is the number of bits in the KEY which is THE SAME AS THE SEED. 524288 is the number of bits in your KEY STREAM, which is pitifully small.
|
Why do you think it's small? CONT also "only" has a 688128-bit keystream (because it doesn't use the whole "scrty1" as a key but only a 86016 byte part of it - depending on the server-provided (random) offset). Of course it's possible to extend keystreams to almost infinite length, but only expanding the keystreams doesn't really make an encryption secure.
_
If you think my keystream generator is weak, you are wrong. It's depending on the S.I.G.M.A. algorithm used in many other encryption shemes to generate the keystream. I modified that algorithm to provide a keystream of a suitable length and to make it hard-to-guess by modifying the seed tables and making one seed variable. The encryption algorithm itself is also strong. It picks the part of the keystream after an offset fully calculated out of the input data and pseudo-random (hashed version of the input / self-written hash algorithm with leftshift and xor (true 16-bit hash)). The offset cannot be spoofed client-side because server is able to check the data hash (so it also provides safety against modifying the data).
Last edited by Qndre on Wed Jun 16, 2004 2:28 pm, edited 1 time in total |
|
Back to top |
|
 |
Cyan~Fire I'll count you!

Age:37 Gender: Joined: Jul 14 2003 Posts: 4608 Location: A Dream Offline
|
Posted: Wed Jun 16, 2004 2:25 pm Post subject: |
 |
|
|
|
Ummm someone client-side could not steal the password, at least for Continuum, because they don't know the protocol (encryption). Someone server-side, however, could steal passwords from the server-biller chatter, for which the protocol is known. |
|
Back to top |
|
 |
Qndre Server Help Squatter

Gender: Joined: Jan 25 2004 Posts: 295 Offline
|
Posted: Wed Jun 16, 2004 2:42 pm Post subject: |
 |
|
|
|
Cyan~Fire wrote: | Ummm someone client-side could not steal the password, at least for Continuum, because they don't know the protocol (encryption). Someone server-side, however, could steal passwords from the server-biller chatter, for which the protocol is known. |
The encryption (combining data with key) is known, just the keystream generation is unknown. The encryption on the other hand isn't too complicated:
Two DWORDs are being initialized with the old data (feedback) and xorred with 8 bytes of the new data of the packet to be encrypted. Now a part of the key is taken, startpoint is the client-provided (0x0001) offset (while the keystream itself is calculated after a server-given (0x0010) seed). The dwords are being leftshifted x times while x is a value, got from the lowest byte of the dword not being leftshifted (so if dword2 contains a value like "0x12345678", dword1 is being leftshifted 0x78 (120) times and vice versa). Then both dwords are put one after the other so they build an 8-byte value (packets are encrypted in 8-byte blocks) and the next 8-bytes are being taken out of the packet to be encrypted and the keystream offset is being increased (+8).
The decryption is similar. Of course dword2 is leftshifted first because dword1's lowest byte is the number of leftshifts and dword1 is leftshifted after that because dword2's lowest byte isn't known before leftshifting it (so just the opposite direction). |
|
Back to top |
|
 |
|