the stalled state of tw2002
| Author |
Message |
|
Micro
Ambassador
Joined: Wed Apr 20, 2011 1:19 pm Posts: 2559 Location: Oklahoma City, OK 73170 US
|
 Re: the stalled state of tw2002
You could also use private/public key encryption, like HTTPS does. I really don't know how that works though.
_________________ Regards, Micro Website: http://www.microblaster.net TWGS2.20b/TW3.34: telnet://twgs.microblaster.net:2002
ICQ is Dead Jim! Join us on Discord: https://discord.gg/zvEbArscMN
|
| Tue Mar 15, 2016 2:00 pm |
|
 |
|
Mongoose
Commander
Joined: Mon Oct 29, 2001 3:00 am Posts: 1096 Location: Tucson, AZ
|
 Re: the stalled state of tw2002
Star Killer wrote: anything you did like that would change the game...and it would NOT be trade wars anymore. TradeWars has already seen many major changes, and it's still TradeWars.
_________________ Suddenly you're Busted!
|
| Tue Mar 15, 2016 2:21 pm |
|
 |
|
Mongoose
Commander
Joined: Mon Oct 29, 2001 3:00 am Posts: 1096 Location: Tucson, AZ
|
 Re: the stalled state of tw2002
Micro wrote: I was shocked the first time I compiled a C "Hello World" application and it was around 32,000 bytes You know what's really crazy? The skeleton app you get when you create a new Android project in Eclipse or IDEA compiles to around 2.5 MB. A heap dump shows about 4,500 classes and tens of thousands of objects. All this just to print "Hello, world" on the screen. 
_________________ Suddenly you're Busted!
|
| Tue Mar 15, 2016 2:29 pm |
|
 |
|
Mongoose
Commander
Joined: Mon Oct 29, 2001 3:00 am Posts: 1096 Location: Tucson, AZ
|
 Re: the stalled state of tw2002
Micro wrote: You could also use private/public key encryption, like HTTPS does. I really don't know how that works though. In a nutshell, public key encryption does two things: Alice's signature on a file proves that Alice* was in possession of the file and it was not subsequently modified; this can be verified using Alice's public key. If a server can decrypt messages encrypted with Alice's public key, Bob knows the server he's talking to actually belongs to Alice* and the data stream has not been modified. * = or someone with access to Alice's private key. The problem is how Bob knows that Alice's public key is really Alice's. Alice could give Bob her public key over a side channel, like in person on a USB stick, but this isn't practical when you connect to an unknown server on the Internet. This is where a Certificate Authority (CA) comes in. The CA's public key has already been communicated to you over a side channel, namely it comes preinstalled with your OS. Alice pays the CA to sign her public key. Then you can use the CA's public key to validate the CA's signature on Alice's key. We trust the CA to verify that Alice is really Alice because they're in it for the money and their credibility would be destroyed if they didn't.
_________________ Suddenly you're Busted!
|
| Tue Mar 15, 2016 2:44 pm |
|
 |
|
Shadow2
Sergeant Major
Joined: Mon May 11, 2015 8:36 am Posts: 63
|
 Re: the stalled state of tw2002
Micro wrote: Bottom line is that your client is going to get hacked, so you are right, most of the protection needs to be on the server side where you have control. The client should only be a window that can see what's happening on the server, but you still need something on the client side to prevent automation (i.e. automated head shots).
But automated head shots are so much *fun*!
|
| Tue Mar 15, 2016 2:50 pm |
|
 |
|
Micro
Ambassador
Joined: Wed Apr 20, 2011 1:19 pm Posts: 2559 Location: Oklahoma City, OK 73170 US
|
 Re: the stalled state of tw2002
Mongoose wrote: Micro wrote: You could also use private/public key encryption, like HTTPS does. I really don't know how that works though. In a nutshell, public key encryption does two things: Alice's signature on a file proves that Alice* was in possession of the file and it was not subsequently modified; this can be verified using Alice's public key. If a server can decrypt messages encrypted with Alice's public key, Bob knows the server he's talking to actually belongs to Alice* and the data stream has not been modified. * = or someone with access to Alice's private key. The problem is how Bob knows that Alice's public key is really Alice's. Alice could give Bob her public key over a side channel, like in person on a USB stick, but this isn't practical when you connect to an unknown server on the Internet. This is where a Certificate Authority (CA) comes in. The CA's public key has already been communicated to you over a side channel, namely it comes preinstalled with your OS. Alice pays the CA to sign her public key. Then you can use the CA's public key to validate the CA's signature on Alice's key. We trust the CA to verify that Alice is really Alice because they're in it for the money and their credibility would be destroyed if they didn't. I actually knew all that, but when I go to my bank account and view my check ledger, anyone with the public key and access to any router between me and the bank could de-crypt the information I requested, so there has to be more to it than that. hmmmm bob and alice, yo must have been reading this https://en.wikipedia.org/wiki/Public-key_cryptography
_________________ Regards, Micro Website: http://www.microblaster.net TWGS2.20b/TW3.34: telnet://twgs.microblaster.net:2002
ICQ is Dead Jim! Join us on Discord: https://discord.gg/zvEbArscMN
Last edited by Micro on Tue Mar 15, 2016 3:05 pm, edited 1 time in total.
|
| Tue Mar 15, 2016 2:51 pm |
|
 |
|
Micro
Ambassador
Joined: Wed Apr 20, 2011 1:19 pm Posts: 2559 Location: Oklahoma City, OK 73170 US
|
 Re: the stalled state of tw2002
Shadow2 wrote: But automated head shots are so much *fun*! I hate you now... lol j/k Actually my reactions are so slow that they probably don't need to cheat to kill me, but I'm going to claim those cheating bastards are anyway dammit 
_________________ Regards, Micro Website: http://www.microblaster.net TWGS2.20b/TW3.34: telnet://twgs.microblaster.net:2002
ICQ is Dead Jim! Join us on Discord: https://discord.gg/zvEbArscMN
|
| Tue Mar 15, 2016 2:53 pm |
|
 |
|
Shadow2
Sergeant Major
Joined: Mon May 11, 2015 8:36 am Posts: 63
|
 Re: the stalled state of tw2002
Mongoose wrote: Micro wrote: You could also use private/public key encryption, like HTTPS does. I really don't know how that works though. In a nutshell, public key encryption does two things: Alice's signature on a file proves that Alice* was in possession of the file and it was not subsequently modified; this can be verified using Alice's public key. If a server can decrypt messages encrypted with Alice's public key, Bob knows the server he's talking to actually belongs to Alice* and the data stream has not been modified. * = or someone with access to Alice's private key. The problem is how Bob knows that Alice's public key is really Alice's. Alice could give Bob her public key over a side channel, like in person on a USB stick, but this isn't practical when you connect to an unknown server on the Internet. This is where a Certificate Authority (CA) comes in. The CA's public key has already been communicated to you over a side channel, namely it comes preinstalled with your OS. Alice pays the CA to sign her public key. Then you can use the CA's public key to validate the CA's signature on Alice's key. We trust the CA to verify that Alice is really Alice because they're in it for the money and their credibility would be destroyed if they didn't. Yep, good summary. The thing is, you don't even need a third party CA for a game if you are just protecting communication between the game and its client. The game just needs to know what private key belongs to what client. Long and short of it, public key encryption helps two parties who don't trust each other communicate safely through the use of a trusted third party. It doesn't solve the client server security problem, though, if your potential attacker has root level access to the client. At that point, the client can't be trusted. Which is why the client should never be trusted. 
|
| Tue Mar 15, 2016 2:54 pm |
|
 |
|
Shadow2
Sergeant Major
Joined: Mon May 11, 2015 8:36 am Posts: 63
|
 Re: the stalled state of tw2002
Micro wrote: Mongoose wrote: Micro wrote: You could also use private/public key encryption, like HTTPS does. I really don't know how that works though. In a nutshell, public key encryption does two things: Alice's signature on a file proves that Alice* was in possession of the file and it was not subsequently modified; this can be verified using Alice's public key. If a server can decrypt messages encrypted with Alice's public key, Bob knows the server he's talking to actually belongs to Alice* and the data stream has not been modified. * = or someone with access to Alice's private key. The problem is how Bob knows that Alice's public key is really Alice's. Alice could give Bob her public key over a side channel, like in person on a USB stick, but this isn't practical when you connect to an unknown server on the Internet. This is where a Certificate Authority (CA) comes in. The CA's public key has already been communicated to you over a side channel, namely it comes preinstalled with your OS. Alice pays the CA to sign her public key. Then you can use the CA's public key to validate the CA's signature on Alice's key. We trust the CA to verify that Alice is really Alice because they're in it for the money and their credibility would be destroyed if they didn't. I actually knew all that, but when I go to my bank account and view my check ledger, anyone with the public key and access to any router between me and the bank could de-crypt the information I requested, so there has to be more to it than that. No, they couldn't. They would have to have the private keys to decypt it. When I communicate with the bank, I encrypt the message I sent them with their public key, which can only be decrypted by their private key. When they respond to me, the message is encrypted with my public key, which can only be decrypted by me with my private key. The private keys are never exchanged. That's how it works
|
| Tue Mar 15, 2016 3:01 pm |
|
 |
|
Shadow2
Sergeant Major
Joined: Mon May 11, 2015 8:36 am Posts: 63
|
 Re: the stalled state of tw2002
Mongoose wrote: Micro wrote: I was shocked the first time I compiled a C "Hello World" application and it was around 32,000 bytes You know what's really crazy? The skeleton app you get when you create a new Android project in Eclipse or IDEA compiles to around 2.5 MB. A heap dump shows about 4,500 classes and tens of thousands of objects. All this just to print "Hello, world" on the screen.  Yeah seriously, that's even more bloat than a Java app 
|
| Tue Mar 15, 2016 3:02 pm |
|
 |
|
Micro
Ambassador
Joined: Wed Apr 20, 2011 1:19 pm Posts: 2559 Location: Oklahoma City, OK 73170 US
|
 Re: the stalled state of tw2002
Shadow2 wrote: No, they couldn't. They would have to have the private keys to decypt it. When I communicate with the bank, I encrypt the message I sent them with their public key, which can only be decrypted by their private key. When they respond to me, the message is encrypted with my public key, which can only be decrypted by me with my private key. The private keys are never exchanged. That's how it works I know they can't I just didn't know why. I thought I was using the public key to decrypt what the bank was sending me, but it is the other way around. So my browser has to create a key pair and send the public key to the bank's web server before they can send me information?
_________________ Regards, Micro Website: http://www.microblaster.net TWGS2.20b/TW3.34: telnet://twgs.microblaster.net:2002
ICQ is Dead Jim! Join us on Discord: https://discord.gg/zvEbArscMN
|
| Tue Mar 15, 2016 3:16 pm |
|
 |
|
cc bee
Chief Warrant Officer
Joined: Tue Jan 01, 2008 8:08 pm Posts: 193
|
 Re: the stalled state of tw2002
Mr. J. Pritchett sent a reply to me, it follows:
Yes, I'm afraid TW is on hold at the moment, but only while I am working on Star Citizen. Once I am finished with that project, I fully intend to continue working on TW. I have considered whether or not it would be better to allow someone else to continue development of TW, but I definitely am not finished with it. Just busy at the moment.
John
Looks like standing still is the play of the day. I mentioned to John that most of the players are seniors and that the game is dwindling like the embers of a good fire.
cc bee... out
|
| Tue Mar 15, 2016 7:33 pm |
|
 |
|
Cruncher
Ambassador
Joined: Fri Feb 23, 2001 3:00 am Posts: 4016 Location: USA
|
 Re: the stalled state of tw2002
Kavanagh wrote: A suggestion would be to get in touch with Jeff Moriarty and buy the source for his last release of the HVS MBBS TW 2002.
The late 90s HVS was very buggy which was partly why (I think) JP created TWGS. Post TWGS, HVS brought out a new, less buggy MBBS Game. Cruncher and I played it a few bangs half a dozen years ago on Stoneslinger's BBS. The only bug I can remember that we found was the port rollover bug, mebbe she remembers others.
One major downside for some, perhaps upside for others - much of the TWX internal database will not function under HVS. Most of the reactive attack scripts would not work. Telix, Qmodem, ZOC, Procomm - all fine, just TWX. The reason is very simple and a rewrite of TWX source would fix the problem. Outside my competence.
EDIT- Rewriting the scripts would not fix the problem, the database itself is the problem.
Possible problems: How to contact Jeff or Stoneslinger (who knew Jeff) Might be legal ownership issues JP/Jeff Moriarty, I don't know if Jeff Moriarty has the right to continue to work with the HVS version. I have Jeff Moriarty on FB, he's a tech news reporter in Phoenix now. I may be mistaken, but I thought Gary paid Jeff to port the door version to MBBS. When Jeff stopped working on bug fixes, Gary found JP. Here's his blog: http://moriartys.net/
_________________
BOTE 1998 Champs: Team Fament HHT 2015 Champs: Cloud09 Big Game 2016 Champs: Draft team HHT 2018 Champs: Rock Stars Big Game 2019 Champs: Draft Team
Classic Style Games Here: telnet://crunchers-twgs.com:2002 Web page from 1990's: https://web.archive.org/web/20170103155645/http://tradewars.fament.com/Cruncher/tradewar.htm Blog with current server info: http://cruncherstw.blogspot.com Discord: https://discord.gg/4dja5Z8 E-mail: Cruncherstw@gmail.com FaceBook: http://www.facebook.com/CrunchersTW
|
| Tue Mar 15, 2016 8:23 pm |
|
 |
|
Mongoose
Commander
Joined: Mon Oct 29, 2001 3:00 am Posts: 1096 Location: Tucson, AZ
|
 Re: the stalled state of tw2002
Shadow2 wrote: The game just needs to know what private key belongs to what client. But you can't know that without a chain of trust linking back to a public key that was obtained via a side channel. The best you can do is record the first key you received for that client. If the connection was MITMed the first time, you'll never know.
_________________ Suddenly you're Busted!
|
| Wed Mar 16, 2016 12:45 am |
|
 |
|
Mongoose
Commander
Joined: Mon Oct 29, 2001 3:00 am Posts: 1096 Location: Tucson, AZ
|
 Re: the stalled state of tw2002
Micro wrote: So my browser has to create a key pair and send the public key to the bank's web server before they can send me information? Maybe not. Asymmetric encryption is slow, so it's normally only used to establish a secret symmetric key. A client could generate the symmetric key and send it to the server encrypted with the server's public key. Both sides would use the symmetric key for the rest of the session. I'm not sure if that's how HTTPS works in practice, because the beauty of the whole thing is that applications don't need to deal with any of this.
_________________ Suddenly you're Busted!
|
| Wed Mar 16, 2016 12:50 am |
|
 |
|
Who is online |
Users browsing this forum: No registered users and 25 guests |
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot post attachments in this forum
|
|