View unanswered posts | View active topics It is currently Thu Jan 01, 2026 11:12 am



This topic is locked, you cannot edit posts or make further replies.  [ 172 posts ]  Go to page Previous  1, 2, 3, 4, 5, 6 ... 12  Next
 the stalled state of tw2002 
Author Message
Ambassador
User avatar

Joined: Wed Apr 20, 2011 1:19 pm
Posts: 2559
Location: Oklahoma City, OK 73170 US
Unread post Re: the stalled state of tw2002
You could also use private/public key encryption, like HTTPS does. I really don't know how that works though.

_________________
Regards,
Micro

Website: http://www.microblaster.net
TWGS2.20b/TW3.34: telnet://twgs.microblaster.net:2002

ICQ is Dead Jim! Join us on Discord:
https://discord.gg/zvEbArscMN


Tue Mar 15, 2016 2:00 pm
Profile ICQ YIM WWW
Commander
User avatar

Joined: Mon Oct 29, 2001 3:00 am
Posts: 1096
Location: Tucson, AZ
Unread post Re: the stalled state of tw2002
Star Killer wrote:
anything you did like that would change the game...and it would NOT be trade wars anymore.


TradeWars has already seen many major changes, and it's still TradeWars.

_________________
Suddenly you're Busted!


Tue Mar 15, 2016 2:21 pm
Profile WWW
Commander
User avatar

Joined: Mon Oct 29, 2001 3:00 am
Posts: 1096
Location: Tucson, AZ
Unread post Re: the stalled state of tw2002
Micro wrote:
I was shocked the first time I compiled a C "Hello World" application and it was around 32,000 bytes


You know what's really crazy? The skeleton app you get when you create a new Android project in Eclipse or IDEA compiles to around 2.5 MB. A heap dump shows about 4,500 classes and tens of thousands of objects. All this just to print "Hello, world" on the screen. :-P

_________________
Suddenly you're Busted!


Tue Mar 15, 2016 2:29 pm
Profile WWW
Commander
User avatar

Joined: Mon Oct 29, 2001 3:00 am
Posts: 1096
Location: Tucson, AZ
Unread post Re: the stalled state of tw2002
Micro wrote:
You could also use private/public key encryption, like HTTPS does. I really don't know how that works though.


In a nutshell, public key encryption does two things:

Alice's signature on a file proves that Alice* was in possession of the file and it was not subsequently modified; this can be verified using Alice's public key.

If a server can decrypt messages encrypted with Alice's public key, Bob knows the server he's talking to actually belongs to Alice* and the data stream has not been modified.

* = or someone with access to Alice's private key.

The problem is how Bob knows that Alice's public key is really Alice's. Alice could give Bob her public key over a side channel, like in person on a USB stick, but this isn't practical when you connect to an unknown server on the Internet. This is where a Certificate Authority (CA) comes in. The CA's public key has already been communicated to you over a side channel, namely it comes preinstalled with your OS. Alice pays the CA to sign her public key. Then you can use the CA's public key to validate the CA's signature on Alice's key. We trust the CA to verify that Alice is really Alice because they're in it for the money and their credibility would be destroyed if they didn't.

_________________
Suddenly you're Busted!


Tue Mar 15, 2016 2:44 pm
Profile WWW
Sergeant Major

Joined: Mon May 11, 2015 8:36 am
Posts: 63
Unread post Re: the stalled state of tw2002
Micro wrote:
Bottom line is that your client is going to get hacked, so you are right, most of the protection needs to be on the server side where you have control. The client should only be a window that can see what's happening on the server, but you still need something on the client side to prevent automation (i.e. automated head shots).


But automated head shots are so much *fun*!


Tue Mar 15, 2016 2:50 pm
Profile
Ambassador
User avatar

Joined: Wed Apr 20, 2011 1:19 pm
Posts: 2559
Location: Oklahoma City, OK 73170 US
Unread post Re: the stalled state of tw2002
Mongoose wrote:
Micro wrote:
You could also use private/public key encryption, like HTTPS does. I really don't know how that works though.


In a nutshell, public key encryption does two things:

Alice's signature on a file proves that Alice* was in possession of the file and it was not subsequently modified; this can be verified using Alice's public key.

If a server can decrypt messages encrypted with Alice's public key, Bob knows the server he's talking to actually belongs to Alice* and the data stream has not been modified.

* = or someone with access to Alice's private key.

The problem is how Bob knows that Alice's public key is really Alice's. Alice could give Bob her public key over a side channel, like in person on a USB stick, but this isn't practical when you connect to an unknown server on the Internet. This is where a Certificate Authority (CA) comes in. The CA's public key has already been communicated to you over a side channel, namely it comes preinstalled with your OS. Alice pays the CA to sign her public key. Then you can use the CA's public key to validate the CA's signature on Alice's key. We trust the CA to verify that Alice is really Alice because they're in it for the money and their credibility would be destroyed if they didn't.

I actually knew all that, but when I go to my bank account and view my check ledger, anyone with the public key and access to any router between me and the bank could de-crypt the information I requested, so there has to be more to it than that.

hmmmm bob and alice, yo must have been reading this :)
https://en.wikipedia.org/wiki/Public-key_cryptography

_________________
Regards,
Micro

Website: http://www.microblaster.net
TWGS2.20b/TW3.34: telnet://twgs.microblaster.net:2002

ICQ is Dead Jim! Join us on Discord:
https://discord.gg/zvEbArscMN


Last edited by Micro on Tue Mar 15, 2016 3:05 pm, edited 1 time in total.



Tue Mar 15, 2016 2:51 pm
Profile ICQ YIM WWW
Ambassador
User avatar

Joined: Wed Apr 20, 2011 1:19 pm
Posts: 2559
Location: Oklahoma City, OK 73170 US
Unread post Re: the stalled state of tw2002
Shadow2 wrote:
But automated head shots are so much *fun*!

I hate you now... lol j/k

Actually my reactions are so slow that they probably don't need to cheat to kill me, but I'm going to claim those cheating bastards are anyway dammit :)

_________________
Regards,
Micro

Website: http://www.microblaster.net
TWGS2.20b/TW3.34: telnet://twgs.microblaster.net:2002

ICQ is Dead Jim! Join us on Discord:
https://discord.gg/zvEbArscMN


Tue Mar 15, 2016 2:53 pm
Profile ICQ YIM WWW
Sergeant Major

Joined: Mon May 11, 2015 8:36 am
Posts: 63
Unread post Re: the stalled state of tw2002
Mongoose wrote:
Micro wrote:
You could also use private/public key encryption, like HTTPS does. I really don't know how that works though.


In a nutshell, public key encryption does two things:

Alice's signature on a file proves that Alice* was in possession of the file and it was not subsequently modified; this can be verified using Alice's public key.

If a server can decrypt messages encrypted with Alice's public key, Bob knows the server he's talking to actually belongs to Alice* and the data stream has not been modified.

* = or someone with access to Alice's private key.

The problem is how Bob knows that Alice's public key is really Alice's. Alice could give Bob her public key over a side channel, like in person on a USB stick, but this isn't practical when you connect to an unknown server on the Internet. This is where a Certificate Authority (CA) comes in. The CA's public key has already been communicated to you over a side channel, namely it comes preinstalled with your OS. Alice pays the CA to sign her public key. Then you can use the CA's public key to validate the CA's signature on Alice's key. We trust the CA to verify that Alice is really Alice because they're in it for the money and their credibility would be destroyed if they didn't.


Yep, good summary. The thing is, you don't even need a third party CA for a game if you are just protecting communication between the game and its client. The game just needs to know what private key belongs to what client.

Long and short of it, public key encryption helps two parties who don't trust each other communicate safely through the use of a trusted third party. It doesn't solve the client server security problem, though, if your potential attacker has root level access to the client. At that point, the client can't be trusted. Which is why the client should never be trusted. :)


Tue Mar 15, 2016 2:54 pm
Profile
Sergeant Major

Joined: Mon May 11, 2015 8:36 am
Posts: 63
Unread post Re: the stalled state of tw2002
Micro wrote:
Mongoose wrote:
Micro wrote:
You could also use private/public key encryption, like HTTPS does. I really don't know how that works though.


In a nutshell, public key encryption does two things:

Alice's signature on a file proves that Alice* was in possession of the file and it was not subsequently modified; this can be verified using Alice's public key.

If a server can decrypt messages encrypted with Alice's public key, Bob knows the server he's talking to actually belongs to Alice* and the data stream has not been modified.

* = or someone with access to Alice's private key.

The problem is how Bob knows that Alice's public key is really Alice's. Alice could give Bob her public key over a side channel, like in person on a USB stick, but this isn't practical when you connect to an unknown server on the Internet. This is where a Certificate Authority (CA) comes in. The CA's public key has already been communicated to you over a side channel, namely it comes preinstalled with your OS. Alice pays the CA to sign her public key. Then you can use the CA's public key to validate the CA's signature on Alice's key. We trust the CA to verify that Alice is really Alice because they're in it for the money and their credibility would be destroyed if they didn't.

I actually knew all that, but when I go to my bank account and view my check ledger, anyone with the public key and access to any router between me and the bank could de-crypt the information I requested, so there has to be more to it than that.


No, they couldn't. They would have to have the private keys to decypt it. When I communicate with the bank, I encrypt the message I sent them with their public key, which can only be decrypted by their private key. When they respond to me, the message is encrypted with my public key, which can only be decrypted by me with my private key. The private keys are never exchanged. That's how it works


Tue Mar 15, 2016 3:01 pm
Profile
Sergeant Major

Joined: Mon May 11, 2015 8:36 am
Posts: 63
Unread post Re: the stalled state of tw2002
Mongoose wrote:
Micro wrote:
I was shocked the first time I compiled a C "Hello World" application and it was around 32,000 bytes


You know what's really crazy? The skeleton app you get when you create a new Android project in Eclipse or IDEA compiles to around 2.5 MB. A heap dump shows about 4,500 classes and tens of thousands of objects. All this just to print "Hello, world" on the screen. :-P


Yeah seriously, that's even more bloat than a Java app :lol:


Tue Mar 15, 2016 3:02 pm
Profile
Ambassador
User avatar

Joined: Wed Apr 20, 2011 1:19 pm
Posts: 2559
Location: Oklahoma City, OK 73170 US
Unread post Re: the stalled state of tw2002
Shadow2 wrote:
No, they couldn't. They would have to have the private keys to decypt it. When I communicate with the bank, I encrypt the message I sent them with their public key, which can only be decrypted by their private key. When they respond to me, the message is encrypted with my public key, which can only be decrypted by me with my private key. The private keys are never exchanged. That's how it works

I know they can't I just didn't know why. I thought I was using the public key to decrypt what the bank was sending me, but it is the other way around. So my browser has to create a key pair and send the public key to the bank's web server before they can send me information?

_________________
Regards,
Micro

Website: http://www.microblaster.net
TWGS2.20b/TW3.34: telnet://twgs.microblaster.net:2002

ICQ is Dead Jim! Join us on Discord:
https://discord.gg/zvEbArscMN


Tue Mar 15, 2016 3:16 pm
Profile ICQ YIM WWW
Chief Warrant Officer

Joined: Tue Jan 01, 2008 8:08 pm
Posts: 193
Unread post Re: the stalled state of tw2002
Mr. J. Pritchett sent a reply to me, it follows:

Yes, I'm afraid TW is on hold at the moment, but only while I am working on Star Citizen. Once I am finished with that project, I fully intend to continue working on TW. I have considered whether or not it would be better to allow someone else to continue development of TW, but I definitely am not finished with it. Just busy at the moment.

John

Looks like standing still is the play of the day. I mentioned to John that most of the players are seniors and that the game is dwindling like the embers of a good fire.

cc bee... out


Tue Mar 15, 2016 7:33 pm
Profile
Ambassador
User avatar

Joined: Fri Feb 23, 2001 3:00 am
Posts: 4016
Location: USA
Unread post Re: the stalled state of tw2002
Kavanagh wrote:
A suggestion would be to get in touch with Jeff Moriarty and buy the source for his last release of the HVS MBBS TW 2002.

The late 90s HVS was very buggy which was partly why (I think) JP created TWGS. Post TWGS, HVS brought out a new, less buggy MBBS Game. Cruncher and I played it a few bangs half a dozen years ago on Stoneslinger's BBS. The only bug I can remember that we found was the port rollover bug, mebbe she remembers others.

One major downside for some, perhaps upside for others - much of the TWX internal database will not function under HVS. Most of the reactive attack scripts would not work. Telix, Qmodem, ZOC, Procomm - all fine, just TWX. The reason is very simple and a rewrite of TWX source would fix the problem. Outside my competence.

EDIT- Rewriting the scripts would not fix the problem, the database itself is the problem.


Possible problems:
How to contact Jeff or Stoneslinger (who knew Jeff)
Might be legal ownership issues JP/Jeff Moriarty, I don't know if Jeff Moriarty has the right to continue to work with the HVS version.


I have Jeff Moriarty on FB, he's a tech news reporter in Phoenix now. I may be mistaken, but I thought Gary paid Jeff to port the door version to MBBS. When Jeff stopped working on bug fixes, Gary found JP. Here's his blog: http://moriartys.net/

_________________

BOTE 1998 Champs: Team Fament
HHT 2015 Champs: Cloud09
Big Game 2016 Champs: Draft team
HHT 2018 Champs: Rock Stars
Big Game 2019 Champs: Draft Team


Classic Style Games Here:
telnet://crunchers-twgs.com:2002

Web page from 1990's: https://web.archive.org/web/20170103155645/http://tradewars.fament.com/Cruncher/tradewar.htm
Blog with current server info: http://cruncherstw.blogspot.com
Discord: https://discord.gg/4dja5Z8
E-mail: Cruncherstw@gmail.com
FaceBook: http://www.facebook.com/CrunchersTW


Tue Mar 15, 2016 8:23 pm
Profile ICQ WWW
Commander
User avatar

Joined: Mon Oct 29, 2001 3:00 am
Posts: 1096
Location: Tucson, AZ
Unread post Re: the stalled state of tw2002
Shadow2 wrote:
The game just needs to know what private key belongs to what client.


But you can't know that without a chain of trust linking back to a public key that was obtained via a side channel. The best you can do is record the first key you received for that client. If the connection was MITMed the first time, you'll never know.

_________________
Suddenly you're Busted!


Wed Mar 16, 2016 12:45 am
Profile WWW
Commander
User avatar

Joined: Mon Oct 29, 2001 3:00 am
Posts: 1096
Location: Tucson, AZ
Unread post Re: the stalled state of tw2002
Micro wrote:
So my browser has to create a key pair and send the public key to the bank's web server before they can send me information?


Maybe not. Asymmetric encryption is slow, so it's normally only used to establish a secret symmetric key. A client could generate the symmetric key and send it to the server encrypted with the server's public key. Both sides would use the symmetric key for the rest of the session. I'm not sure if that's how HTTPS works in practice, because the beauty of the whole thing is that applications don't need to deal with any of this.

_________________
Suddenly you're Busted!


Wed Mar 16, 2016 12:50 am
Profile WWW
Display posts from previous:  Sort by  
This topic is locked, you cannot edit posts or make further replies.   [ 172 posts ]  Go to page Previous  1, 2, 3, 4, 5, 6 ... 12  Next

Who is online

Users browsing this forum: No registered users and 42 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
cron
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group.
Designed by wSTSoftware.