.com.unity Forums
  The Official e-Store of Shrapnel Games

This Month's Specials

Raging Tiger- Save $9.00
winSPMBT: Main Battle Tank- Save $5.00

   







Go Back   .com.unity Forums > Illwinter Game Design > Dominions 2: The Ascension Wars

Reply
 
Thread Tools Display Modes
  #1  
Old August 9th, 2004, 09:57 PM
Demosthenes's Avatar

Demosthenes Demosthenes is offline
Corporal
 
Join Date: Feb 2004
Location: San Diego, CA
Posts: 89
Thanks: 0
Thanked 0 Times in 0 Posts
Demosthenes is on a distinguished road
Default Re: How is cheating possible?

Yes Sir. Well worth the effort. Cleaning house is good for everyone.

RE: Zap and the topic heading...

I believe that we would all like to know how it was done. I recognize that Gandalf said it would be kept out of public eyes; I'm not sure I want to go wandering into the alley where I will find that answer.
Reply With Quote
  #2  
Old August 9th, 2004, 10:03 PM

Molog Molog is offline
Sergeant
 
Join Date: May 2004
Posts: 338
Thanks: 0
Thanked 0 Times in 0 Posts
Molog is on a distinguished road
Default Re: How is cheating possible?

I guess hexedit the 2h file so that your commanders have iligal orders. Would work, if they aren't checked on server
Reply With Quote
  #3  
Old August 9th, 2004, 10:07 PM
Zapmeister's Avatar

Zapmeister Zapmeister is offline
First Lieutenant
 
Join Date: Nov 2003
Location: Hobart, Australia
Posts: 772
Thanks: 7
Thanked 3 Times in 2 Posts
Zapmeister is on a distinguished road
Default Re: How is cheating possible?

Quote:
I guess hexedit the 2h file so that your commanders have iligal orders. Would work, if they aren't checked on server
Two problems:

1) The 2h file is encrypted and checksummed;
2) The format of the 2h file prior to encryption is not public knowledge.
__________________
There are 2 secrets to success in life:
1. Don't tell everything you know.
Reply With Quote
  #4  
Old August 9th, 2004, 10:50 PM

Evil Dave Evil Dave is offline
Corporal
 
Join Date: Jan 2004
Location: Wilmington, Delaware, USA
Posts: 191
Thanks: 1
Thanked 13 Times in 2 Posts
Evil Dave is on a distinguished road
Default Re: How is cheating possible?

Quote:

Two problems:

1) The 2h file is encrypted and checksummed;
2) The format of the 2h file prior to encryption is not public knowledge.
While I'm not a cryptanalyst, I suggest you search the net for "chosen plaintext attack".

Apologies to the Moderators if mentioning this is a no-no.
__________________
No plan survives contact with the enemy.
--Helmut von Moltke

Have too may pretender files to keep track of? Use catgod to view them.
Reply With Quote
  #5  
Old August 9th, 2004, 11:44 PM
Zapmeister's Avatar

Zapmeister Zapmeister is offline
First Lieutenant
 
Join Date: Nov 2003
Location: Hobart, Australia
Posts: 772
Thanks: 7
Thanked 3 Times in 2 Posts
Zapmeister is on a distinguished road
Default Re: How is cheating possible?

Quote:
While I'm not a cryptanalyst, I suggest you search the net for "chosen plaintext attack".

I won't do this, but I will take your word for it that the encryption can be defeated with an appropriate tool.

That being the case, there's no defense short of server checking, and there's a lot of checking to do. The type and quantity of every asset a player apparently holds (gems, items, units etc) in the incoming 2h file has to be reconciled against the ftherlnd file, and that's not easy.
__________________
There are 2 secrets to success in life:
1. Don't tell everything you know.
Reply With Quote
  #6  
Old August 10th, 2004, 12:09 AM

Evil Dave Evil Dave is offline
Corporal
 
Join Date: Jan 2004
Location: Wilmington, Delaware, USA
Posts: 191
Thanks: 1
Thanked 13 Times in 2 Posts
Evil Dave is on a distinguished road
Default Re: How is cheating possible?

Quote:

That being the case, there's no defense short of server checking, and there's a lot of checking to do. The type and quantity of every asset a player apparently holds (gems, items, units etc) in the incoming 2h file has to be reconciled against the ftherlnd file, and that's not easy.
I'm not sure it's so bad. I think all the server needs to remember is how much stuff each player started with at the beginning of a turn, and then get a list of new stuff each player's moves created. If a list cost more than that player had, something's gone wrong. Alchemy makes the problem a bit harder, but I don't think dramatically so.
__________________
No plan survives contact with the enemy.
--Helmut von Moltke

Have too may pretender files to keep track of? Use catgod to view them.
Reply With Quote
  #7  
Old August 10th, 2004, 12:10 AM
Gandalf Parker's Avatar

Gandalf Parker Gandalf Parker is offline
Shrapnel Fanatic
 
Join Date: Oct 2003
Location: Vacaville, CA, USA
Posts: 13,736
Thanks: 341
Thanked 479 Times in 326 Posts
Gandalf Parker is on a distinguished road
Default Re: How is cheating possible?

Well the developers have a way to dismantle a players file and do the comparison. So that information should make us all feel more relaxed. Deep discussion on how the cheating can be accomplished would serve questionable purposes.
__________________
-- DISCLAIMER:
This game is NOT suitable for students, interns, apprentices, or anyone else who is expected to pass tests on a regular basis. Do not think about strategies while operating heavy machinery. Before beginning this game make arrangements for someone to check on you daily. If you find that your game has continued for more than 36 hours straight then you should consult a physician immediately (Do NOT show him the game!)
Reply With Quote
  #8  
Old August 10th, 2004, 01:16 AM

Huzurdaddi Huzurdaddi is offline
First Lieutenant
 
Join Date: Mar 2004
Location: Seattle
Posts: 771
Thanks: 0
Thanked 3 Times in 2 Posts
Huzurdaddi is on a distinguished road
Default Re: How is cheating possible?

Quote:

While I'm not a cryptanalyst, I suggest you search the net for "chosen plaintext attack".

You do not attack the cryptography in a suitaion like this. The client has to be able to read the .2h files it has to be able to checksum ( hash ) them. Thus the key and the salt for the checksum ( hash ) are in the executable this is where you look.

The developers can do a little to make it hard to find the keys, but in the end a determined attacker will find them.

Quote:

That being the case, there's no defense short of server checking, and there's a lot of checking to do. The type and quantity of every asset a player apparently holds (gems, items, units etc) in the incoming 2h file has to be reconciled against the ftherlnd file, and that's not easy.

Not really. The server should do all of the checking that the UI does. And this more than likely is the problem. IW has code which does validation in the UI for some operations ( let's say alchemy ) and they do not validate on the server.
Reply With Quote
  #9  
Old August 10th, 2004, 01:21 AM

Huzurdaddi Huzurdaddi is offline
First Lieutenant
 
Join Date: Mar 2004
Location: Seattle
Posts: 771
Thanks: 0
Thanked 3 Times in 2 Posts
Huzurdaddi is on a distinguished road
Default Re: How is cheating possible?

Quote:

Deep discussion on how the cheating can be accomplished would serve questionable purposes.

I have to say that I disagree with this. *if* there is cheating going on then it is best to have the methods in the open thus everyone knows what can happen and they look for evidence. Further it stimulates patches.

Although *if* there is cheating *and* it is caused by most of the checking being done by the UI and not by the server then that could mean a lot of work for IW.
Reply With Quote
  #10  
Old August 9th, 2004, 10:05 PM
Zapmeister's Avatar

Zapmeister Zapmeister is offline
First Lieutenant
 
Join Date: Nov 2003
Location: Hobart, Australia
Posts: 772
Thanks: 7
Thanked 3 Times in 2 Posts
Zapmeister is on a distinguished road
Default Re: How is cheating possible?

Quote:
I believe that we would all like to know how it was done. I recognize that Gandalf said it would be kept out of public eyes; I'm not sure I want to go wandering into the alley where I will find that answer.
Sure. But finding that answer is a pre-requisite for closing the vulnerability. And after that vulnerability is closed, it no longer matters if everyone knows the details.

But I have no problem with this happening behind closed doors, if that's the way the Powers That Be want it.
__________________
There are 2 secrets to success in life:
1. Don't tell everything you know.
Reply With Quote
Reply

Bookmarks


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump


All times are GMT -4. The time now is 11:57 PM.


Powered by vBulletin® Version 3.8.1
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright ©1999 - 2025, Shrapnel Games, Inc. - All Rights Reserved.