|
|
|
 |

August 9th, 2004, 09:57 PM
|
 |
Corporal
|
|
Join Date: Feb 2004
Location: San Diego, CA
Posts: 89
Thanks: 0
Thanked 0 Times in 0 Posts
|
|
Re: How is cheating possible?
Yes Sir. Well worth the effort. Cleaning house is good for everyone.
RE: Zap and the topic heading...
I believe that we would all like to know how it was done. I recognize that Gandalf said it would be kept out of public eyes; I'm not sure I want to go wandering into the alley where I will find that answer.
|

August 9th, 2004, 10:03 PM
|
Sergeant
|
|
Join Date: May 2004
Posts: 338
Thanks: 0
Thanked 0 Times in 0 Posts
|
|
Re: How is cheating possible?
I guess hexedit the 2h file so that your commanders have iligal orders. Would work, if they aren't checked on server
|

August 9th, 2004, 10:07 PM
|
 |
First Lieutenant
|
|
Join Date: Nov 2003
Location: Hobart, Australia
Posts: 772
Thanks: 7
Thanked 3 Times in 2 Posts
|
|
Re: How is cheating possible?
Quote:
I guess hexedit the 2h file so that your commanders have iligal orders. Would work, if they aren't checked on server
|
Two problems:
1) The 2h file is encrypted and checksummed;
2) The format of the 2h file prior to encryption is not public knowledge.
__________________
There are 2 secrets to success in life:
1. Don't tell everything you know.
|

August 9th, 2004, 10:50 PM
|
Corporal
|
|
Join Date: Jan 2004
Location: Wilmington, Delaware, USA
Posts: 191
Thanks: 1
Thanked 13 Times in 2 Posts
|
|
Re: How is cheating possible?
Quote:
Two problems:
1) The 2h file is encrypted and checksummed;
2) The format of the 2h file prior to encryption is not public knowledge.
|
While I'm not a cryptanalyst,  I suggest you search the net for "chosen plaintext attack".
Apologies to the Moderators if mentioning this is a no-no.
__________________
No plan survives contact with the enemy.
--Helmut von Moltke
Have too may pretender files to keep track of? Use catgod to view them.
|

August 9th, 2004, 11:44 PM
|
 |
First Lieutenant
|
|
Join Date: Nov 2003
Location: Hobart, Australia
Posts: 772
Thanks: 7
Thanked 3 Times in 2 Posts
|
|
Re: How is cheating possible?
Quote:
While I'm not a cryptanalyst, I suggest you search the net for "chosen plaintext attack".
|
I won't do this, but I will take your word for it that the encryption can be defeated with an appropriate tool.
That being the case, there's no defense short of server checking, and there's a lot of checking to do. The type and quantity of every asset a player apparently holds (gems, items, units etc) in the incoming 2h file has to be reconciled against the ftherlnd file, and that's not easy.
__________________
There are 2 secrets to success in life:
1. Don't tell everything you know.
|

August 10th, 2004, 12:09 AM
|
Corporal
|
|
Join Date: Jan 2004
Location: Wilmington, Delaware, USA
Posts: 191
Thanks: 1
Thanked 13 Times in 2 Posts
|
|
Re: How is cheating possible?
Quote:
That being the case, there's no defense short of server checking, and there's a lot of checking to do. The type and quantity of every asset a player apparently holds (gems, items, units etc) in the incoming 2h file has to be reconciled against the ftherlnd file, and that's not easy.
|
I'm not sure it's so bad. I think all the server needs to remember is how much stuff each player started with at the beginning of a turn, and then get a list of new stuff each player's moves created. If a list cost more than that player had, something's gone wrong. Alchemy makes the problem a bit harder, but I don't think dramatically so.
__________________
No plan survives contact with the enemy.
--Helmut von Moltke
Have too may pretender files to keep track of? Use catgod to view them.
|

August 10th, 2004, 12:10 AM
|
 |
Shrapnel Fanatic
|
|
Join Date: Oct 2003
Location: Vacaville, CA, USA
Posts: 13,736
Thanks: 341
Thanked 479 Times in 326 Posts
|
|
Re: How is cheating possible?
Well the developers have a way to dismantle a players file and do the comparison. So that information should make us all feel more relaxed. Deep discussion on how the cheating can be accomplished would serve questionable purposes.
__________________
-- DISCLAIMER:
This game is NOT suitable for students, interns, apprentices, or anyone else who is expected to pass tests on a regular basis. Do not think about strategies while operating heavy machinery. Before beginning this game make arrangements for someone to check on you daily. If you find that your game has continued for more than 36 hours straight then you should consult a physician immediately (Do NOT show him the game!)
|

August 10th, 2004, 01:16 AM
|
First Lieutenant
|
|
Join Date: Mar 2004
Location: Seattle
Posts: 771
Thanks: 0
Thanked 3 Times in 2 Posts
|
|
Re: How is cheating possible?
Quote:
While I'm not a cryptanalyst, I suggest you search the net for "chosen plaintext attack".
|
You do not attack the cryptography in a suitaion like this. The client has to be able to read the .2h files it has to be able to checksum ( hash ) them. Thus the key and the salt for the checksum ( hash ) are in the executable this is where you look.
The developers can do a little to make it hard to find the keys, but in the end a determined attacker will find them.
Quote:
That being the case, there's no defense short of server checking, and there's a lot of checking to do. The type and quantity of every asset a player apparently holds (gems, items, units etc) in the incoming 2h file has to be reconciled against the ftherlnd file, and that's not easy.
|
Not really. The server should do all of the checking that the UI does. And this more than likely is the problem. IW has code which does validation in the UI for some operations ( let's say alchemy ) and they do not validate on the server.
|

August 10th, 2004, 01:21 AM
|
First Lieutenant
|
|
Join Date: Mar 2004
Location: Seattle
Posts: 771
Thanks: 0
Thanked 3 Times in 2 Posts
|
|
Re: How is cheating possible?
Quote:
Deep discussion on how the cheating can be accomplished would serve questionable purposes.
|
I have to say that I disagree with this. *if* there is cheating going on then it is best to have the methods in the open thus everyone knows what can happen and they look for evidence. Further it stimulates patches.
Although *if* there is cheating *and* it is caused by most of the checking being done by the UI and not by the server then that could mean a lot of work for IW.
|

August 9th, 2004, 10:05 PM
|
 |
First Lieutenant
|
|
Join Date: Nov 2003
Location: Hobart, Australia
Posts: 772
Thanks: 7
Thanked 3 Times in 2 Posts
|
|
Re: How is cheating possible?
Quote:
I believe that we would all like to know how it was done. I recognize that Gandalf said it would be kept out of public eyes; I'm not sure I want to go wandering into the alley where I will find that answer.
|
Sure. But finding that answer is a pre-requisite for closing the vulnerability. And after that vulnerability is closed, it no longer matters if everyone knows the details.
But I have no problem with this happening behind closed doors, if that's the way the Powers That Be want it.
__________________
There are 2 secrets to success in life:
1. Don't tell everything you know.
|
Posting Rules
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
HTML code is On
|
|
|
|
|