1998Q4/
<!-- MHonArc v2.4.4 -->
<!--X-Subject: [MUD&#45;Dev] Re: Trusting the Client (Re: Laws of Online World D esign) -->
<!--X-From-R13: Xba Zrbaneq <wyrbaneqNqvipbz.fyvzl.pbz> -->
<!--X-Date: Wed, 14 Oct 1998 16:41:37 &#45;0700 -->
<!--X-Message-Id: 19981014163602.A3356#divcom,slimy.com -->
<!--X-Content-Type: text/plain -->
<!--X-Reference: 3555DE51FF1FD211A90100805F9FD04DBD54A9@ICTMAIL08 -->
<!--X-Head-End-->
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<html>
<head>
<title>MUD-Dev message, [MUD-Dev] Re: Trusting the Client (Re: Laws of Online World D </title>
<!-- meta name="robots" content="noindex,nofollow" -->
<link rev="made" href="mailto:jleonard#divcom,slimy.com">
</head>
<body background="/backgrounds/paperback.gif" bgcolor="#ffffff"
      text="#000000" link="#0000FF" alink="#FF0000" vlink="#006000">

  <font size="+4" color="#804040">
    <strong><em>MUD-Dev<br>mailing list archive</em></strong>
  </font>
      
<br>
[&nbsp;<a href="../">Other Periods</a>
&nbsp;|&nbsp;<a href="../../">Other mailing lists</a>
&nbsp;|&nbsp;<a href="/search.php3">Search</a>
&nbsp;]
<br clear=all><hr>
<!--X-Body-Begin-->
<!--X-User-Header-->
<!--X-User-Header-End-->
<!--X-TopPNI-->

Date:&nbsp;
[&nbsp;<a href="msg00211.html">Previous</a>
&nbsp;|&nbsp;<a href="msg00213.html">Next</a>
&nbsp;]
&nbsp;&nbsp;&nbsp;&nbsp;
Thread:&nbsp;
[&nbsp;<a href="msg00208.html">Previous</a>
&nbsp;|&nbsp;<a href="msg00237.html">Next</a>
&nbsp;]
&nbsp;&nbsp;&nbsp;&nbsp;
Index:&nbsp;
[&nbsp;<A HREF="author.html#00212">Author</A>
&nbsp;|&nbsp;<A HREF="#00212">Date</A>
&nbsp;|&nbsp;<A HREF="thread.html#00212">Thread</A>
&nbsp;]

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
<H1>[MUD-Dev] Re: Trusting the Client (Re: Laws of Online World D esign)</H1>
<HR>
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
<UL>
<LI><em>To</em>: <A HREF="mailto:mud-dev#kanga,nu">mud-dev#kanga,nu</A></LI>
<LI><em>Subject</em>: [MUD-Dev] Re: Trusting the Client (Re: Laws of Online World D esign)</LI>
<LI><em>From</em>: Jon Leonard &lt;<A HREF="mailto:jleonard#divcom,slimy.com">jleonard#divcom,slimy.com</A>&gt;</LI>
<LI><em>Date</em>: Wed, 14 Oct 1998 16:36:02 -0700</LI>
<LI><em>Cc</em>: Jon Leonard &lt;<A HREF="mailto:jleonard#divcom,slimy.com">jleonard#divcom,slimy.com</A>&gt;</LI>
<LI><em>Reply-To</em>: <A HREF="mailto:mud-dev#kanga,nu">mud-dev#kanga,nu</A></LI>
</UL>
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<HR>
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
<PRE>
On Wed, Oct 14, 1998 at 04:07:03PM -0500, Wilburn, E.J. wrote:
&gt; &gt; -----Original Message-----
&gt; &gt; From:	Marc Hernandez [SMTP:marc#jb,com]
&gt; &gt; Sent:	Wednesday, October 14, 1998 2:21 PM
&gt; &gt; 
&gt; &gt; 	Is there any way to stop other processes from at least writing and
&gt; &gt; preferebly both reading and writing a Win 95/98/NT processes memory? Is
&gt; &gt; there 
&gt; &gt; any way to stop programs from being run via a debugger or at least detect
&gt; &gt; it?  
&gt; &gt; 
&gt; &gt; Marc Hernandez		marc#eisoftware,com
&gt; &gt; Programmer		www.eisoftware.com
&gt; &gt; 
&gt; I don't know if you're at all familiar with Subspace from Virgin Interactive
&gt; &lt;<A  HREF="http://www.vie.com/subspace">http://www.vie.com/subspace</A>&gt;, but they would attempt to detect any
&gt; debuggers in memory and then log the IP address of the system attempting to
&gt; debug their program.  I'm not sure how well it worked but the few months I
&gt; spent playing SubSpace were relatively cheat free.  I'm not sure as to the
&gt; exact implementation since they didn't pass that information out for obvious
&gt; reasons.  I'm assuming they probably just search through the task list
&gt; and/or window list for certain identifying strings.

Logging the IP address of a cheat is an interesting deterrent, but in a
world of dynamic IP addresses it doesn't give you anything worthwhile.

Requiring a valid serial number to connect (a cryptographicly signed
one, so they can't be faked), and then logging that is probably better.
That way you can permanently disable the game for someone who tries.
The same technique can detect illegal copies, and do all sorts of other
big-brotherish tracking.

Searching memory for debuggers isn't that useful, though.  A determined
analyst can snoop network trafic, run under an emulator (how do you know
my 600 MHz alpha isn't really a sluggish PC?), or even attach a logic
analyzer to the system.  At best that sort of technique just slows
down hacks.

It might make it harder than bribing an insider for some source code,
though.

I favor doing client data validation in the server, and more or less
defining as legal anything that follows the protocol.  It just seems
simpler and more secure that way.

Jon Leonard


</PRE>

<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<HR>
<ul compact><li><strong>Follow-Ups</strong>:
<ul>
<li><strong><A NAME="00237" HREF="msg00237.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online World D esign)</A></strong>
<ul compact><li><em>From:</em> Vadim Tkachenko &lt;vt#freehold,crocodile.org&gt;</li></ul>
</UL></LI></UL>
<!--X-Follow-Ups-End-->
<!--X-References-->
<UL><LI><STRONG>References</STRONG>:
<UL>
<LI><STRONG><A NAME="00208" HREF="msg00208.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online WorldD esign)</A></STRONG>
<UL><LI><EM>From:</EM> "Wilburn, E.J." &lt;WilburnE#kochind,com&gt;</LI></UL></LI>
</UL></LI></UL>
<!--X-References-End-->
<!--X-BotPNI-->
<UL>
<LI>Prev by Date:
<STRONG><A HREF="msg00211.html">[MUD-Dev] Re: Laws of Online World Design</A></STRONG>
</LI>
<LI>Next by Date:
<STRONG><A HREF="msg00213.html">[MUD-Dev] Re: Laws of Online World Design</A></STRONG>
</LI>
<LI>Prev by thread:
<STRONG><A HREF="msg00208.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online WorldD esign)</A></STRONG>
</LI>
<LI>Next by thread:
<STRONG><A HREF="msg00237.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online World D esign)</A></STRONG>
</LI>
<LI>Index(es):
<UL>
<LI><A HREF="index.html#00212"><STRONG>Date</STRONG></A></LI>
<LI><A HREF="thread.html#00212"><STRONG>Thread</STRONG></A></LI>
</UL>
</LI>
</UL>

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
<ul><li>Thread context:
<BLOCKQUOTE><UL>
<LI><STRONG>[MUD-Dev] ADMIN: Unsubscriptions</STRONG>, <EM>(continued)</EM>
<ul compact>
<LI><strong><A NAME="00673" HREF="msg00673.html">[MUD-Dev] ADMIN: Unsubscriptions</A></strong>, 
J C Lawrence <a href="mailto:claw#kanga,nu">claw#kanga,nu</a>, Sun 01 Nov 1998, 17:34 GMT
</LI>
</ul>
</LI>
<LI><strong><A NAME="00207" HREF="msg00207.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online WorldD esign)</A></strong>, 
Wilburn, E.J. <a href="mailto:WilburnE#kochind,com">WilburnE#kochind,com</a>, Wed 14 Oct 1998, 20:45 GMT
<UL>
<LI><strong><A NAME="00209" HREF="msg00209.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online World D esign)</A></strong>, 
J C Lawrence <a href="mailto:claw#under,engr.sgi.com">claw#under,engr.sgi.com</a>, Wed 14 Oct 1998, 22:02 GMT
</LI>
</UL>
<UL>
<li>&lt;Possible follow-up(s)&gt;<br>
<LI><strong><A NAME="00208" HREF="msg00208.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online WorldD esign)</A></strong>, 
Wilburn, E.J. <a href="mailto:WilburnE#kochind,com">WilburnE#kochind,com</a>, Wed 14 Oct 1998, 21:14 GMT
<UL>
<LI><strong><A NAME="00212" HREF="msg00212.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online World D esign)</A></strong>, 
Jon Leonard <a href="mailto:jleonard#divcom,slimy.com">jleonard#divcom,slimy.com</a>, Wed 14 Oct 1998, 23:41 GMT
<UL>
<LI><strong><A NAME="00237" HREF="msg00237.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online World D esign)</A></strong>, 
Vadim Tkachenko <a href="mailto:vt#freehold,crocodile.org">vt#freehold,crocodile.org</a>, Sat 17 Oct 1998, 04:10 GMT
<UL>
<LI><strong><A NAME="00250" HREF="msg00250.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online World D esign)</A></strong>, 
Steve Sparks <a href="mailto:ssparks#enigma,sss.org">ssparks#enigma,sss.org</a>, Mon 19 Oct 1998, 22:40 GMT
<UL>
<LI><strong><A NAME="00251" HREF="msg00251.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online World Design)</A></strong>, 
Jon Leonard <a href="mailto:jleonard#divcom,slimy.com">jleonard#divcom,slimy.com</a>, Mon 19 Oct 1998, 23:23 GMT
<UL>
<LI><strong><A NAME="00275" HREF="msg00275.html">[MUD-Dev] Re: Trusting the Client (Re: Laws of Online World Design)</A></strong>, 
Steve Sparks <a href="mailto:ssparks#enigma,sss.org">ssparks#enigma,sss.org</a>, Tue 20 Oct 1998, 17:46 GMT
</LI>
</UL>
</LI>
</UL>
</LI>
</UL>
</LI>
</UL>
</LI>
</UL>
</LI>
</UL>
</LI>
</UL></BLOCKQUOTE>

</ul>
<hr>
<center>
[&nbsp;<a href="../">Other Periods</a>
&nbsp;|&nbsp;<a href="../../">Other mailing lists</a>
&nbsp;|&nbsp;<a href="/search.php3">Search</a>
&nbsp;]
</center>
<hr>
</body>
</html>