home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: rec.games.netrek
- Path: sparky!uunet!cs.utexas.edu!uwm.edu!psuvax1!uxa.ecn.bgu.edu!news.ils.nwu.edu!ils.nwu.edu!mccoy
- From: mccoy@ils.nwu.edu (Jim Mccoy)
- Subject: Re: RAS hummm....
- Message-ID: <1992Nov22.052420.513@ils.nwu.edu>
- Sender: usenet@ils.nwu.edu (Mr. usenet)
- Nntp-Posting-Host: aristotle.ils.nwu.edu
- Reply-To: mccoy@ils.nwu.edu
- Organization: The Institute for the Learning Sciences
- References: <1992Nov21.235755.23662@msuinfo.cl.msu.edu>
- Date: Sun, 22 Nov 1992 05:24:20 GMT
- Lines: 46
-
- In article <1992Nov21.235755.23662@msuinfo.cl.msu.edu>, bond@barracuda.cps.msu.edu (Curtis R Bond) writes:
- >
- > Well it seems to me that someone out there with the skill and
- > presistence will eventually find a way around or through RSA. Be it by
- > hacking or stealing code. So while this may work for awhile, it could be
- > possiible for borgs to be on RSA servers in two years tops. So all this
- > ends up being is a pain in the players ass to go out find the codes jump
- > thorugh all the hoops just to play the game without borgs.
-
- I believe that you have a fundemental misunderstanding of either how RSA
- works or how it is being implemented for netrek client validation. RSA is
- probably the most secure validation method that we will have available to
- us for a decade or more. There is a nice paper available via anonymous FTP
- from rsa.com that explains the procedure, I suggest you check it out...
-
- I guarantee you that someone will not be able to hack RSA (at least no one
- who is going to waste thier time trying to do it to make a blessed binary;
- this is the same encryption scheme that banks use to transfer money, etc...
- if you can crack RSA you are either working for the government, the mob, or
- will soon be getting a call from either one :) This leaves prying the key
- out of the client binary. A task that is not impossible. If someone does
- get the client key, then they will be able to make a blessed binary for
- _that specific key_.
-
- Once the server admins determine that a client key has been broken, they
- simply remove that key from a list held by the server and a new of
- client with a different key is generated to replace the one whose codes
- have been broken. The difference between this and the former reserved.c
- system is that under RSA you only need to compile in a new key for that
- particular architecture/client , you do not need to change the reserved.c
- for every other client type and do not need to change the servers keys.
- Thus if someone cracks the rsa_client.sun4 key, a new rsa_client.sun4 will
- be redistributed, but those using rsa_client.dec will be able to continue
- using their old client.
-
- I will leave the "why bother, let's just all use borgs" to the rest of the
- group, hopefully they will be gentle :)
-
-
- jim
- --
- Jim McCoy | PGP 2.0 Key md5 hash:
- j-mccoy@nwu.edu | 61323c49024cb089337c78a05aafe8c6
- mccoy@ils.nwu.edu | finger mccoy@ils.nwu.edu for public key
-
-
-