Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security concern for miscreants using "posters" to modify gamestate #17

Open
Forns opened this issue Nov 12, 2011 · 0 comments
Open

Security concern for miscreants using "posters" to modify gamestate #17

Forns opened this issue Nov 12, 2011 · 0 comments

Comments

@Forns
Copy link
Collaborator

Forns commented Nov 12, 2011

Dondi and I were discussing this issue and are concerned that anyone with ill intent may use a poster, like the Firefox poster, as a means of messing with the K'tah gamestate. This gives cheaters the capacity to return their player to full health, give themselves massive scores, or manipulate anything that functions from our Ajax calls.

One solution providing a sufficient amount of security would be to use an MD5 hash-key sent to, then expected from, a client with each get-post cycle; the key would be different each time, and would thwart almost all attempts to mess with the game.

Perhaps David could comment more on this with his experience in the MVC world, but a simple implementation may not be out of the question, nor would there be a whole lot of resultant overhead.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant