July 2001
- [TECH] Open Source oodb/object persistence toolkit library alpha release Brian Price
- In-game email (was On socialization and convenience) Gavin Doughtie
- In-game email (was On socialization and conveni ence) Freeman, Jeff
- In-game email (was On socialization and convenience) Caliban Tiresias Darklock
- TECH DGN: Single user MOB arena Trevyn
- TECH: CRPGs vs. RPGs, Way Back When... Michael Tresca
- TECH: CRPGs vs. RPGs, Way Back When... Matt Owen
- TECH: CRPGs vs. RPGs, Way Back When... J C Lawrence
- TECH: CRPGs vs. RPGs, Way Back When... Michael Tresca
- (no subject) Alan Unsworth
- (no subject) Edward Falconer
- (no subject) J C Lawrence
- (no subject) Bruce Mitchener
- (no subject) Travis Casey
- (no subject) J C Lawrence
- (no subject) Travis Casey
- Libs for 3D Client/Servers Brian Hook
- Libs for 3D Client/Servers Freeman, Jeff
- Libs for 3D Client/Servers Trump
- Libs for 3D Client/Servers Jeremy Noetzelman
- Libs for 3D Client/Servers J C Lawrence
- Libs for 3D Client/Servers Matt Mihaly
- Libs for 3D Client/Servers Matt Owen
- Libs for 3D Client/Servers Jeremy Noetzelman
- Libs for 3D Client/Servers Bryce Harrington
- Libs for 3D Client/Servers J C Lawrence
- Libs for 3D Client/Servers Brian Hook
- Libs for 3D Client/Servers J C Lawrence
- Libs for 3D Client/Servers Brian Hook
- Libs for 3D Client/Servers J C Lawrence
- Libs for 3D Client/Servers Vincent Archer
- Libs for 3D Client/Servers Madman Across the Water
- Libs for 3D Client/Servers Richard Aihoshi aka Jonric
- Libs for 3D Client/Servers Brian Hook
- Libs for 3D Client/Servers J Todd Coleman
- Libs for 3D Client/Servers Brian Hook
- Libs for 3D Client/Servers Sean Kelly
- Libs for 3D Client/Servers Jon Lambert
- Libs for 3D Client/Servers Sean Kelly
- Libs for 3D Client/Servers Bruce Mitchener
- Libs for 3D Client/Servers Sean Kelly
- Libs for 3D Client/Servers Dave Rickey
- Libs for 3D Client/Servers Travis Casey
- Libs for 3D Client/Servers Bryce Harrington
- Libs for 3D Client/Servers Alistair Milne
- Libs for 3D Client/Servers Travis Casey
- Libs for 3D Client/Servers J C Lawrence
- Libs for 3D Client/Servers Travis Casey
- Libs for 3D Client/Servers Jon Lambert
- Libs for 3D Client/Servers Adam Martin
- Libs for 3D Client/Servers Vincent Archer
- Libs for 3D Client/Servers Travis Nixon
- Libs for 3D Client/Servers Adam Martin
- Libs for 3D Client/Servers Vincent Archer
- Libs for 3D Client/Servers Adam Martin
- Libs for 3D Client/Servers Vincent Archer
- Libs for 3D Client/Servers Adam Martin
- Libs for 3D Client/Servers Dave Rickey
- Libs for 3D Client/Servers Travis Casey
- Libs for 3D Client/Servers Dave Rickey
- Libs for 3D Client/Servers Timothy Dang
- Libs for 3D Client/Servers Alistair Milne
- Libs for 3D Client/Servers J C Lawrence
- Libs for 3D Client/Servers Brian Hook
- Libs for 3D Client/Servers Sean Kelly
- Libs for 3D Client/Servers Gavin Doughtie
- Libs for 3D Client/Servers J C Lawrence
- Libs for 3D Client/Servers Brian Hook
- Libs for 3D Client/Servers Daniel.Harman@barclayscapital.com
- Libs for 3D Client/Servers Joel Chestnutt
- Libs for 3D Client/Servers Richard Aihoshi aka Jonric
- Libs for 3D Client/Servers Aaron Mulder
- Libs for 3D Client/Servers Max Gilead
- Libs for 3D Client/Servers Jon Lambert
- Libs for 3D Client/Servers Caliban Tiresias Darklock
- Libs for 3D Client/Servers Luke Carruthers
- Libs for 3D Client/Servers Jeremy Noetzelman
- Libs for 3D Client/Servers J C Lawrence
- Libs for 3D Client/Servers Jeremy Noetzelman
- Libs for 3D Client/Servers Adam Martin
- New polls claw@kanga.nu
- virtual mind project Phillip Lenhardt
- [TECH] Data-transfer protocols for MUDs Adam Martin
- Chatbot Michael Tresca
- GPL (was:Libs for 3D Client/Servers) Joackim Birgersson
- GPL (was:Libs for 3D Client/Servers) Travis Casey
- GPL (was:Libs for 3D Client/Servers) ghovs
- GPL (was:Libs for 3D Client/Servers) Vincent Archer
- GPL (was:Libs for 3D Client/Servers) Max Gilead
- GPL (was:Libs for 3D Client/Servers) Bobby Martin
- GPL (was:Libs for 3D Client/Servers) Joackim Birgersson
- GPL (was:Libs for 3D Client/Servers) Patrick Dughi
- GPL (was:Libs for 3D Client/Servers) Matt Mihaly
- GPL (was:Libs for 3D Client/Servers) Koster, Raph
- GPL (was:Libs for 3D Client/Servers) Joackim Birgersson
- Graphical Mud-in-a-box musings Brian Hook
- Graphical Mud-in-a-box musings Justin Rogers
- Graphical Mud-in-a-box musings Rob Bartel
- Graphical Mud-in-a-box musings Adam Martin
- Chatbot, NLP and explaining away NPC limitations Erin Mulder
- Server hosting Brian Hook
- Server hosting Corey Crawford
- Server hosting Daniel.Harman@barclayscapital.com
- Server hosting Valerio Santinelli
- Server hosting Madman Across the Water
- Server hosting Frank Crowell
- Server hosting Alistair Milne
- Server hosting Brian Hook
- Server hosting Freeman, Jeff
- Server hosting Matt Mihaly
- Server hosting fred@clift.org
- Chatbot, NLP and explaining away NPC limitations Robert Zubek
- Edged weapon damage John W Pierce
- Player characters as a prey species Jon Leonard
- Player characters as a prey species Justin Rogers
- Player characters as a prey species Ling Lo
- Player characters as a prey species J C Lawrence
- Player characters as a prey species lhulbert@hotmail.com
- Player characters as a prey species Dan Shiovitz
- Player characters as a prey species Justin Rogers
- Player characters as a prey species Matt Mihaly
- Request to mailing list MUD-Dev rejected J C Lawrence
- Chatting in MMPORPGs Peter Tyson
- Chatting in MMPORPGs Derek Licciardi
- Chatting in MMPORPGs Matt Mihaly
- Chatting in MMPORPGs Peter Tyson
- Chatting in MMPORPGs Eric Lee {RAT}
- Chatting in MMPORPGs John Buehler
- Chatting in MMPORPGs lhulbert@hotmail.com
- Chatting in MMPORPGs Adam Martin
- Chatting in MMPORPGs Eli Stevens
- Chatting in MMPORPGs Dave Rickey
- Chatting in MMPORPGs Vincent Archer
- Chatting in MMPORPGs Adam Martin
- Chatting in MMPORPGs Kevin Littlejohn
- Chatting in MMPORPGs Hans-Henrik Staerfeldt
- Chatting in MMPORPGs Lee Sheldon
- Chatting in MMPORPGs Madman Across the Water
- Chatting in MMPORPGs Peter Tyson
- Chatting in MMPORPGs J C Lawrence
- TECH: Mail (was On socialization and convenience) Chris Jones
- [TECH] String Classes, Memory Management, and Fragmentation Derek Licciardi
- [TECH] String Classes, Memory Management, and Fragmentation Sean Kelly
- [TECH] String Classes, Memory Management, and Fragmentation Justin Rogers
- [TECH] String Classes, Memory Management, and Fragmentation Chris Dern
- [TECH] String Classes, Memory Management, and Fragmentation David Bennett
- [TECH] String Classes, Memory Management, and Fragm entation Daniel.Harman@barclayscapital.com
- [TECH] String Classes, Memory Management, and Fragmentation Kwon Ekstrom
- [TECH] String Classes, Memory Management, and Fragmentation Bruce Mitchener
- [TECH] String Classes, Memory Management, and Fragmentation Adam Martin
- [TECH] String Classes, Memory Management, and Fragm entation Daniel.Harman@barclayscapital.com
- [TECH] String Classes, Memory Management, and Fragmentation Hans-Henrik Staerfeldt
- [TECH] String Classes, Memory Management, and Fragm entation Daniel.Harman@barclayscapital.com
- [TECH] String Classes, Memory Management, and Fragmentation Derek Licciardi
- [TECH] String Classes, Memory Management, and Fragm entation Bruce Mitchener
- Mudpie Matt Mihaly
- strong encryption for authentication Fred Clift
- strong encryption for authentication David Bennett
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Edward Glowacki
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Derek Licciardi
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication shren
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Ben Tolputt
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Edward Glowacki
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Edward Glowacki
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Ben Tolputt
- strong encryption for authentication J C Lawrence
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Vincent Archer
- strong encryption for authentication Fred Clift
- strong encryption for authentication J C Lawrence
- strong encryption for authentication Sean Kelly
- strong encryption for authentication Tamzen Cannoy
- strong encryption for authentication Sean Kelly
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Tamzen Cannoy
- strong encryption for authentication Travis Casey
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Travis Casey
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Travis Casey
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Travis Casey
- strong encryption for authentication Ola Fosheim Grøstad
- strong encryption for authentication Edward Glowacki
- strong encryption for authentication Matt Mihaly
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Freeman, Jeff
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Bruce Mitchener
- strong encryption for authentication Brian Price
- strong encryption for authentication Kevin Littlejohn
- strong encryption for authentication Brian Price
- strong encryption for authentication Kevin Littlejohn
- strong encryption for authentication Fred Clift
- strong encryption for authentication J C Lawrence
- strong encryption for authentication Robert Fleck
- strong encryption for authentication Sean Kelly
- strong encryption for authentication Edward Glowacki
- strong encryption for authentication Fred Clift
- strong encryption for authentication Fred Clift
- strong encryption for authentication J C Lawrence
- strong encryption for authentication Fred Clift
- strong encryption for authentication Caliban Tiresias Darklock
- strong encryption for authentication Daniel.Harman@barclayscapital.com
- strong encryption for authentication J C Lawrence
- strong encryption for authentication Oliver Jowett
- strong encryption for authentication Kwon Ekstrom
- strong encryption for authentication F. Randall Farmer
- strong encryption for authentication Kwon Ekstrom
- strong encryption for authentication J C Lawrence
On Fri, 13 Jul 2001 13:24:02 -0600
Kwon Ekstrom <justice@softhome.net> wrote:
> I'd like to point out that this thread seems to be degenerating,
> the points of encryption I've noticed is:
<deletia analytical listing>
> It pretty much falls down to these categories, a variety of ways
> to limit the overhead have been mentioned, most cost $$$ that many
> mud developers don't have. While I beleive that encryption would
> be a nice addition for muds to use in order to protect your
> password for instance, I don't beleive it should be in full time
> usage, or even a requirement.
Aside: For the sake of this discussion I'm also going to generally
ignore and avoid the entire question of PKI and key/certificate
distribution/revocation. We are implicitly talking about a
scenario where the end nodes are not trustworthy, and where we
explicitly cannot rely on either private or negotiated streaming
cipher keys to neither be exposed, copied, distributed, published
or otherwise invalidated. I'll comment on this a bit more later,
but examining this aspect in depth would take more effort than I'm
interested in right now.
The same basic questions as for any other security question apply:
What are the risks?
What are the costs?
What are the gains?
In the case of using an encrypted transport the costs are fairly
clear cut: added complexity to both your software and SysAdm load,
and computational overhead (with a second order expense of potential
scalability problems).
The risks and gains analysis depends on the answer to a more
interesting question:
Is this an encrypted protocol, or is it an encrypted transport?
More specifically:
Are you tunneling cleartext packets under an encrypted VPN or are
you sending otherwise-normal packets with encrypted payloads?
The difference is critical as it changes the basic risk model. Much
like machine gun tracers, VPN's go both ways. Compromises of the
VPN exposes all interfaces and networks that comprise that network.
All that is required to compromise a VPN is compromise of a member
node.
<deletia rant against criminally deceptive security vendor
advertising>
Establishing even a point-to-point VPN is attractive from a design
perspective: It retains the crypto supports while reducing
complexity and crypto exposure from every single protocol stream
that you transfer.
Note that limiting your VPN's to point-to-point links doesn't
limit the exposure. It removes the risk that compromise of client
a system exposes all interfaces on all other client systems
playing the game. It doesn't remove the risk that compromise _OR_
faulty configuration of the core node (presumably one of your game
servers) also exposes all interfaces on all other client systems
playing the game
The next problem is that all of this analysis is resting on
quicksand. The client is in the hands of the enemy. It not only
can't be trusted, we can implicitly assume that it has not only been
compromised by the player, but also by any other party with even a
mild interest.
I did an experiment a couple days ago and installed Windows 2K on
a test system that had a 'net routable IP. Suffice to say that
the CD was not out of the drive before the box had been port
scanned, cracked and a root kit installed (snort on a shared net
segment showed me the whole thing). Note: This is not a
condemnation of Windows, but an observation of 'net realities.
A mate recently installed Linux on a box, didn't know how to
secure it, and had it cracked sometime that evening (~8 hours
later).
End user systems are not only implicitly untrustworthy, but
(most?) end users have no particular willingness or interest in
keeping their home desktops secure.
Which in turn calls into question the whole crypto point.
For the sake of argument I'll assume that your basic crypto
implementation is secure and your models sound. In practice this
is a fairly large concession, but well proven frameworks are
becoming well enough known and available as to START to suggest
this may be a moot point in a few years.
What would crypto buy you given that the client system is both
untrustworthy both by the client user and you?
1) An intermediate transit node which passes your packet streams
cannot decrypt the traffic unless it also has privileged access
to the client (I'll assume your servers are secure and
appropriately configured).
2) An arguably false sense of trust by your users in the
security/confidentiality of their game communications/actions.
3) An arguably false sense of trust by your users in the
verisimilitude of what their game client presents to them as
versus what is actually present on the server.
4) The increased possibility of iniquitous (due to difficulty in
detection) of man-in-the-middle attacks.
5) Possible exposure to litigation for second order effects of
compromise of your crypto arrangements (consider a game where some
players run profitable businesses in-game, and also lose
significant $$$ due to communication compromises (note that
disclaimers and abnegation of responsibility clauses don't always
come out in court as you'd think they might)).
Not a whole lot of profit there, and some of the profit counts more
as risks.
Which rolls us nicely back to the PKI problem along with key
security. If you are going to attempt to defend yourself from
main-in-the-middle attacks you're stuck doing client-side
certificates which means that you then end up running a root CA and
then doing mutual authentication in building the pipes. Cute,
except that the private keys on the client aren't trustworthy. The
effort required to replace them with a compromised set and then
insert a man-in-the-middle is minor at best, trivial at worst.
> The problem with worrying about packet sniffing is almost
> irrelevant, 99.9% of the internet community doesn't have the
> required knowledge or tools, even if they are in a position to use
> them.
The problem is that while 99% doesn't, perhaps 0.5% not only do, but
they can trivially automate their work and thus manipulate large
numbers of systems both automatically and autonomously.
I did an address block scan of a local ISP a couple months ago using
nmap. Suffice to say that out of the ~900 Windows boxes that nmap
identified, more than 400 showed clear signs of having been cracked.
Typically such systems are manipulated via IRC messages (once
cracked the systems auto-login to pre-canned IRC channels and then
send and received instructions there). Extending such a system to
enclude and incorporate a successful game system would neither be
particularly difficult or unrewarding.
See Gibson's recent articles for discussion of the background
techniques:
http://grc.com/dos/grcdos.htm
ObNote: Steve is technically correct in his assertions. His
conclusions equally technically correct but his evaluation of those
conclusions are at best injudicious and at worse rabble rousing.
> It's my understanding that in order to intercept packets you must
> be on the same local network, or en-route of the network.
Correct.
> The gains for the average server are small but can have dramatic
> resource overhead which can and will increase maintenance costs.
Yup, which is not to say that the gains in authentication
reliability are not valuable, or in certain cases (niche anyone?)
convincing.
This is also not to say that all edge nodes are necessarily
untrustworthy. If you have means to select your player base in
interesting fashions you may also be able to select for players that
are more or less trustworthy.
> As for being able to take credit card information and other
> "secure"... I think that can best be handled by a web form using
> https.
Note that this uses server-side authentication only and relies on
use of secret root CA keys (verisign, baltimore, thawte, etc) to
prevent MiM attacks. As such its valuable for posting data to the
central server, not for secure distribution of data to edge nodes.
> And as mentioned it'd be wonderful for authentication.
Please make sure you examine the underlieing PKI and key
distribution questions. They are not trivial problems.
> As every other tool, it's just a tool, use it when you need it,
> but otherwise put it back in the box.
<nod>
--
J C Lawrence ("`-''-/").___..--''"`-._
---------(*) `6_ 6 ) `-. ( ).`-.__.`)
claw@kanga.nu (_Y_.)' ._ ) `._ `. ``-..-'
http://www.kanga.nu/~claw/ _..`--'_..-_/ /--'_.' ,'
I never claimed I was human (il),-'' (li),' ((!.-' - strong encryption for authentication Kwon Ekstrom
- strong encryption for authentication J C Lawrence
- strong encryption for authentication Dave Rickey
- strong encryption for authentication Jon Lambert
- strong encryption for authentication Dave Rickey
- strong encryption for authentication J C Lawrence
- Toward a Craftier Dragon Paul Schwanz
- Toward a Craftier Dragon Maximus
- Toward a Craftier Dragon rayzam
- Toward a Craftier Dragon Matt Owen
- Toward a Craftier Dragon Michael Tresca
- Toward a Craftier Dragon Travis Nixon
- Toward a Craftier Dragon Paul Schwanz - Enterprise Services
- Toward a Craftier Dragon Andrew Reisse
- Toward a Craftier Dragon J C Lawrence
- Toward a Craftier Dragon rayzam
- Toward a Craftier Dragon J C Lawrence
- Toward a Craftier Dragon rayzam
- Toward a Craftier Dragon Richard Aihoshi aka Jonric
- Toward a Craftier Dragon Michael Tresca
- Toward a Craftier Dragon John Hopson
- Toward a Craftier Dragon yospe@kanga.nu
- Grief players with ip/dns spoofers Tand'a-ur
- Grief players with ip/dns spoofers Sean Kelly
- Grief players with ip/dns spoofers J C Lawrence
- Grief players with ip/dns spoofers Greg Underwood
- Grief players with ip/dns spoofers Robert Fleck
- Grief players with ip/dns spoofers J C Lawrence
- Grief players with ip/dns spoofers Tand'a-ur
- Grief players with ip/dns spoofers Adam Martin
- Grief players with ip/dns spoofers J C Lawrence
- character transfer in EQ Matt Mihaly
- character transfer in EQ Derek Licciardi
- character transfer in EQ Dave Rickey
- character transfer in EQ Derek Licciardi
- character transfer in EQ S. Patrick Gallaty
- character transfer in EQ Michael Tresca
- DGN: Craftier dragon and players as GMs Mathieu Castelli
- DGN: Craftier dragon and players as GMs Matt Mihaly
- DGN: Craftier dragon and players as GMs Mathieu Castelli
- DGN: Craftier dragon and players as GMs Travis Nixon
- DGN: Craftier dragon and players as GMs Marian Griffith
- Biz/Media Peter Tyson
- To good to be TRUE, in an MMPORPG? David Loeser
- To good to be TRUE, in an MMPORPG? Kwon Ekstrom
- To good to be TRUE, in an MMPORPG? Xuri
- To good to be TRUE, in an MMPORPG? Adam Martin
- To good to be TRUE, in an MMPORPG? Justin Rogers
- To good to be TRUE, in an MMPORPG? David Loeser
- To good to be TRUE, in an MMPORPG? Matt Mihaly
- To good to be TRUE, in an MMPORPG? Matt Mihaly
- To good to be TRUE, in an MMPORPG? Caliban Tiresias Darklock
- To good to be TRUE, in an MMPORPG? luke@rocketship.com
- To good to be TRUE, in an MMPORPG? J C Lawrence
- To good to be TRUE, in an MMPORPG? Freeman, Jeff
- To good to be TRUE, in an MMPORPG? Koster, Raph
- To good to be TRUE, in an MMPORPG? Freeman, Jeff
- To good to be TRUE, in an MMPORPG? Koster, Raph
- To good to be TRUE, in an MMPORPG? Joe Andrieu
- To good to be TRUE, in an MMPORPG? Koster, Raph
- To good to be TRUE, in an MMPORPG? John Hopson
- To good to be TRUE, in an MMPORPG? Steve {Bloo} Daniels
- To good to be TRUE, in an MMPORPG? J C Lawrence
- To good to be TRUE, in an MMPORPG? Travis Casey
- To good to be TRUE, in an MMPORPG? Joe Andrieu
- To good to be TRUE, in an MMPORPG? Dave Rickey
- To good to be TRUE, in an MMPORPG? Marc Bowden
- To good to be TRUE, in an MMPORPG? Sean K
- To good to be TRUE, in an MMPORPG? Freeman, Jeff
- To good to be TRUE, in an MMPORPG? Matt Mihaly
- To good to be TRUE, in an MMPORPG? Koster, Raph
- To good to be TRUE, in an MMPORPG? Dave Rickey
- To good to be TRUE, in an MMPORPG? J C Lawrence
- To good to be TRUE, in an MMPORPG? Michael Tresca
- To good to be TRUE, in an MMPORPG? Trump
- To good to be TRUE, in an MMPORPG? Kristen L. Koster
- To good to be TRUE, in an MMPORPG? Sean Kelly
- To good to be TRUE, in an MMPORPG? Caliban Tiresias Darklock
- [NEWS] New MUD Magazine Derek Snider
- Real-world skills Was: strong encryption for authentication Travis Nixon
- Real-world skills Was: strong encryption for authentication Hans-Henrik Staerfeldt
- Something in the water Koster, Raph
- Something in the water Dave Rickey
- Something in the water Koster, Raph
- Something in the water John Hopson
- Something in the water Caliban Tiresias Darklock
- Something in the water J C Lawrence
- Something in the water Sean Kelly
- Something in the water rayzam
- Something in the water J C Lawrence
- Something in the water Caliban Tiresias Darklock
- Something in the water J C Lawrence
- Something in the water Caliban Tiresias Darklock
- Something in the water J C Lawrence
- Something in the water Travis Casey
- Something in the water J C Lawrence
- Something in the water Caliban Tiresias Darklock
- Something in the water J C Lawrence
- Something in the water Joe Andrieu
- Something in the water Sean Kelly
- Something in the water Caliban Tiresias Darklock
- Something in the water Hulbert, Leland
- Something in the water Caliban Tiresias Darklock
- Something in the water Hulbert, Leland
- Something in the water Matt Mihaly
- Something in the water Jon Morrow
- Something in the water Trump
- Something in the water Matt Mihaly
- Something in the water Matt Chatterley
- Something in the water Sparrowhawk
- Something in the water Matt Mihaly
- Something in the water Ola Fosheim Grøstad
- Something in the water Tamzen Cannoy
- Something in the water Matt Mihaly
- Something in the water Tomas Clark
- Something in the water Matt Mihaly
- Something in the water Marc Bowden
- Something in the water Koster, Raph
- Something in the water Jessica Mulligan
- Something in the water SavantKnowsAll@cs.com
- Something in the water Miroslav Silovic
- Something in the water Travis Casey
- Something in the water rayzam
- Something in the water Travis Casey
- Something in the water Ian Hess
- Something in the water Marc Bowden
- Something in the water J C Lawrence
- Something in the water Marc Bowden
- Something in the water J C Lawrence
- Something in the water Dave Rickey
- Something in the water Marc Bowden
- Something in the water Travis Casey
- Something in the water Marian Griffith
- Something in the water J C Lawrence
- Something in the water Eli Stevens
- Something in the water J C Lawrence
- Something in the water Adam Martin
- Something in the water Dave Rickey
- Something in the water Dan MacDonald
- Something in the water Adam Martin
- Something in the water John Hopson
- Something in the water rayzam
- Something in the water Caliban Tiresias Darklock
- Gearing up against GEAR Ted Milker
- Gearing up against GEAR Dan MacDonald
- Gearing up against GEAR Sean Kelly
- Gearing up against GEAR Vincent Archer
- Gearing up against GEAR Travis Nixon
- Gearing up against GEAR Kevin Littlejohn
- Gearing up against GEAR Sean Kelly
- Gearing up against GEAR Justin Rogers
- Gearing up against GEAR Sean K
- Gearing up against GEAR Alistair Milne
- Gearing up against GEAR Travis Nixon
- Gearing up against GEAR Vincent Archer
- Gearing up against GEAR J C Lawrence
- Gearing up against GEAR Vincent Archer
- Gearing up against GEAR Daniel.Harman@barclayscapital.com
- Gearing up against GEAR Sean K
- Gearing up against GEAR Vincent Archer
- Gearing up against GEAR Sean K
- Gearing up against GEAR Dave Rickey
- Gearing up against GEAR Derek Licciardi
- Gearing up against GEAR Caliban Tiresias Darklock
- Gearing up against GEAR Marc Bowden
- Gearing up against GEAR J C Lawrence
- Gearing up against GEAR Travis Nixon
- Gearing up against GEAR F. Randall Farmer
- OT: Writer needs help from people in the gaming industry Alex Oren
- What is cheating? [Was: Strong encryption for authentication] Caliban Tiresias Darklock
- TECH DGN: a few mud server design questions (long) Robert Zubek
- TECH DGN: a few mud server design questions (long) Caliban Tiresias Darklock
- TECH DGN: a few mud server design questions (long) Joe Andrieu
- TECH DGN: a few mud server design questions (long) Robert Zubek
- TECH DGN: a few mud server design questions (long) J C Lawrence
- TECH DGN: a few mud server design questions (long) Caliban Tiresias Darklock
- TECH DGN: a few mud server design questions (long) Robert Zubek
- TECH DGN: a few mud server design questions (long) Sean Kelly
- TECH DGN: a few mud server design questions (long) Joe Andrieu
- TECH DGN: a few mud server design questions (long) Sean K
- TECH DGN: a few mud server design questions (long) SeronisROTv3@aol.com
- TECH DGN: a few mud server design questions (long) Joe Andrieu
- TECH DGN: a few mud server design questions (long) J C Lawrence
- TECH DGN: a few mud server design questions (long) Robert Zubek
- TECH DGN: a few mud server design questions (long) Sean Kelly
- TECH DGN: a few mud server design questions (long) Adam Martin
- TECH DGN: a few mud server design questions (long) Caliban Tiresias Darklock
- TECH DGN: a few mud server design questions (long) Jon Lambert
- TECH DGN: a few mud server design questions (long) Robert Zubek
- TECH DGN: a few mud server design questions (long) Kevin Littlejohn
- TECH DGN: a few mud server design questions (long) Robert Zubek
- TECH DGN: a few mud server design questions (long) Robert Zubek
- TECH DGN: a few mud server design questions (long) Caliban Tiresias Darklock
- TECH DGN: a few mud server design questions (long) Robert Zubek
- TECH DGN: a few mud server design questions (long) Robert Zubek
- TECH DGN: a few mud server design questions (long) Caliban Tiresias Darklock
- Real-world skills luke@rocketship.com
- Real-world skills Mathieu Castelli
- Real-world skills J C Lawrence
- Real-world skills Kwon Ekstrom
- Real-world skills rayzam
- Design patterns for game database implementations Caliban Tiresias Darklock
- Design patterns for game database implementations Sean Kelly
- Design patterns for game database implementations J C Lawrence
- Design patterns for game database implementations J C Lawrence
- Real-world skills Caliban Tiresias Darklock
- Real-world skills Chris Lloyd
- Real-world skills Justin Rogers
- Real-world skills Koster, Raph
- Real-world skills Travis Casey
- Real-world skills J C Lawrence
- Real-world skills Luke Parrish
- Real-world skills Dave Talk21
- Real-world skills R.Fry
- Real-world skills Dave Talk21
- Real-world skills Luke Parrish
- Real-world skills Dave Talk21
- Real-world skills Bruce Mitchener
- Real-world skills Ola Fosheim Grøstad
- Mud Clients (was Real-world skills) Kwon Ekstrom
- Mud Clients (was Real-world skills) David Bennett
- Real-world skills Dave Talk21
- Real-world skills Justin Rogers
- Real-world skills Caliban Tiresias Darklock
- Real-world skills J C Lawrence
- Real-world skills Caliban Tiresias Darklock
- Real-world skills J C Lawrence
- Real-world skills Dave Talk21
- Real-world skills Luke Parrish
- Real-world skills Dave Talk21
- Real-world skills Adam Martin
- Players playing NPCs Vladimir Prelovac
- Players playing NPCs Christopher Allen
- Real-world skills Koster, Raph
- Real-world skills Bruce Mitchener
- Real-world skills Andrew Wilson
- Game Survey Michael Tresca
- Game Survey Richard Aihoshi aka Jonric
- Game Survey Hans-Henrik Staerfeldt
- Game Survey J C Lawrence
- MMORPG Construction Kit Koster, Raph
- MMORPG Construction Kit Lee Sheldon
- MMORPG Construction Kit Lee Sheldon
- MMORPG Construction Kit Lee Sheldon
- MMORPG Construction Kit Ola Fosheim Grøstad
- MMORPG Construction Kit J C Lawrence
- MMORPG Construction Kit Brian 'Psychochild' Green
- MMORPG Construction Kit Ola Fosheim Grøstad
- DNA Game Patent [was Randy's Resume] Christopher Allen
- DNA Game Patent [was Randy's Resume] Caliban Tiresias Darklock
- DNA Game Patent [was Randy's Resume] Adam Martin
- DNA Game Patent [was Randy's Resume] Hulbert, Leland
- DNA Game Patent [was Randy's Resume] Chris Gray
- DNA Game Patent [was Randy's Resume] David Loeser
- DNA Game Patent [was Randy's Resume] Dave Rickey
- DNA Game Patent [was Randy's Resume] Jon Lambert
- DNA Game Patent [was Randy's Resume] F. Randall Farmer
- DNA Game Patent [was Randy's Resume] Travis Nixon
- DNA Game Patent [was Randy's Resume] F. Randall Farmer
- DNA Game Patent [was Randy's Resume] Kevin Littlejohn
- DNA Game Patent [was Randy's Resume] Jessica Mulligan
- DNA Game Patent [was Randy's Resume] Caliban Tiresias Darklock
- DNA Game Patent [was Randy's Resume] F. Randall Farmer
- DNA Game Patent [was Randy's Resume] Frank Crowell
- DNA Game Patent [was Randy's Resume] Adam Martin
- DNA Game Patent [was Randy's Resume] F Farmer
- Re[4]: Something in the water Travis Casey
- Population divisions (wasTo good to be TRUE, in an MMPORPG?) Matt Mihaly
- Community feeling (was: To good to be TRUE, in an MMPORPG?) Alex Kay
- Community feeling (was: To good to be TRUE, in an M MPORPG?) Koster, Raph
- Community feeling (was: To good to be TRUE, in an M MPORPG?) J C Lawrence
- Community feeling (was: To good to be TRUE, in an M MPORPG?) Vincent Archer
- Community feeling (was: To good to be TRUE, in an M MPORPG?) Koster, Raph
- Community feeling (was: To good to be TRUE, in an M MPORPG?) Daniel.Harman@barclayscapital.com
- Community feeling (was: To good to be TRUE, in an MMPORPG?) Ola Fosheim Grøstad
- Re:DNA Game Patent [was Randy's Resume] Jessica Mulligan
- Multi-threading ( was: TECH DGN: a few mud server design questions (long)) Jon Lambert
- Wilderness Freeman, Jeff
- Wilderness Trump
- Wilderness Caliban Tiresias Darklock
- Wilderness Edward Glowacki
- Wilderness Dave Rickey
- Wilderness Sean Kelly
- Wilderness John Buehler
- Wilderness Brian Hook
- Wilderness John Buehler
- Wilderness Koster, Raph
- Wilderness Ling Lo
- Wilderness Freeman, Jeff
- Wilderness Nathan F. Yospe
- Wilderness Ling Lo
- Wilderness Nathan F. Yospe
- Wilderness John Buehler
- Wilderness Ola Fosheim Grøstad
- Wilderness Hulbert, Leland
- Wilderness John Buehler
- Wilderness Kwon Ekstrom
- Wilderness Ola Fosheim Grøstad
- Wilderness Matt Mihaly
- Wilderness Freeman, Jeff
- Wilderness John Buehler
- Wilderness Nathan F. Yospe
- Wilderness Travis Casey
- Wilderness Hans-Henrik Staerfeldt
- Wilderness Ola Fosheim Grøstad
- Wilderness Koster, Raph
- Wilderness Dave Rickey
- Wilderness Ola Fosheim Grøstad
- Wilderness Brian Hook
- Wilderness Ola Fosheim Grøstad
- Wilderness Brian Hook
- Wilderness Freeman, Jeff
- Wilderness Daniel.Harman@barclayscapital.com
- Wilderness Freeman, Jeff
- Wilderness John Buehler
- Wilderness lhulbert@hotmail.com
- Wilderness Matt Mihaly
- Wilderness John Buehler
- Wilderness Matt Mihaly
- Wilderness John Buehler
- Wilderness Matt Mihaly
- Wilderness Freeman, Jeff
- Wilderness Madrona Tree
- Wilderness Nathan F. Yospe
- Wilderness Daniel.Harman@barclayscapital.com
- Wilderness Daniel.Harman@barclayscapital.com
- Wilderness John Buehler
- Wilderness Adam Martin
- Wilderness Koster, Raph
- Wilderness John Buehler
- Wilderness Daniel.Harman@barclayscapital.com
- Wilderness Adam Martin
- Wilderness Daniel.Harman@barclayscapital.com
- Wilderness David Loeser
- Wilderness Matt Owen
- Wilderness Peter Tyson
- Wilderness Adam Martin
- Death among Friends Jon Morrow
- Death among Friends Tommy Wang
- Death among Friends Jon Morrow
- Death among Friends Matt Mihaly
- Death among Friends Jon Morrow
- Death among Friends Matt Mihaly
- Death among Friends shren
- Death among Friends Michael Tresca
- Death among Friends John Buehler
- Death among Friends Jon Morrow
- Death among Friends Matt Mihaly
- Death among Friends Michael Tresca
- BSD licenses Ross Dmochowski
- Hoping for more... (interfaces) Tommy Wang
- Hoping for more... (interfaces) Matt Mihaly
- Hoping for more... (interfaces) Ling Lo
- Hoping for more... (interfaces) Matt Mihaly
- Hoping for more... (interfaces) Jon Morrow
- Hoping for more... (interfaces) Kwon Ekstrom
- d20 shannon hall
- Group sizes and MUDs as sport? Ola Fosheim Grøstad
- free release of graphical MUD Chris Gray