patchnotes

Text

Note: client-server connection changed in build 2009-10-08/09
Here's a new release to fix once for good (hopefully) the player's authentication.
Summary of the previous episodes: a few additional checks were added to the server to detected players that were changing login or using other people logins or fake logins. But they were only fixing the issue on the surface, and were easily circumvented.
So in this new version, we've introduce the correct fix (tm) for the issue, using rsa signature and the like, to make sure that people trying to connect with some login were actually validated and trusted by the master server.
The new protocol is supposed to allow a smooth transition (new clients can still connect to old servers, old clients can still connect to the new servers (if not forbiden via the config option).

doctest.md

Markdown

## Request

```xml TmForever 2.11.26 ORTIC


doctest.md

Markdown

<hk>

Document here what <hk> contains ...


doctest.md

Markdown

<hk>

Document here what <hk> contains ...


doctest.md

Markdown

&tl;hk>

Document here what stands for ...


doctest.md

Markdown

Document here what stands for ...


dmesg sata

Text

[2750633.498296] ata6: link is slow to respond, please be patient (ready=0)
[2750634.511649] ata6: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
[2750634.513241] ata6.00: configured for UDMA/33
[2750634.513248] ata6: EH complete
[2750637.898314] ata5: SATA link up 1.5 Gbps (SStatus 113 SControl 310)
[2750637.900023] ata5.00: configured for UDMA/33
[2750637.900031] ata5: EH complete
[2750639.016726] ata6: exception Emask 0x10 SAct 0x0 SErr 0x10000 action 0xe frozen
[2750639.020640] ata6: irq_stat 0x00400000, PHY RDY changed
[2750639.024762] ata6: SError: { PHYRdyChg }

iptables

Text

$ sudo iptables -L -n -v
Chain INPUT (policy ACCEPT 22873 packets, 5056K bytes)
pkts bytes target prot opt in out source destination
0 0 DROP udp -- bat+ * 0.0.0.0/0 255.255.255.255 udp spt:68 dpt:67
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 2031 packets, 446K bytes)
pkts bytes target prot opt in out source destination

spicounter.c

C/C++

#include <avr/io.h>
uint8_t c = 0;
/* Make sure the WDTON Fuse is unprogrammed */
int main() {
DDRB = (1 << PB0) | (1 << PB2) | (1 << PB3);
SPCR = (1 << SPE) | (1 << MSTR);

gedoens

Text

openssl speed -evp aes-256-cbc
...
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes
aes-256-cbc 30382.02k 79625.36k 286134.57k 3551427.08k 2075370.22k
openssl speed -evp aes-256-cbc -engine padlock
...
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes
aes-256-cbc 26313.38k 83366.98k 187119.85k 272150.21k 309593.02k