TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Steam's VAC reads all the domains you visited

140 点作者 titlex超过 11 年前

20 条评论

jimaek超过 11 年前
From reddit comments:<p>As someone who reverse engineers things for fun, and can read the C &quot;pseudocode&quot; generated via decompilation pretty easily, I am going to have to disagree with the assumptions made in this post.<p>First, there&#x27;s no proof this is from Steam, I&#x27;ve poked around a few of the DLLs since I saw this and am unable to find anything even remotely close to what this does.<p>Second, this method does NOT send anything to Valve. This method grabs the DNS cache, yes. And it MD5s the entries, then it stores it. This method itself does nothing more with the hashes. For all we know VAC could be doing a LOCAL scan of the list, and comparing it to an internal list of &quot;known&quot; cheat subscription servers.<p>Until someone posts details of exactly where in Steam this is (What DLL is all that&#x27;s required to verify), and the calling method that supposedly sends this information to Valve, I would take this with a very massive grain of salt.<p>So yeah, no proof it sends anything. It could be a local check.
评论 #7251943 未加载
评论 #7251909 未加载
评论 #7251953 未加载
评论 #7251918 未加载
chippy超过 11 年前
More stronger evidence from reddit comments:<p><a href="http://www.reddit.com/r/technology/comments/1y4za5/steams_vac_now_reads_all_the_domains_you_have/cfhelpr" rel="nofollow">http:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;technology&#x2F;comments&#x2F;1y4za5&#x2F;steams_va...</a><p>&quot; Yes, with some simple wireshark analysis you can see it is being sent back.<p>Use wireshark, join a local TF2 server, try and isolate the VAC IP address (they are not static, but use rDNS &amp; whois the IP). Go by process of elimination. Happy to give you pointers if anyone is interested.<p>Use wireshark and monitor the SSL communications of VAC for the first minute. Record the total size of outgoing packets (for me, I got 1.94 MB and 1.88 MB on my two tries -- the first time you join a VAC server and when modules update it&#x27;s likely to be higher as it downloads it&#x27;s modules).<p>note: Keep everything else constant - like what windows you have open, what processes you have running, etc.<p>Bloat your DNS cache. (What I did was edit my hosts file, used a script to add over 20k hosts [careful actually crashed notepad when I tried to read it])<p>Repeat step 1 and 2. I got 2.47 MB and 2.58 MB on two tries (first min of outgoing packets). This increase seems to be twice the amount 20k of MD5 hashes would take. Maybe a bug is causing it to be sent twice?<p>Clear your hosts file, flush dns cache. Repeat step 1 and 2 again. I got 1.99 MB.&quot;
评论 #7252153 未加载
评论 #7252239 未加载
mpeg超过 11 年前
Anti-cheat protections use exactly the same methods rootkits use to &quot;monitor&quot; your system, it&#x27;s one of those things we grudgingly accept when playing multiplayer games.<p>It&#x27;s not even what Valve and co are doing with the info, it&#x27;s similar to the Sony rootkit case where the main worry would be that the rootkit could introduce security vulnerabilities.
just2n超过 11 年前
VAC has never been particularly effective. This check isn&#x27;t particularly useful as it doesn&#x27;t actually prove that a player is or has ever cheated. It&#x27;s also trivial to bypass (`ipconfig &#x2F;flushdns`) if you are an actual cheater who frequents these websites.<p>To be banned because you visited a website is also an abusable medium. Similar to the memory and window name scanning VAC and other similar anticheats have done in the past (or continue to do). You could historically get people banned by just doing stupid things, like having an IRC title that shows up in mIRC&#x27;s window name that&#x27;s detected or sending someone a message via any chatting medium that has a detected substring.<p>Imagine you just send a tinyurl link to your opponents in an upcoming tournament. Or just embed a simple &lt;img&gt; tag in an otherwise harmless webpage (display: none, for example) so everyone who visits your website has that domain fresh in their cache. This kind of &quot;evidence&quot; quickly becomes useless because it can be used for nefarious purposes, which is why it should never be used at all.<p>This is not only ineffective, it&#x27;s dangerous. And it&#x27;s an invasion of privacy since you can simply create a rainbow table of domain names, as other people have pointed out.<p>Come on, Valve.
ALpoe超过 11 年前
GabeN&#x27;s response: <a href="http://www.reddit.com/r/gaming/comments/1y70ej/valve_vac_and_trust/" rel="nofollow">http:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;gaming&#x2F;comments&#x2F;1y70ej&#x2F;valve_vac_and...</a>
fnordfnordfnord超过 11 年前
&gt;<i>&quot;it seems to be doing something to characters between A-Z, possible making them lowercase) &quot;</i><p>Adding 0x20 to any uppercase ASCII character will get you its lowercase equivalent.
doctorderp超过 11 年前
Sounds like they&#x27;re just checking if you&#x27;ve visited known cheat sites. Unfortunately the DNS cache is a stupid way to do this since it&#x27;s open to abuse. Modern browsers will prefetch DNS, so all you&#x27;d need to do is put a URL to a known cheat site as a comment somewhere popular in order to get users flagged. Even easier for forums that allow image hotlinking.<p>A similar thing was done with PunkBuster: <a href="https://en.wikipedia.org/wiki/Punkbuster#Attacks_on_PunkBuster" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Punkbuster#Attacks_on_PunkBust...</a> - since it was scanning all of your computer&#x27;s memory for cheat signatures, you could just paste a fragment on IRC in order to get people banned.
评论 #7252502 未加载
vinceguidry超过 11 年前
If their goal is to see where it&#x27;s customers are going, hashing the data with MD5 is a very strange way to go about it. Sure you can break the encryption, but unless their favorite activity to do is run expensive compute farms, they&#x27;re not going to bother.
评论 #7251889 未加载
评论 #7251905 未加载
评论 #7252668 未加载
评论 #7252108 未加载
评论 #7252726 未加载
评论 #7252109 未加载
pferde超过 11 年前
I wonder how they grab contents of DNS cache in Linux client - if they even do that.
评论 #7252919 未加载
Glyptodon超过 11 年前
Can someone explain this to me like I&#x27;m an idiot? Is VAC only applicable to certain games? Is it running the entire time Steam is running? Does it watch what websites you visit outside of Steam or only with the Steam browser? Does it do so even when you aren&#x27;t playing a multiplayer game? If you use private browsing in a normal browser is it still watching? Etc.
评论 #7252877 未加载
adwf超过 11 年前
I hope this isn&#x27;t true, because I like Valve... IANAL, but I can only imagine this is quite illegal in the EU. No terms or conditions could possibly waive your rights to this extent.<p>Maybe that&#x27;s just my optimism speaking though. Every good company turns bad at some point.
评论 #7252095 未加载
tshadwell超过 11 年前
I can&#x27;t see any evidence that the hash is sent to any server. I think it is more likely the hash is used to look up the recent websites in a hash table or via a bloom filter.
dubcanada超过 11 年前
Makes sense to me. For example if you play warcraft 3, and you visit Shadow French all the time. You are most likely a hacker. Obviously that doesn&#x27;t seem to be the only check they do. But it&#x27;s a very easy one. And they would only need to keep a list of common &quot;game hacking&quot; sites and check it.<p>So far there seems to be zero evidence that this is used to send data to valve.
评论 #7253570 未加载
评论 #7253103 未加载
评论 #7253562 未加载
frankster超过 11 年前
Until someone manages to decompile code that shows this data being sent to Valve this is just a pitchfork party.
rincebrain超过 11 年前
Honestly, I&#x27;d probably believe this is just a method for validating sanity of DNS for debugging&#x2F;troubleshooting, as there are far better ways of going about doing almost anything you could think of as a malicious use of this.
评论 #7253635 未加载
wnevets超过 11 年前
So if you visit a game hacking site, you&#x27;re banned?
kamakazizuru超过 11 年前
is there a way to block this?
评论 #7252062 未加载
评论 #7251811 未加载
评论 #7252102 未加载
评论 #7252093 未加载
ck2超过 11 年前
Why does <i>ipconfig displaydns</i> even exist?<p>Especially at an API level.
评论 #7252058 未加载
hnha超过 11 年前
someone should try a huge list of domains to see if it ends in a ban.
blueskin_超过 11 年前
cronjob to constantly clear the DNS cache. Problem solved.
评论 #7251867 未加载