1. Post #1

    January 2012
    7 Posts
    So I just realized that a leather mod is not sandboxed at all and can do pretty much anything the owning process controls, and since everything appears to be on windows with most GSPs, you are wide open to exploitation and data gathering, and even kernel exploits can be executed at ease at this point.

    So pretty much my recommendation is to use a method of sandboxing for your server mods, or else you can pay the price.

    Code:
    Loading mods...
     
    (Filename: C:/BuildAgent/work/d3d49558e4d408f4/artifacts/StandalonePlayerGenerated/UnityEngineDebug.cpp Line: 53)
    
    Attempting to scan Assembly: C:\TCAFiles\Users\xxxxxx\xxxxxx\rust_server_Data\mods\LeatherPoC_mod
     
    (Filename: C:/BuildAgent/work/d3d49558e4d408f4/artifacts/StandalonePlayerGenerated/UnityEngineDebug.cpp Line: 53)
    
    Non platform assembly: C:\TCAFiles\Users\xxxxxx\xxxxxx\rust_server_Data\mods\LeatherPoC_mod (this message is harmless)
    Located mod 'LOL HAX' with 1 MonoBehaviours to bootstrap.
     
    (Filename: C:/BuildAgent/work/d3d49558e4d408f4/artifacts/StandalonePlayerGenerated/UnityEngineDebug.cpp Line: 53)
    
    Finished scanning for mods.
     
    (Filename: C:/BuildAgent/work/d3d49558e4d408f4/artifacts/StandalonePlayerGenerated/UnityEngineDebug.cpp Line: 53)
    
    --- Dirs: ---
    
    C:\TCAFiles\Users\xxxxxx
    
    C:\TCAFiles\Users\xxxxxx
    
    C:\TCAFiles\Users\xxxxxx
    
    C:\TCAFiles\Users\xxxxxx
    
    C:\TCAFiles\Users\xxxxxx
    
    C:\TCAFiles\Users\xxxxxx
    
    C:\TCAFiles\Users\xxxxxx
    
    C:\TCAFiles\Users\xxxxxx
    
    --- Doneski ---
    
    --- User Accounts with RDP ---
    
    xxxxxx/Administrator
    xxxxxx/xxxxxx
    xxxxxx/xxxxxx
    xxxxxx/xxxxxx
    
    --- Doneski ---
    Reply With Quote Edit / Delete Reply Show Events Winner x 7Disagree x 3Dumb x 1Agree x 1Informative x 1Funny x 1 (list)

  2. Post #2

    November 2011
    34 Posts
    well "LeatherPoC_mod" is not default Leather mod or atleast not mentioned in this forum., it's definetly some "virus" who hacks yours information.Try to remove LeatherPoC_mod

    For now better install leather from here http://facepunch.com/showthread.php?t=1339912


    By the way, can I get all rust_server_data folder? I may check about this one and tell you maybe here is something else too.
    Reply With Quote Edit / Delete Reply Windows 7 Lithuania Show Events Dumb Dumb x 3Funny Funny x 1 (list)

  3. Post #3

    January 2012
    7 Posts
    well "LeatherPoC_mod" is not default Leather mod, it's definetly some "virus" who hacks yours information.Try to remove LeatherPoC_mod

    For now better install leather from here http://facepunch.com/showthread.php?t=1339912
    I wrote the mod as a proof of concept. What it means is that a malicious server owner can exploit the parent server it is hosted on.
    Reply With Quote Edit / Delete Reply United States Show Events Agree Agree x 1 (list)

  4. Post #4

    November 2011
    34 Posts
    Then you should email this to garry.Because everybody can edit leather source as they want to.
    Reply With Quote Edit / Delete Reply Windows 7 Lithuania Show Events Dumb Dumb x 3 (list)

  5. Post #5
    It was known from the first day. Thanks for proving!

  6. Post #6

    January 2012
    7 Posts
    It was known from the first day. Thanks for proving!
    Not a problem, I wonder how the server files keep leaking as well... Leather.

  7. Post #7
    You could just download from some hosters. Unfortunately.
    Reply With Quote Edit / Delete Reply Windows 7 Germany Show Events Funny Funny x 1Informative Informative x 1 (list)

  8. Post #8

    November 2011
    34 Posts
    You could just download from some hosters. Unfortunately.
    Aw.... But some users would love to test server too :| for example I want to learn how to make some plugins but I don't want to pay for hosting while I could launch local server on mine pc.Seems Zidonuke has those Leaked Files(Because he has spoke about it)
    Or it really printed out all directories ?
    So.. I think it's really bad thing, because they can do something for other servers too :|
    Reply With Quote Edit / Delete Reply Windows 7 Lithuania Show Events Dumb Dumb x 1 (list)

  9. Post #9
    b3ck.com's Avatar
    December 2013
    11 Posts
    I don't think we are staying on track of this topic, remember this topic is here to ensure GSPs and the General Public know that 'Leather' can be used to exploit GSPs and gain information that shouldn't be available to others.

    -b3ck

  10. Post #10
    itty-bitty pretty kitty
    Dennab
    September 2008
    9,837 Posts
    If you're not already sandboxing your servers manually (i.e. running them under users who only have permissions for what they're supposed to be doing), you're not a very good GSP.
    Reply With Quote Edit / Delete Reply Windows 7 United States Show Events Agree Agree x 7Zing Zing x 1 (list)

  11. Post #11
    RUST++
    xEnt22's Avatar
    December 2013
    470 Posts
    Neolith (Leather v2) coming out soon will have these security features. and ^
    Reply With Quote Edit / Delete Reply Windows 8 Australia Show Events Agree Agree x 5 (list)

  12. Post #12
    BMRFMULTIBEAR's Avatar
    November 2013
    155 Posts
    Not a problem, I wonder how the server files keep leaking as well... Leather.
    As the LeatherLoader guys use us for their testing server, I can assure you they are not the ones leaking server files. Also Leather just gives you the tools, you should always check if mod files are legitimate. This is nothing new.

  13. Post #13
    RUST++
    xEnt22's Avatar
    December 2013
    470 Posts
    most of the code comes bundled inside the client, i don't think they really care if server files get leaked at the moment. pretty easy to cut them off anyway.

  14. Post #14
    Gold Member

    December 2013
    188 Posts
    Yes, we've been very straightforward about what Leather does- it runs arbitrary C# code with the same permissions as rust. GSPs are already aware, which is why many of them are examining which leather mods to permit individually, why ideal-hosting has chosen not to carry us for the moment, and why I've tried to open source everything I can. As mentioned, CoreCLR integration to provide better sandboxing is a planned feature for Leather.

    THAT SAID, as HFB servers pointed out to me, anyone with access to my source, and whom has access to the mainData file via their GSP, can put together a non-sandboxing version and install it themselves, even once sandboxing is implemented. It's really not an easy thing to keep the server files secure, and servers should take lengths to make sure that their own sensitive data is protected from the games they run.

  15. Post #15

    January 2014
    15 Posts
    Yes, we've been very straightforward about what Leather does- it runs arbitrary C# code with the same permissions as rust. GSPs are already aware, which is why many of them are examining which leather mods to permit individually, why ideal-hosting has chosen not to carry us for the moment, and why I've tried to open source everything I can. As mentioned, CoreCLR integration to provide better sandboxing is a planned feature for Leather.

    THAT SAID, as HFB servers pointed out to me, anyone with access to my source, and whom has access to the mainData file via their GSP, can put together a non-sandboxing version and install it themselves, even once sandboxing is implemented. It's really not an easy thing to keep the server files secure, and servers should take lengths to make sure that their own sensitive data is protected from the games they run.
    So is there any gsp with proper measures/security providing mod access then?

  16. Post #16
    Gold Member

    December 2013
    188 Posts
    It depends what you consider an "exploit" I guess. If the idea of a hacker creating a Rust mod that downloads the server files really concerns you (the one thing a properly-configured GSP server is currently allowing leather mods to do), then FPSPlayers and HFBServers both have proper measures installed: users do not have the ability to upload arbitrary mods, and instead can choose from a list of approved mods to install from the cPanel.

    If downloading server files doesn't bother you, then most GSPs have proper security measures in place. The OP was apparently running Rust in an environment where Rust_server.exe had administrator access or something, which is, well, bad IT practice.

    EDIT: To put it another way, it's a good thing that the OP didn't list his GSP, as I'm sure there are several hackers reading this board who would like to know which GSP doesn't know how to configure their servers properly.

  17. Post #17
    RUST++
    xEnt22's Avatar
    December 2013
    470 Posts
    so basically, if you want to be extremely safe just disallow access to the rust_server_data folder and have a mod manager to install our mods for you (which are all open source)

    or (which GSP's should be doing anyway) launching rust as a user with no permissions to any other directory except it's own, therefore nobody can exploit it even if they have their own dll's. well, other than downloading the rust server files.

  18. Post #18
    Gold Member

    December 2013
    188 Posts
    To illustrate my point, here is a thread wherein a user does the exact same thing with Oxide: http://facepunch.com/showthread.php?t=1345525
    Reply With Quote Edit / Delete Reply United States Show Events Agree Agree x 2 (list)

  19. Post #19
    BARKx4's Avatar
    January 2014
    41 Posts
    Just so people know, Zidonuke is a scaremongerer and shit stirrer in just about every community where modding is possible. Also he's a furry who plays SecondLife.

    Hopefully we all learn from this thread.


    http://en.wikifur.com/wiki/Zidonuke

    Some hilights:

    Zidonuke was a coder and administrator on F-List, but was banned in February 2011 after spying on users through the use of a TCP dumper.[6] Once discovered, he gave all users administrator access, removed bans, and published the site's code online. F-List Administration spent 5 days restoring the site entirely from backups.[7][8]
    Zidonuke released versions of the Minecraft Server Daemon called Bukkit, which permitted old clients to connect to the new server. [9] However it was speculated the build was malicious when he begun to crash servers with an exploit in movement packets that allowed a floating point NaN (Not a number) to be used in the Y axis, putting the server into a infinite loop calculating physics.
    Reply With Quote Edit / Delete Reply Windows 7 United States Show Events Dumb Dumb x 4 (list)

  20. Post #20

    January 2014
    5 Posts
    Well, this is incredibly interesting. Will I be gaining access to my rust_server_data folder again on HFBServers or is that a thing of the past?

  21. Post #21

    December 2013
    107 Posts
    Well, this is incredibly interesting. Will I be gaining access to my rust_server_data folder again on HFBServers or is that a thing of the past?

    most likely not wich is why me/hubby are nolonger bothering with rust. i shoulden't have to wait on half assed GSP's to add crap.

  22. Post #22

    December 2013
    95 Posts
    The problem with GAPs only installing approved mods, is that I'm a developer and I want to make my own mods (which I have been doing) but I have absolutely no way to test these mods now without getting the content approved by my GSP. It is a super annoying process. I guess I just need to lease my services to oxide or rust++ or something, because trying to be an individual modder is working about as well as playing rust solo.

  23. Post #23
    Gold Member

    December 2013
    188 Posts
    The problem with GAPs only installing approved mods, is that I'm a developer and I want to make my own mods (which I have been doing) but I have absolutely no way to test these mods now without getting the content approved by my GSP. It is a super annoying process. I guess I just need to lease my services to oxide or rust++ or something, because trying to be an individual modder is working about as well as playing rust solo.
    I think they're jammed up with the sheer amount of requests they have, but I know that BMRF gives enough permissions to do mod testing, so I'd try to rent from them.

  24. Post #24

    December 2013
    21 Posts
    3:29 *** Jackx quit (Ping timeout: 240 seconds)
    13:30 *** IceFrog quit (Quit: http://www.mibbit.com ajax IRC Client)
    13:39 *** Refreshmant quit ()
    13:55 *** Ziegenpeter joined #ArtificialAiming
    13:57 *** Ziegenpeter quit ()
    14:00 *** Theocrat joined #ArtificialAiming
    14:01 *** fuckthisname joined #ArtificialAiming
    14:01 +++ Rizon has given halfop to fuckthisname
    14:16 Zidonuke So I've noticed something about VAC, it doesn't seem to ban smart people
    14:16 Zidonuke its such an odd effect!
    Reply With Quote Edit / Delete Reply Windows 7 United States Show Events Funny Funny x 2 (list)

  25. Post #25
    itty-bitty pretty kitty
    Dennab
    September 2008
    9,837 Posts
    Just so people know, Zidonuke is a scaremongerer and shit stirrer in just about every community where modding is possible. Also he's a furry who plays SecondLife.

    Hopefully we all learn from this thread.

    Some hilights:
    Wow, reporting a possible exploit in the way GSPs handle permissions! Such a shit stirrer!

    You forgot the rest of the quote:
    Zidonuke released versions of the Minecraft Server Daemon called Bukkit, which permitted old clients to connect to the new server. [9] However it was speculated the build was malicious when he begun to crash servers with an exploit in movement packets that allowed a floating point NaN (Not a number) to be used in the Y axis, putting the server into a infinite loop calculating physics. The exploit existed in vanilla minecraft since version 1.0 and was reported by Zidonuke to Mojang multiple times before his demonstration. This build was proven legitimate by Dinnerbone, one of the project's developers and administrators, though it was later removed after an exploit was added to the source code post-release.
    No, he didn't make a malicious build, it was already in Minecraft vanilla. Here's some more quotes from the exact same page:
    In the past he has jointly contributed to the upkeep of Huggle (an anti-vandalism tool used widely on Wikipedia), as well as contributing to Second Life by reporting various bugs in the service. However, he was later banned from Second Life by Linden Labs after reporting and exploiting various security issues with Vivox, A voice service in use by Second Life. In response, Zidonuke made an alternate SL account ("Zidonuke Ghost"), and has been using it ever since. He is also known for his contributions to improving server side security in the game Terraria on the TShock project.
    He's a guy who exploits bugs to get them fixed. Ethical? Questionably, but it's not as evil as you make it out to be (keep in mind he reported all the exploits he found). And who the hell cares if he's a furry or he plays Second Life? It seems you're trying to stir shit more than he is.
    Reply With Quote Edit / Delete Reply Windows 7 United States Show Events Zing Zing x 1Disagree Disagree x 1 (list)

  26. Post #26
    BMRFMULTIBEAR's Avatar
    November 2013
    155 Posts
    Wow, reporting a possible exploit in the way GSPs handle permissions! Such a shit stirrer!

    You forgot the rest of the quote:


    No, he didn't make a malicious build, it was already in Minecraft vanilla. Here's some more quotes from the exact same page:


    He's a guy who exploits bugs to get them fixed. Ethical? Questionably, but it's not as evil as you make it out to be (keep in mind he reported all the exploits he found). And who the hell cares if he's a furry or he plays Second Life? It seems you're trying to stir shit more than he is.
    He could've approached GSPs about it in private, like we did when we found a gamebreaking exploit, but no. He decided first thing to leak files and post it openly. If that isn't malicious then I don't know what is.

    Also being a furry who plays second life makes ALL the difference.

    EDIT: Also it wasn't "fixed". Most GSPs simply closed everything down completely wrecking the modding scene because they had to scramble, instead of being given a way to actually fix it.
    Reply With Quote Edit / Delete Reply Netherlands Show Events Dumb Dumb x 4 (list)

  27. Post #27
    itty-bitty pretty kitty
    Dennab
    September 2008
    9,837 Posts
    He could've approached GSPs about it in private, like we did when we found a gamebreaking exploit, but no. He decided first thing to leak files and post it openly. If that isn't malicious then I don't know what is.
    He did it to make it get fixed faster. Think, what's going to get fixed faster: an exploit that, as far as the GSP knows, only one person knows (but many more people might be exploiting it), or an exploit that everyone knows, and the GSP knows everyone knows? Sure, it might not be the most ethically sound (grey-hat), but garry doesn't care and it really didn't break anything.

    EDIT: Also it wasn't "fixed". Most GSPs simply closed everything down completely wrecking the modding scene because they had to scramble, instead of being given a way to actually fix it.
    It's not his fault that they didn't set their servers up right in the first place. Create a user only for running the server and chroot them to the server directory (or whatever the equivalent is on windows, though Rust has linux builds and they should really be using those). They can't touch anything but the server and any other files in that directory. If they bothered to set their servers up right in the first place, this would've been a non-issue.

    Also being a furry who plays second life makes ALL the difference.
    No, it doesn't.

    Edited:

    If you're still at a point in your life where you judge people on what they like to do, you're not really at a point where you can judge what someone else does.
    Reply With Quote Edit / Delete Reply Windows 7 United States Show Events Agree Agree x 2Dumb Dumb x 2Zing Zing x 1 (list)

  28. Post #28

    January 2014
    30 Posts
    Sorry but never knew what a furry was OR second life for that matter lol :O So i google it ! I Find this http://www.youtube.com/watch?v=Tm8NNhA4ydg
    Reply With Quote Edit / Delete Reply Windows 7 United Kingdom Show Events Informative Informative x 2 (list)

  29. Post #29
    BARKx4's Avatar
    January 2014
    41 Posts
    He did it to make it get fixed faster. Think, what's going to get fixed faster: an exploit that, as far as the GSP knows, only one person knows (but many more people might be exploiting it), or an exploit that everyone knows, and the GSP knows everyone knows? Sure, it might not be the most ethically sound (grey-hat), but garry doesn't care and it really didn't break anything.



    It's not his fault that they didn't set their servers up right in the first place. Create a user only for running the server and chroot them to the server directory (or whatever the equivalent is on windows, though Rust has linux builds and they should really be using those). They can't touch anything but the server and any other files in that directory. If they bothered to set their servers up right in the first place, this would've been a non-issue.



    No, it doesn't.

    Edited:

    If you're still at a point in your life where you judge people on what they like to do, you're not really at a point where you can judge what someone else does.
    What are your excuses for the logger he installed in F-List so he could jerk off to peoples private conversations? Or the fact he adminned everyone in a fit when caught?

  30. Post #30
    What are your excuses for the logger he installed in F-List so he could jerk off to peoples private conversations? Or the fact he adminned everyone in a fit when caught?
    What's your excuse for bringing unrelated furry drama shit onto Facepunch when the situation is already handled (this exploit is already known, according to Ideal-Hosting)? Stop being a concern troll.
    Reply With Quote Edit / Delete Reply Windows 7 Canada Show Events Agree Agree x 3Winner Winner x 1Dumb Dumb x 1 (list)

  31. Post #31
    BMRFMULTIBEAR's Avatar
    November 2013
    155 Posts
    He did it to make it get fixed faster. Think, what's going to get fixed faster: an exploit that, as far as the GSP knows, only one person knows (but many more people might be exploiting it), or an exploit that everyone knows, and the GSP knows everyone knows? Sure, it might not be the most ethically sound (grey-hat), but garry doesn't care and it really didn't break anything.
    It's not about fixing it faster, it caused a kneejerk reaction by most GSP's (they had no choice) ruining the modding community. Now we're at the point where BMRF is the only one providing enough access to developers to get anything done and we're completely full now. It has done NOTHING positive and NOTHING has been fixed.


    It's not his fault that they didn't set their servers up right in the first place. Create a user only for running the server and chroot them to the server directory (or whatever the equivalent is on windows, though Rust has linux builds and they should really be using those). They can't touch anything but the server and any other files in that directory. If they bothered to set their servers up right in the first place, this would've been a non-issue.
    This part is true, it's not his fault GSPs haven't been sandboxing properly.


    No, it doesn't.

    Edited:

    If you're still at a point in your life where you judge people on what they like to do, you're not really at a point where you can judge what someone else does.
    I definitely can, and most certainly will judge him for his actions, and anyone is free to judge me on mine. Being a secondlife playing furry is most definitely a red flag in my book.

    He asked me for a development server, I shot him down, his kind has no place in development communities, all he did was halt 90% of modding work being done when he had the chance to do it the proper way. All he has caused is grief. What he did was not constructive in any way, shape or form.

    Edited:

    What's your excuse for bringing unrelated furry drama shit onto Facepunch when the situation is already handled (this exploit is already known, according to Ideal-Hosting)? Stop being a concern troll.
    If by handled you mean the modding scene mostly halted then yes.
    Reply With Quote Edit / Delete Reply Netherlands Show Events Dumb Dumb x 3 (list)

  32. Post #32
    itty-bitty pretty kitty
    Dennab
    September 2008
    9,837 Posts
    It's not about fixing it faster, it caused a kneejerk reaction by most GSP's (they had no choice) ruining the modding community. Now we're at the point where BMRF is the only one providing enough access to developers to get anything done and we're completely full now. It has done NOTHING positive and NOTHING has been fixed.
    So why blame him? Why is it his fault that this exploit existed in the first place? You could blame Leather (though I wouldn't), or blame the GSPs. It's good that he found an exploit - there's an entire subforum for posting exploits.

    I definitely can, and most certainly will judge him for his actions, and anyone is free to judge me on mine. Being a secondlife playing furry is most definitely a red flag in my book.
    Red flag for what?

    He asked me for a development server, I shot him down, his kind has no place in development communities, all he did was halt 90% of modding work being done when he had the chance to do it the proper way. All he has caused is grief. What he did was not constructive in any way, shape or form.
    It's not constructive to get an exploit fixed?

    If by handled you mean the modding scene mostly halted then yes.
    You know that you can just download the server from everyone's favorite linux distro source, right?

  33. Post #33
    BMRFMULTIBEAR's Avatar
    November 2013
    155 Posts
    So why blame him? Why is it his fault that this exploit existed in the first place? You could blame Leather (though I wouldn't), or blame the GSPs. It's good that he found an exploit - there's an entire subforum for posting exploits.
    Finding an exploit is good, this is not the way to release it, unless you think ruining the modding scene is good I guess.

    Red flag for what?
    If you don't get it, it probably means you're either a furry or play second life :^)

    It's not constructive to get an exploit fixed?
    Tell me what's fixed. Because the exploit isn't that's for sure.


    You know that you can just download the server from everyone's favorite linux distro source, right?
    You know the rust server doesn't run on Linux right? Wait no you don't. Shows how much you know about rust hosting.
    Reply With Quote Edit / Delete Reply Netherlands Show Events Dumb Dumb x 1 (list)

  34. Post #34
    If you don't get it, it probably means you're either a furry or play second life :^)
    "I judge people entirely by their fetishes and am proudly bigoted. So much so I will wear it on my sleeve."

    Of course, this is like 60% of golds.


    GSPs weren't properly sandboxing the server and mods. Welcome to Alpha. Shit's gonna happen.
    Reply With Quote Edit / Delete Reply Windows 7 Canada Show Events Agree Agree x 1Dumb Dumb x 1 (list)

  35. Post #35
    itty-bitty pretty kitty
    Dennab
    September 2008
    9,837 Posts
    If you don't get it, it probably means you're either a furry or play second life :^)
    I don't play second life, and you're going to have to define what makes up a furry.

    Tell me what's fixed. Because the exploit isn't that's for sure.
    I didn't say it is fixed yet, but it's not going to get fixed if no one knows about it.

    You know the rust server doesn't run on Linux right? Wait no you don't. Shows how much you know about rust hosting.
    There are Linux builds, but that's not what I meant by 'everyone's favorite linux distro source'.

  36. Post #36
    BMRFMULTIBEAR's Avatar
    November 2013
    155 Posts
    "I judge people entirely by their fetishes and am proudly bigoted. So much so I will wear it on my sleeve."

    Of course, this is like 60% of golds.


    GSPs weren't properly sandboxing the server and mods. Welcome to Alpha. Shit's gonna happen.
    Good thing I'm not a gold member then. Then again I can see you're a furry by your name. Obviously you feel attacked :^)

    These would be the proper steps to fixing an exploit.

    1. Message GSP's that you found an exploit and that you will release it in 3 days.
    2. Wait 3 days
    3. Release it

    This way you give them the chance to fix it, something that hasn't been done as they were forced to shut everything down instantly (besides us as we were already sandboxing).

    Edited:

    I don't play second life, and you're going to have to define what makes up a furry.



    I didn't say it is fixed yet, but it's not going to get fixed if no one knows about it.
    Telling EVERYONE without any chance to prepare for GSPs is not the right way.

    There are Linux builds, but that's not what I meant by 'everyone's favorite linux distro source'.
    As I said you obviously have no clue about rust hosting, I advise you stop speaking about issues you don't understand.

    Reply With Quote Edit / Delete Reply Netherlands Show Events Dumb Dumb x 1 (list)

  37. Post #37
    itty-bitty pretty kitty
    Dennab
    September 2008
    9,837 Posts
    Good thing I'm not a gold member then. Then again I can see you're a furry by your name. Obviously you feel attacked :^)
    That's my title, not my name.

    These would be the proper steps to fixing an exploit.

    1. Message GSP's that you found an exploit and that you will release it in 3 days.
    2. Wait 3 days
    3. Release it

    This way you give them the chance to fix it, something that hasn't been done as they were forced to shut everything down instantly (besides us as we were already sandboxing).
    So instead of releasing the exploit, they should be threatened with the release of an exploit?

    Telling EVERYONE without any chance to prepare for GSPs is not the right way.
    Just download the server yourself and run it. It's not hard.

    As I said you obviously have no clue about rust hosting, I advise you stop speaking about issues you don't understand.
    You think that calling me a furry who plays second life is a good insult.

    Edited:

    And yes, there are linux builds.

  38. Post #38
    Like someone named MULTIBEAR has any grounds for calling someone a furry.

    So instead of releasing the exploit, they should be threatened with the release of an exploit?
    I'd suggest Googling "responsible disclosure" before continuing that line of argument, I'm just gonna say.

  39. Post #39
    itty-bitty pretty kitty
    Dennab
    September 2008
    9,837 Posts
    I'd suggest Googling "responsible disclosure" before continuing that line of argument, I'm just gonna say.
    Obviously it's not really a threat, but this is an alpha. You should expect bugs and exploits, and you should expect them to be publicly known. That's why there's an entire subforum for people to publicly post exploits.

  40. Post #40
    BMRFMULTIBEAR's Avatar
    November 2013
    155 Posts
    That's my title, not my name.
    Wasn't quoting you bud.


    So instead of releasing the exploit, they should be threatened with the release of an exploit?
    Yes, as it gives them time to respond. It's industry standard.


    Just download the server yourself and run it. It's not hard.



    You think that calling me a furry who plays second life is a good insult.
    What?

    And yes, there are linux builds.
    No there aren't. The Linux build is non-functional, if you don't believe me read the SCREENSHOT DIRECTLY FROM AN EMAIL I RECEIVED FROM GARRY.