Forums
February 26, 2024, 12:10 PM

Author Topic: (solved) Is it safe to WA with a random stranger using TCP/IP connection mode?  (Read 1162 times)

0 Members and 1 Guest are viewing this topic.

Offline tomoto

WA is very old, so it might have some vulnerable computer exploitation?

I am afraid of getting hacked from strangers using some backdoor / bug from the game.
« Last Edit: January 13, 2023, 10:48 AM by tomoto »

Offline h3oCharles

https://worms2d.info/Hosting_Guide
https://steamcommunity.com/sharedfiles/filedetails/?id=328117036

although port forwarding is the default way to do this, WormNAT2 (a WormKit module) is recommended nowadays, there's also a hosting bot called HostingBuddy, but it's clunky in controls

Offline tomoto

https://worms2d.info/Hosting_Guide
https://steamcommunity.com/sharedfiles/filedetails/?id=328117036

although port forwarding is the default way to do this, WormNAT2 (a WormKit module) is recommended nowadays, there's also a hosting bot called HostingBuddy, but it's clunky in controls

Oh my god, it is you again.  Thank for the detailed information!

Offline CyberShadow

  • W:A maintainer
  • Full Member
  • *****

  • Moldova Moldova
  • Posts: 173
    • View Profile
    • Homepage
Quote
WA is very old, so it might have some vulnerable computer exploitation?
Yes, we fixed a few of these. That's also how Silkworm worked, it exploited buffer overflows. We also added some security strengthening like ASLR I think.

However, the connection method (TCP/IP) isn't important. Normal hosting is also a direct connection.

Using WormNAT2 or HostingBuddy gives you a bit more safety because they decode the packets, so a malformed packet will cause the connection to be dropped. They only decode frontend packets though. They also act as a proxy, so your IP is not exposed.

Online FoxHound

  • Scheme maker, map maker and Worms Knowledge Base editor. I also have translation projects.
  • Hero Member
  • *****

  • Brazil Brazil
  • STF STF clan
  • WoSC WoSC community
  • PoC PoC community

  • Posts: 887
  • Founder of WoSC, a community about scheme creation
    • View Profile
    • My Worms Knowledge Base page
Quote
WA is very old, so it might have some vulnerable computer exploitation?
Yes, we fixed a few of these. That's also how Silkworm worked, it exploited buffer overflows. We also added some security strengthening like ASLR I think.

However, the connection method (TCP/IP) isn't important. Normal hosting is also a direct connection.

Using WormNAT2 or HostingBuddy gives you a bit more safety because they decode the packets, so a malformed packet will cause the connection to be dropped. They only decode frontend packets though. They also act as a proxy, so your IP is not exposed.

Shadow is Cyber. And the Cyber is Shadow.
I doubt you see this link moving below (you will have to zoom in. If you click at it, you will have maden the impossible):
'

Offline Zalo the moler

It's never safe to connect with the stranger, you need to have Rubber (wormkit)  8)

Offline Danger135

  • Sr. Member
  • ****

  • Slovakia Slovakia
  • Posts: 383
  • People are stupid!
    • View Profile
Safe is have Worms-PC for worms, and other PC for work.  :P
(and on that work-PC must be disabled ports on which it usually hear)
« Last Edit: January 17, 2023, 03:39 PM by Danger135 »
123  My teams use this, this, and this soundbanks.