Contents of C:\Users\%USER%\AppData\Local\Frontier_Developments\Products\elite-dangerous-odyssey-64\Logs

Why do I have every other commander in my sessions private IP address, and ports logged in plain text?

I think I found a different reason to not play open anymore.

(Psst, it's not the IP's that's the issue. It's the fact that it lists your exposed ports along side it which opens way more issues.)
 
Last edited:

Ozric

Volunteer Moderator
Why do I have every other commander in my sessions private IP address, and ports logged in plain text?

I think I found a different reason to not play open anymore.
I assume you've never played an online peer to peer game before? Perhaps research how a game functions before playing it if you are that concerned about others being able to see your public IP address.

I assume the person who tried to find something to get angry about, also doesn't know what they're talking about :)
 
IPs aren't private. They're public. This is very common for any peer to peer game, especially with asymmetrical matchmaking.

Even if it wasn't in the log, you could pull that information via windows itself with resource monitor.

This.

As I've said before, there are tools (that, functionally, look a lot like torrent client) which display all that information about every other player in an instance and allow you to monkey around with the peer-to-peer data packets, allowing you to disconnect other people from the game.
Which is why it'd be a very bad idea for FDev to enact any kind of punishments for "combat logging" - unless there was incontrovertible evidence to support the claim.

But, yeah.
A lot of "personal" information gets broadcast in public by many multiplayer games.
 
I assume you've never played an online peer to peer game before? Perhaps research how a game functions before playing it if you are that concerned about others being able to see your public IP address.

I assume the person who tried to find something to get angry about, also doesn't know what they're talking about :)
I think it's more the fact that it also shows open ports along side the IP's that may be more of an issue. Aka every user in a session with open port vulnerabilities.
 
I'm having a look through the netlog now, but I'm not seeing anything that concerns me so far. I can see my IP address (internal) with a port selected for play. I can see the Elite Dangerous server instance I'm connected to and it's port, I see the game trying to push peer-to-peer authority to another player and the port they use for the game. I can see the IP and port my friend was using while we were playing together as well.

All of these are still discoverable using normal built-in Windows tools as well.

The logs are big, complex. but I'm not seeing anything suggesting there's a full on list of scanned/opened ports here. This is even when reviewing negotiation for joining a friend in a private group.

When people say "it also shows open ports along side the IP's" are we saying it's declaring the IP and port the application is using? Or that it's initiating a port scan on the target system? (Because my security would be logging a port scan.)
 
Last edited:

Ozric

Volunteer Moderator
I think it's more the fact that it also shows open ports along side the IP's that may be more of an issue. Aka every user in a session with open port vulnerabilities.
I think you need to explain what your actual problem is? Or is it simply that you've seen someone make a rage bait video and you want to pile on Frontier without any clue of what you're actually talking about?

You've been a member of this forum for a decade, presumably playing the game for that long too. And only now the fundamental structuring of how a peer to peer system works concerns you?
 
I think you need to explain what your actual problem is? Or is it simply that you've seen someone make a rage bait video and you want to pile on Frontier without any clue of what you're actually talking about?

You've been a member of this forum for a decade, presumably playing the game for that long too. And only now the fundamental structuring of how a peer to peer system works concerns you?
That's the wild part about this whole thing.

Either the stuff in the netlog is sensitive information, in which case putting out a video on your popular youtube channel letting people who otherwise wouldn't be aware of it that it exists and how to get at it is irresponsible to say the least, or...
The stuff in the netlog is not sensitive information, in which case putting out a video riling people up about it and spreading panic among less technically literate players is... irresponsible.

There is no situation where publishing that video was a good idea.
 
Back
Top Bottom