What response rating does a mainframe have? Only 6?
Why does a credstick have a device rating of 6? This means that it has System 6, Response 6, Firewall 6, Singal 6?
Why does anybody buy comlinks if your credstick is so powerfull? Just modify your credstick.
How much IC can you load onto simple nodes that are not meant to work as "real" mainframes?
How much IC can you load on "real" mainframes?
Why shouldn't there be a huge difference between both kinds of system?
How does IC or an Agent affect a nodes response (as indicated in p. 228, in the paragraph "Intrusion Countermeasures")? Does every of the 4 attributes count as a program? Does only the IC count as a program? If yes, why? Do the programmes, the IC is running, count toward the response limit of the node?
How does a lowered response affect the standard duties? Does this even matter?
The fact, that almost everything now has a device rating, which must fit into the 1-6 levels, smartgun node in your weapon and supermainframe alike, imposes some huge problems.
Does anybody know a solution?
Is there any way to bring comlinks with system ratings of 6, hightech devices with devicerating 6 that are not originally meant to work as superpower processors, and real mainframes that can only have a rating of 6 together?
Do I just have to accept the ratings and roll on random tables for node responses because reasoning is futile?
Help me, for I am confused.
Matrix nodes are not limited to rating 6. MATRIX ATTRIBUTES, page 212. More detail coming in Unwired of course. In the meantime just cluster up those cutting edge bad boys to groups, and handwave things like the main Ares mainframe.
Hm, I really hope that the writers of unwired try to model something which is at least consistent on first sight . . .
But the Problem at hand is: How many agents can a comlink, a credstick and your IngramSmartguns node run?
and
Is there any reason not to load every IC available at the first net hit of the node and track the hell out of everything?
Just having the IC loaded everytime does not inhibit anything, so tehre is no reason not to do load the full set at the slightest hint of danger.
I have no idea.
Unwired should have definately been the first book to be released after BBB. Not doing this is a very very big mistake.
Here are a few someones posting somethings about hosts.
http://forums.dumpshock.com/index.php?showtopic=12458
As for IC on everything, there isn't really much need for it on most of your PAN items because they seem to get treated more like end devices. It is your commlink's IC that is going to come into play.
Certified Credsticks i wouldn't even bother give a real Signal too. They aren't what they used to be, the main retail cash device.
I'm kinda glad that I got into Shadow Run for the fourth edition, sounds like third edition knowledge mucks up the understandings.
Anywho, I've read and reread the Wireless chapter many times, and there are some oddities there, but it's consistent throughout, for the most part.
You can run IC from your Smartgun or Datajack or whatever, but you need a response upgrade for that to be effective. Datajacks and Smartguns have ratings around 3, for every 3 programs (rounding down) you loose 1 response. Also, whatever IC you're running can't act higher than the modified response value. But the short answer is that yes, you can load IC on every device and bit of cyberware that you own. I guess you could load IC on a credstick, I don't think that credsticks are self-powered.
All devices have a System rating, and all you need beyond that to run a program is a response rating. Any character with some Hardware skill can make a response upgrade in a few days at half cost (see page 240), so that you can load a shitload of IC into your PAN.
The Hacker that I play spends his downtime putting together response 4 commlink upgrades for
1,000. Then he copies over system 6 from his main comm, and, bam, he has an IC node that runs around 10 active Agents with rating 3. Set four or five of those in tandem without a wireless link between your comm and your PAN and no one's getting in. And if someone attacks you can have 40 agents run out and start to kick their ass.
So then, if this is so cheap and easy, then everyone in your game does this, right?
My rigger /street sam has IC on everything he owns that can carry it and won't be overly affected adversely by it. With free program copying there's no reason not to.
| QUOTE (Moon-Hawk) |
| So then, if this is so cheap and easy, then everyone in your game does this, right? |
See, it's the "there's no reason not to" part that bothers me.
Why does that bother you?
Yeah it does get a little wonky when the old fairlight excal was a million bucks, and currently the best comlink can be carried by darn near everyone (at least every runner, hacker or not) and be pretty much hacker-grade forwhat, under 10 grand? ![]()
Mainframes should at least have a couple points higher than rating 6. Or at least have a higher thresholds or be less negatively affected by running many programs at once than someone on a comlink.
Unwired will probably have commlinks with higher ratings and much higher costs.
My take on it is to allow mainframes to break rules about howmany programs are running on them. I don't go for the IC running node idea myself I take the Node the IC is running in to be the one it is acting in. This prevents the why isn't everyone doing it problem.
| QUOTE (Glayvin34) | ||
Pretty much. The GM figured it out, too, so if I set off the alarm in a node and don't get a good intiative, I get the crap kicked out of me by 30 IC agents. |
I don't see why a mainframe needs more than a rating 9, it's really more of a hub and attached are nodes such as "off-line storage","coffee machine", "I/O Port". The mainframe is only a large PAN, it doesn't need to run lots of programs.
| QUOTE (Serbitar) |
| I would call that inconsistent and unbalanced. Furthermore: Why does an IC only count as 1 programm and not as the 2 persona programms plus the programms it is running? Furthermore: A mainframe sholud have at least 10 times the processing power of a mere comlink, if not 100 times. And certainly not just " a couple of points". Say hello to response 50 mainframes with related initative. I would call that unbalanced (but not inconsistent), too. I am still confused. |
| QUOTE (Serbitar @ May 3 2006, 05:19 PM) |
| I am still confused. |
| QUOTE (Glayvin34) |
The GM figured it out, too, so if I set off the alarm in a node and don't get a good intiative, I get the crap kicked out of me by 30 IC agents. |
| QUOTE (blakkie) |
| 30 agents? WTF? Isn't that going to load the crap out of the node? They'll be tossing a die or two each. There are people that know that chapter's rules better, but having that many Agents load up all at once seems quite a stretch. Certainly a perversion. |
I think even 5 IC that are loaded when the node gets 1 hit in detecting the intruder is overkill and ruins the whole game balance. But there is no logical reason not to do it.
Furthermore I still think an agent should count as "2 (System, Firewall)+number of programs on the agent" programs. This would even make IC count on response 1-6 devices reasonable.
AND I still think that a mainframe (realistically) should have response 50-100 if a comlink can have 6.
Even if a mainframe is running multiple nodes (why should it?) it has enough power reseves to do whatever it wants (and provide ultra high intiative for its IC).
Remember: A comlink has to be small. A mainframe can be the size of todays midi towers. It should be very easy to squeeze 10-100 times the processor power of an usb-stick sized comlink into such a mainframe at a cost that is much lower than the comlink. (Just compare todays PDAs, destkop pcs and mainframes)
I'm wondering at the math for agents/IC. After looking over the program section again for agents/IC, I'm wondering if I understand the math correctly.
An agent, if run in my persona, counts as 1 program. But while loaded in my persona, does nothing unless I give it a program to do. So lets say I give it Heal to do. That would give me a program count of at least 2, using both active at the same time. This could then be set to run heal on me every turn or something, freeing me to do other things. But this leaves me with 2 less 'slots' for programs if I want to avoid my own lag. Alternately I could dump the agent by itself in the node I'm at and load him with heal. He could still do the heal every turn of its turn, but now I have 2 freed up slots in my persona to run other stuff. He counts towards my subscription, however. The agent, now independent, can impact the node response, since its not running off my personal resources anymore.
Thing is, does the now free floating agent count as 1 prog or 2 (agent+heal) for purposes of impacting the node response rating? Likewise does an IC loaded with analyze, attack, blackhammer, blackout, and trace count as 1 or 6? (IC + 5 progs).
Yes in a way memory is functionally unlimited. But if they're putting in a mechanic of # of programs affects function, that still sorta implies that # of programs run within an agent/IC count towards total count too? Which would also lead nicely to less agents/IC being run at one time, rather than swarm tactics, unless you ran agents/IC with only 1 loaded prog each, or something.
| QUOTE (Serbitar @ May 4 2006, 05:24 AM) |
| I think even 5 IC that are loaded when the node gets 1 hit in detecting the intruder is overkill and ruins the whole game balance. But there is no logical reason not to do it. |
| QUOTE |
| Even if a mainframe is running multiple nodes (why should it?) it has enough power reseves to do whatever it wants (and provide ultra high intiative for its IC). Remember: A comlink has to be small. A mainframe can be the size of todays midi towers. It should be very easy to squeeze 10-100 times the processor power of an usb-stick sized comlink into such a mainframe at a cost that is much lower than the comlink. (Just compare todays PDAs, destkop pcs and mainframes) AND I still think that a mainframe (realistically) should have response 50-100 if a comlink can have 6. |
Hm. Now I'm confused about the rules. Does the IC need to be in the same node as you to initiate cybercombat or just subscribed to the node you're in? For almighty BALANCE, they would have to be in the same node as you, but I can't tell from the Cybercombat section in the book.
In this thread everyone seems to think that you can just subscribe 10 IC nodes to your main node for the aforementioned 30-40 Agents:
http://forums.dumpshock.com/index.php?showtopic=12440
Although every "device" in the game has the same ratings, for sanity purposes in my games I have put them into 2 classes: device, and host (call them whatever you want).
The first class, "device" is mostly everything in the world: Commlinks, credsticks, vending machines, cars. They follow all of the rules listed, as standard.
A "host" (or mainframe) is what the whole Matrix "backbone" is made of, and what corps run for all of their stuff. Any Node classified as a "host" ignores the rule for Response Decrease. It still has all of the ratings, but has unlimited "bandwidth" or "multitasking" capabilities.
To take the Response Decrease rules and apply them blindly and universally to everything is just silly. Think about an MSP for a second, it must have a Response of.... 5 BILLION or so? I think those Response Decrease rules were written to prevent the "Hacker with an Agent army" problem.
I think a lot of people are still suffering from some SR3-rules "hangover." Under SR3 there were micro-management rules and number crunching for everything: Storage Memory, Active Memeory, I/O Speed, Party IC, Cascading IC, Trap IC, yadda yadda (did anyone get as far to use the Optional Bug rules?). This reduced the game to a crawl and made Decking an exercise in mathematics to the nth degree. Even then, players found "holes" all over the place and ways to exploit the game. Now, we have general rule "guidelines" and the mantra of SR has become whatever you think is reasonable. The rules, in many cases, are a starting point. Take them as such, and extend and build upon them as your situations arise.
Put aside trying to deistinguish between a "device" and a "mainframe" they are all nodes in SR4.
So as such, isn't the max device rating 6? System is capped at Response, so you could have Systemx2 programs before Response degrades by 1? So a Rating 6 node could employ 12 Agents before you'd see a performance issue? So once a 13th Agent enters, the nodes response drops 1 to 5 effective reducing any Agent's ratings of 6+ to 5. This also includes your agents, since they are "free" of you, they take on the Reponse of the node the occupy.
As long as my understanding holds true, standing in a Node rated 6, and it launched 20 Agents rated 6, they'd all suffer from Reponse degradation and become Rating 4.
Am I correct in this?
The biggest reason, to me, that you have to distinguish between a device and a mainframe is that a device can only connect to system x 2 other devices at a time. An average home would have dozens, hundreds, possibly thousands of wireless devices in it that the telecom should be monitoring and managing. An office building mainframe should have hundreds of users logged on at one time. There's no way a rating 6 device can connect to that many people and run that many personas at once. Unless of course the mainframe is dozens of rating 6 commlinks wired together in parallel, in which case it could become a sort of virtual commlink that still only runs at rating 6, but can connect hundreds of users before it slows down, hey, let's call it a mainframe!
Mainfraimes are not nodes in SR4, because rating 6 nods have restrictions that no mainframe would have. Furthermore, as I mentioned before, a device 100 times bigger than a small comlink can easily have a rating of 50 and be cheaper than a comlink.
But still: Can anybody resolve the "why not load the maximum number of agents at first node hit" problem?
@mdynna
Usually though a big iron system will set a choke point on system resources used by an individual login or virtual machine. A node isn't exactly that, but the reasons for limiting the resources remain largely applicable.
In some ways comlinks, in regard to the things that Voran mentioned, make a lot more sense under a mainframe type situation than with a handheld commlink. Because the commlink already has this slicing up of resources happening where just having multiple logins by Agents on a commlink appears to pull resources out of nowhere.
@Glayvin34 The rules kind of hint at on page 227, but don't come right out and say, that an Agent that is acting on it's own must be in the node it is performing its action in. Although it gets a little murkier with things like Track, i'd make the assumption there is the action is being performed in the node where the target icon is located. Not on the path leading back to the physical location, which would require the Agent to node hop back along the datatrail.
@Moon-Hawk
Being able to manage enormous numbers of I/O devices is certainly something that is a characteristic of a mainframe type system. Acting as the communication hub for perhaps thousands of user logins at one time.
| QUOTE (Serbitar) |
| Mainfraimes are not nodes in SR4, because rating 6 nods have restrictions that no mainframe would have. Furthermore, as I mentioned before, a device 100 times bigger than a small comlink can easily have a rating of 50 and be cheaper than a comlink. |
| QUOTE (Serbitar @ May 4 2006, 03:15 PM) |
| But still: Can anybody resolve the "why not load the maximum number of agents at first node hit" problem? |
| QUOTE (page 228) |
| Note that nodes are careful not to run so many IC programs at once that it aff ects their performance (see Response, p. 212). |
*snip*
| QUOTE (Serbitar) |
| Is there any reason not to load every IC available at the first net hit of the node and track the hell out of everything? |
| QUOTE (blakkie @ May 4 2006, 04:28 PM) |
| I and others have mentioned this before in this thread. What is the problem? You just don't -like- the answer, or what? |
| QUOTE (Serbitar @ May 4 2006, 03:50 PM) | ||
Yes, I want aj ustification for a security sheet like thing, when IC is triggered only after a certain number of node its. With increasing security as the node hits increase. |
| QUOTE (GrinderTheTroll) |
| EDIT - I suppose other nodes could release Agents in response to an alert and they could move into the invaded node. |
Here is something I read in the Linking and Subscribing section:
| QUOTE |
| The subscription list may be unlimited in size, but the number of nodes, agents, or drones that a persona may actively subscribe to (access) at any one time is limited to the persona’s System x 2. |
| QUOTE (blakkie) | ||
That's a interesting idea. IC are independant Agents that can move around node to node. But that's going to introduce a bit of a delay (request for IC goes out, load occurs, IC moves in). They'll too still bog the crap out of the node they are coming to the aid of when they move in. |
Ok, just stop and think about this whole "everything is a node with the same rules" concept for a moment. As has been pointed out, the cheapest/most efficient way to make a Rating 6 Commlink is to buy a Meta Link and upgrade everything up to 6. Right? If a suped-up Meta Link can do exactly every other device can do, then why not do it? You know corps are always looking for the most cost effecient way to do things. So, they would use the "upgraded Meta Link" method. Think about it. Renraku's AI Research Host is a modified Meta Link Commlink. Aztechnology's Blood Magic Library is a modified Meta Link Commlink. News headline: "THE ZURICH ORBITAL HOST HAS JUST UPGRADED ITSELF TO A META LINK COMMLINK"
Meta is now the most powerful Megacorp in the world because EVERYTHING IN THE WORLD RUNS ON THEIR COMMLINKS. "Everything is a node?" "Corp hosts use the same rules as everyone's Commlink?" No. My SR4 Matrix is not built on legions of Meta Link commlinks. What's yours?
Meh, the corps probably would make it cheaper than the Meta since they don't need the roll out keyboards and other interfaces for most things. Now we know why it only took 5 years to upgrade all the tech, though. Just billions and billions of skeletal commlinks interconnected.
In today's world it is cheaper in terms of straight money to buy a junk computer and upgrade it. It doesn't happen in corporations for a few reasons:
1) you incur more costs in terms of the time it takes people to build these computers for you
2) large computer companies offer discounts for large purchases
3) many managers who aren't tech savvy don't think that a hoemade computer can be as good as a brand name one
In SR you also come across situations where many of the bigger corporations either manufacture or have ties to people that manufacture computers. If you own an assembly line, building name brand computers is even cheaper than buying and upgrading.
My question is still about the Load that an Agent has. Say you've got a Response 6 ICberg running 2 Agents and you don't want to decrease the response, does the program list look like this:
1.Agent1
2.Agent2
3.Armor
4.Attack
5.Stealth
or like this? (with a -1 response)
1.Agent1
2.Armor1
3.Attack1
4.Agent2
5.Armor2
6.Attack2
Does an Agent use programs that the node is running or does it use its own load and can't share programs? Because if they use programs on the node, then one program is taking multiple actions each Turn (which I guess could be possible).
| QUOTE (Glayvin34) |
| My question is still about the Load that an Agent has. Say you've got a Response 6 ICberg running 2 Agents and you don't want to decrease the response, does the program list look like this: 1.Agent1 2.Agent2 3.Armor 4.Attack 5.Stealth or like this? (with a -1 response) 1.Agent1 2.Armor1 3.Attack1 4.Agent2 5.Armor2 6.Attack2 Does an Agent use programs that the node is running or does it use its own load and can't share programs? Because if they use programs on the node, then one program is taking multiple actions each Turn (which I guess could be possible). |
| QUOTE (Glayvin34) |
| My question is still about the Load that an Agent has. Say you've got a Response 6 ICberg running 2 Agents and you don't want to decrease the response, does the program list look like this: 1.Agent1 2.Agent2 3.Armor 4.Attack 5.Stealth or like this? (with a -1 response) 1.Agent1 2.Armor1 3.Attack1 4.Agent2 5.Armor2 6.Attack2 Does an Agent use programs that the node is running or does it use its own load and can't share programs? Because if they use programs on the node, then one program is taking multiple actions each Turn (which I guess could be possible). |
Did you mean Trace-6, Attack-6?
| QUOTE (GrinderTheTroll) |
| It's not the Agent's rating that degrades the node (although the Agent is capped at the node Rating), it's the number of Agents running in a node that degrade it. The Agent's Reponse equals that of the node it occupies. A Rating 3 node can have 6 Agents running and any Agent will function at a MAX Rating of 3 even if >3. If the Agent moved into a Rating 5 node, then that node could handle 10 Agents before degrading and the Agent would function at a MAX Rating of 5 even if >5. IIRC the limit to how much you can load into an Agent, is its Rating x2 in Program Ratings. So Agent 6 could have Trace-3, Attack-3. Can anyone verify this? |
On 232 there's that "Simultaneous Combat in Multiple Nodes" section, it seems to indicate that you can get attacked through any node you're subscribed to. So if you're in a node with 10 ICbergs subscribed to it, like any high-security "Mainframe" (I use the word lightly) is likely to have, then each of the ICbergs attacks you.
So I guess being subscribed to a node and being in the node is the same thing for personas? Agents can enter a node so if they're tracked the track just goes to whatever node they are running on (I think).
Here is how I see it.
System/Response 6 node running the following programs:
1. Agent Attacker (Pilot 4)
2. Agent Detector (Pilot 6)
3. Agent Hunter (Pilot 5)
4. Attack-6
5. Analyze-6
6. Blackout-6 (node loses 1 response, now at 5)
7. Stealth-6
8. Armor-6
9. Track-6
10. Exploit-6
11. Decrypt-6
Node is now effectively System/Response 5 and Programs only get max of 5 dice. Another program or agent would reduce response again, down to 4.
Now the Agents are loaded as such:
Attacker - Defend node
-- Attack, Blackout, Armor, Stealth (-1 response for 4 programs with a 4 pilot)
Equivalent to a 4 system(pilot), 4 firewall, 4 response persona (node response at 5, -1 for programs), programs limited to 4 by Pilot rating
Detector - Detect intrusion and locate source of intruder
-- Analyze, Stealth, Track, Exploit, Decrypt (no response loss due to programs, but pilot is limited to 5 effectiveness by node response of 5)
Equiv. to a 5 sys, 5 firewall, 5 response (limited by 5 response node), programs at 5
Hunter - Defend node or attack intruder's node
-- All programs listed above (8 programs, -1 response loss for 5-9 programs loaded)
Equiv. to a 4 sys, 4 firewall, 4 response persona, programs at 4
Obviously this would not be an ideal loadout, but I was trying to cover as many situations as possible. What do you guys think?
Backing away from the exact mechanics for a second...
If I'm hacking a server, and see some alert flags pop up, but want to stave off the inevitable for a few rounds while my team gets out, can I do something as simple as uploading a few agents and then ordering them to go out and create havoc in other nodes on the system, then uploading a few more?
It sounds like once I get into a system, I can basically DOS it with agents. The IC and deckers will be so busy tracing down my agents, that they won't be able to get control of the system. I probably won't either, but this is a "run away" tactic, not a take and hold ground tactic.
Also, was there any mention of party ice in the BBB? I don't remember seeing it. I think it would need some kind of special treatment under the "stacking" rules discussed here.
Yeah, Damaleon's model seems to be right. But about the Hunter Agent, do Agents lose response for the programs they have loaded? They're not running the programs themselves, the node is. All that's in the book is the programs "must be active, and so may affect its Response" line on page 228, I think that's referring to the Response of the node the Agent is running on, not the Agent itself.
| QUOTE (Big D) |
| Backing away from the exact mechanics for a second... If I'm hacking a server, and see some alert flags pop up, but want to stave off the inevitable for a few rounds while my team gets out, can I do something as simple as uploading a few agents and then ordering them to go out and create havoc in other nodes on the system, then uploading a few more? It sounds like once I get into a system, I can basically DOS it with agents. The IC and deckers will be so busy tracing down my agents, that they won't be able to get control of the system. I probably won't either, but this is a "run away" tactic, not a take and hold ground tactic. Also, was there any mention of party ice in the BBB? I don't remember seeing it. I think it would need some kind of special treatment under the "stacking" rules discussed here. |
| QUOTE |
| Payload Agents can be loaded up with copies of your programs so that the agent may employ them on its own. If an agent is acting independently, any programs it’s carrying must be active, and so may aff ect its Response (see p. 212). Any program run by an agent is limited by the Pilot rating. |
Yeah, I would agree with Big D, as long as you can hack the proper access needed to load an Agent on their system, it should be possible. I would restrict running Agents to security or admin access, so it takes longer to hack in, but if you manage to do that, you should be able to use their system's resources against them.
I wouldn't allow you to do it immediately though, except for what programs/IC/agents are already available to the node your on. If for some reason there is no agent available to that node, it isn't rated high enough for you, I would make you spend several actions transfering some of your's to the node before you could activate them. Not a problem when the system isn't on alert, but it can take precious IPs away if you're being attacked, which is a suitable penalty if you don't think ahead.
Stupid question... does a TM need any hacker skills to drop a commlink full of Agent Smiths onto a system (ordering them to go forth and destroy in waves before they overcrowd the node)?
| QUOTE (Big D) |
| Stupid question... does a TM need any hacker skills to drop a commlink full of Agent Smiths onto a system (ordering them to go forth and destroy in waves before they overcrowd the node)? |
| QUOTE (Big D) |
| Stupid question... does a TM need any hacker skills to drop a commlink full of Agent Smiths onto a system (ordering them to go forth and destroy in waves before they overcrowd the node)? |
damaleon: Sorry, didn't mean he didn't have TM skills, I was just referencing the earlier thread where I had missed that a TM has to have "normal" hacking skill to use programs off of a commlink, in addition to TM hacking.
oh, didn't realize that. in that case, I agree with Glayvin34, once he has access, everyone knows basic operation like loading a program. Even a TM would be force to learn how if he had any type of formal schooling, no matter how slow and backward he/she thinks it is.
| QUOTE (Glayvin34) | ||
First, from page 212: "Response may be affected if you run too many programs. For every x number of programs you have actively running, where x = System rating, your Response is reduced by 1. So if you’re running 10 programs with a System 5, your Response will be reduced by 2." So at each multiple of your system you take a -1 to response. It's that second part that I'm wondering about. Does an Agent's Load count against the total number of programs running? It says on page 228 that "Agents can be loaded up with copies of your programs so that the agent may employ them on its own. If an agent is acting independently, any programs it’s carrying must be active, and so may affect its Response." Now it seems to be that the Agent runs the program on whatever node it's on, affecting response. So if you've got the aforementioned attack IC, you'll need it to run about 3 programs to be effective in cybercombat, plus the fact it's an Agent, so that means one attack IC with Attack, Stealth and Armor takes up 4 programs. Does that not sound right to anyone? |
| QUOTE (damaleon) |
| Yeah, I would agree with Big D, as long as you can hack the proper access needed to load an Agent on their system, it should be possible. I would restrict running Agents to security or admin access, so it takes longer to hack in, but if you manage to do that, you should be able to use their system's resources against them. I wouldn't allow you to do it immediately though, except for what programs/IC/agents are already available to the node your on. If for some reason there is no agent available to that node, it isn't rated high enough for you, I would make you spend several actions transfering some of your's to the node before you could activate them. Not a problem when the system isn't on alert, but it can take precious IPs away if you're being attacked, which is a suitable penalty if you don't think ahead. |
Well, I'm thinking beyond just sitting there and eating CPU...
Launch a bunch of agents and have them go out and start trashing the system, perhaps focusing on key nodes if you've mapped out the system. That buys you a few precious turns, maybe even a few minutes, before the ice cleans out the system or the admin gives up and reboots.
Also, because they're not as limited in number as spirits or sprites, you can make one heck of a distraction against one system while you sneak into another one.
| QUOTE (Serbitar) |
| What response rating does a mainframe have? |
| QUOTE (Serbitar) |
| Why does a credstick have a device rating of 6? This means that it has System 6, Response 6, Firewall 6, Singal 6? |
| QUOTE (Serbitar) |
| Why does anybody buy comlinks if your credstick is so powerfull? |
| QUOTE (Serbitar) |
| How much IC can you load onto simple nodes that are not meant to work as "real" mainframes? |
| QUOTE (Serbitar) |
| How much IC can you load on "real" mainframes? |
| QUOTE (Serbitar) |
| Why shouldn't there be a huge difference between both kinds of system? |
| QUOTE (Serbitar) |
| Does only the IC count as a program? If yes, why? |
| QUOTE (Serbitar) |
| Do the programmes, the IC is running, count toward the response limit of the node? |
| QUOTE (Serbitar) |
| How does a lowered response affect the standard duties? |
| QUOTE (Serbitar) |
| The fact, that almost everything now has a device rating, which must fit into the 1-6 levels, smartgun node in your weapon and supermainframe alike, imposes some huge problems. |
| QUOTE (Rotbart van Dainig) |
| Because exceptions kill any rule. |
| QUOTE (James McMurray) |
| Not if they're well defined. |
| QUOTE (James McMurray) |
| A rule that fits every occasion perfectly is of course optional, but rarely possible. |
True. Some exceptions are comon enough to need a rule, for the rest flexibility is better.
Thanks Rotbart for the comments. (Actually I was wondering where you and Frank Trollman have been lately. It is hard to get good comments and suggestions these days)
But I think I have already made up my mind. Copying from the "Idiots guide to Matrix 2.0" thread:
"Furthermore I would subdivide nodes into "devices" and "hosts". It is extremely silly to think that a full blown matrix host would have the processing power of a mere comlink.
Thus I would rule, that "devices" (comlink and everything else that does not have a bigger computer behind it) are affected by response "degradation", but hosts are not. That solves the DOS attack. IC would have to be restricted by common sense (as it was in SR3), maybe with some traffic arguments to make it reasonable (high traffic nodes have less IC and are less secure, and vice versa). Furthermore a host can maintain alsmost infinite subscriptions (or matrix cafes wouldnt be possible)."
I would further suggest, that programmes run by IC/agents count towards the response limit, so you cannot protect your comlink better than any "host" would be protected using balance arguments.
Then I would rule that only nodes are allowed to check a persona for illegimate acess (instead of analyzing IC), and only when this persona takes actions that exeeds its hacked (or valid) permissions.
I did a couple of consistency checks and propability calculations with these suggestions and found that they are good guidelines for a veriety of SR4 situations.
@Serbitar
Degradation for a given login can occur on mainframe. Because the system will not feed a process or login all it's resources, outside of the top tier of security priority (many level of security, with some sort of "system" level at the top). That top tier wouldn't really equate to the Admin login level in the SR rules, mostly because of there being so many different piority levels.
It does in an attempt to protect the entirety of system from degradation. If it didn't some shmuck's do nothing infinite loop program or inifite open file loop could bring the whole damn thing to it's knees.
That's really a key to how a mainframe can effectively handle so many users, rationing of resources. It is entirely reasonable for similar throtling to occur on a node that is hosted on a mainframe equivalent.
P.S. Note that in that thread i linked there was a suggestion further down that the better computers would provide some limited support for extra IC that operated outside of the limit. Those IC would be running on a security/priority rating above Admin. But the system would definately want to limit how many of those they had because they represent a serious threat to overall system performance and uptime (which is king for big iron).
| QUOTE (GrinderTheTroll) |
| Distributed Denial of Service attacks (DDoS) on current day websites envlove getting thousands of "users" to all login at once and overload a target system. They don't require admin access, but attempt to choke bandwidth and server resouces. This is modeled in SR4 by lots of Agents entering the same node. There is no mention of personas causing Reponse issues, but instead Agents. This model allows an infinite amount of users, but only a limited number of "free thinking" programs (Agents) to draw on it's resoueces. I like the idea of being able to do this and I don't see the need to restrict it since you'd need to get all those Agents into the system in the first place by unloading yourself or having them Hack in themselves. DDoS-2070: (aka ZombieArmy) Agent (Pilot-3+) Exploit-3+ DumpBot: (Persona dumped) Agent (Pilot-1) |
| QUOTE (Serbitar) |
| Thus I would rule, that "devices" (comlink and everything else that does not have a bigger computer behind it) are affected by response "degradation", but hosts are not. That solves the DOS attack. IC would have to be restricted by common sense (as it was in SR3), maybe with some traffic arguments to make it reasonable (high traffic nodes have less IC and are less secure, and vice versa). |
| QUOTE (Serbitar) |
| Furthermore a host can maintain alsmost infinite subscriptions (or matrix cafes wouldnt be possible). |
| QUOTE (Serbitar) |
| I would further suggest, that programmes run by IC/agents count towards the response limit, so you cannot protect your comlink better than any "host" would be protected using balance arguments. |
| QUOTE (Serbitar) |
| Then I would rule that only nodes are allowed to check a persona for illegimate acess (instead of analyzing IC), and only when this persona takes actions that exeeds its hacked (or valid) permissions. |
| QUOTE (damaleon) | ||
From what I remember, there is nothing limiting or degrading a node's performance by having more and more people access it currently described in the rules. It does mention that you are limited to System X 2 nodes, agents, and drones that you can simultaneously access, but nothing about how many people can be reading a node at the same time, so the effect of a current day DDoS attack is not described in the rules. It does mention that a subscription list can be practically unlimited in size, but you can only subscribe (I think it means link or actively subscribe) to so many at once. As I read it, the only way to degrade a node's response is to load more and more programs, be they agents, hacking tools, common use programs or what not, and that would require you to gain access to the node and make it run programs. If that's the case, an agent only affect the node it can be traced back to, not the ones it accesses (so if a hacker loads an agent on his Response 5 commlink sends it out to a Response 3 system before logging off, it would still be at a Response 5). I kind of see wireless like this: you can have 1 person shouting to 1 or 1 million and the only thing that affect whether they hear you is distance (signal strength) so as many people are in range can read a what a node if 100 people are shouting different things, you can only make out one or a couple at any given time (active subscription or linking limit) but you can change you you focus on at any given time If you are shouting back and forth, both have to focus on listening (you both count against the linking limit of the other) I'd apply all this to any single device and consider mainframes meshed networks, many devices completely interconnected but acting as 1 device with a common set of attributes, which then allows an expansion of the # of programs and interacting users, but doesn't increase the system, response, or firewall rating. |
| QUOTE |
| This is modeled in SR4 by lots of Agents entering the same node. There is no mention of personas causing Reponse issues, but instead Agents do. This model allows an infinite amount of users, but only a limited number of "free thinking" programs (Agents) to draw on it's resources. |
| QUOTE (Rotbart van Dainig) |
| That means you just removed the 'hard' limit to implement a 'common sense' limit... which would be around... not more than a handfull of them? Six of one, half a dozen of the other. |
| QUOTE |
A device should, too. Otherwise, the whole AR concept breaks down in DoS. |
| QUOTE |
They do already count... to the Response of the IC/Agent, which degrades it's effectiveness very quickly, as any Program it owns must be running. Slapping them onto the device results in immediate DoS dropout. |
| QUOTE |
No real reason for that - that's what the System+Firewall is for, initally... if one does try to exceed one's right, it fails and gets reported anyway. |
| QUOTE (blakkie @ May 5 2006, 03:27 PM) |
| Degradation for a given login can occur on mainframe. Because the system will not feed a process or login all it's resources, outside of the top tier of security priority (many level of security, with some sort of "system" level at the top). That top tier wouldn't really equate to the Admin login level in the SR rules, mostly because of there being so many different piority levels. It does in an attempt to protect the entirety of system from degradation. If it didn't some shmuck's do nothing infinite loop program or inifite open file loop could bring the whole damn thing to it's knees. That's really a key to how a mainframe can effectively handle so many users, rationing of resources. It is entirely reasonable for similar throtling to occur on a node that is hosted on a mainframe equivalent. |
| QUOTE (Serbitar) |
| If an agent counts only as 1 programme, players and NPCs can make their comlink into IC castles. I do not want that for balancing reasons. |
| QUOTE |
| Good explanation. But my problem with the whole degradation buisnes is the following: If an agent counts only as 1 programme, players and NPCs can make their comlink into IC castles. I do not want that for balancing reasons. There is no way to handwave this, as players need rules to know what they can do with their comlink and what they can not. |
| QUOTE (Rotbart van Dainig @ May 5 2006, 05:19 PM) | ||
Speaking from play experience: You are worrying waaay too much. Usually, IC will never even spot an intruder - Stealth is tough to beat on Matrix Perception tests. Even if it would, nothing prevents a hacker using Agents, too. It's a bit like letting guards patrol alone... PS: The real ugly thing are data bombs. |
IC are not loaded until the security alert has been raised (page 228). So no multiple IC until you screw up. (EDIT:Unless this is a hyper serious about security system, then they might allocate the resources to roaming security Agents that are constantly sweeping, but that'll cost processing power which equals money, and really they have to be able to notice you and then correctly Analyze you to figure out that you aren't legit)
Once the security alert is raised the drek hits the fan, as fast as one IC per IP at a time depending on how agressive the system security is. But even then, depending on Init rolls and you noticing the IC loading (it takes a Complex Action worth of time for the loading to occur), you have a chance that'll you'll get the option to scram before the IC even gets to act.
So the system is still quite safe until you set off a Data Bomb or the system itself detects you. Just like in SR3, the key is to not get noticed and you can cakewalk through. Actually that's like a lot of things in SR.
| QUOTE (Serbitar) |
| You should definately read the "Idiots guide to Matrix 2.0" thread. |
| QUOTE (Serbitar) |
| There they argue, that if the IC wins in an pilot+analyze vs hacking+stealth test, they IC has sucessfully uncovered the hacker as such, a hacker with faked permissions. |
| QUOTE (Serbitar) |
| And the chances to lose a for example 10 vs 10 dice opposed test are not low, 41,4%. |
| QUOTE (Serbitar) |
| Thats why I do not want IC that is constantly scanning everything and uncovering hackers with this opposed test. |
| QUOTE (Serbitar) |
| Agents are bad. They highten the danger of beeing detected |
Now we are turning in circles:
| QUOTE (Rotbart) | ||
That's a necessity, in fact - as there are no more security tallies. |
| QUOTE (Rotbart) | ||
No real reason for that - that's what the System+Firewall is for, initally... if one does try to exceed one's right, it fails and gets reported anyway. Using RL analogies, even a home gateway running linux has a fullblown right managment system. |
| QUOTE (Serbitar) |
| So what? Scanning IC or System+Firewall? |
| QUOTE (Serbitar) |
| Add the standard assumption that IC counts only as 1 programme, and you have 3-4 of these scanners in a 4 node. |
| QUOTE (Serbitar) |
| A 4 node should be fair game for a 6/6 Hacker (at least 80% propability to hack in, perform 3 actions and log out undetected) |
Any reason not to let it constantly scan everything?
The 'Try again' rules? ![]()
Load balancing, sheer amount of sessions, drekcetera.
There's where rationalisation starts, for the sake of a fun/balanced game.
I should add one thing Sebitar that i missed mentioning before. When the big iron limits resources on node it is hosting it -might- throtle it by node/account pairing. So if a persona comes on and loads 15 programs it only affects itself, not other personnas in that node. Under that i'd expect that independant Agents (including IC) would limit each other by count as they would be grouped together as being programs 'owned' by the system itself. So for a Response 6 node you could have up to 6 Agents/IC running before they were subject to performance degradation. But even if there was 7 Agents on the node, a persona coming into the node would not be subject to that degradation. Likewise each persona would count their own programs loaded only when checking to see if the performance was degradated for themselves.
That seems to me a pretty reasonable step up in room on a mainframe node from a portable computing device while allowing a big iron host to avoid the unlimited access to computing resources that could bog the whole machine. It also nicely handles the idea of supporting hundreds or thousands of simultaneous persona accessing a node.
To personas in it i imagine it would look like a convention room, a mall hallway, or some other really big space with lots of room for all sorts of personas, maybe even with LOS blocking stuff to sort of visually break up the node, like say a park with rows of bushes, trees and embankments.
| QUOTE (GrinderTheTroll) |
I think you missed my point: Personas don't effect reponse, but Agents do. |
| QUOTE (damaleon @ May 5 2006, 08:03 PM) | ||
I don't think I missed it, but mine got lost in all the stuff I typed. Mine was that, as I understand it, Agents only slow down the node they originate from, not the node they are currently in (unless it it the node the originated from). So sending a bunch of Agents to a node won't slow it. |
Okay, I'm wrong. I missed the last line of the Agent description saying "this means that the attributes of an agent operating independently may vary as it moves from node to node."
Would this make an independent agent impossible to track back to the person that controls it unless you intercept its wireless commands?
| QUOTE (damaleon @ May 5 2006, 08:23 PM) |
| Would this make an independent agent impossible to track back to the person that controls it unless you intercept its wireless commands? |
Okay, now that I have to re-think independent agents, tell me if this makes sense to you.
A hacker creates an independent agent with a Pilot 4 while on Response 5 node, loading it with 6 programs and send it to try and get a file from another node. While in this node, the 6 programs lowers the Response for the Agent to 4 (but the Node still has a 5?) and it manages to hack of the fly to the node it is attacking and it has a Response of 3, so is the Agent is at a Response 1 or 2? Would the max response of 3 in the new node limit the pilot of the Agent to 3 making the 6 programs reduce its Response by 2, or would the Pilot still be 4 keeping the Response penalty -1? All programs the Agents run would also be limited by the response of the Agent as well right?
Would IC that can move from node to node be affected the same way (since they are specialized agents)? If that were the case, could you get IC to follow you to a low Response node to make it easier to defeat?
Ok, the Agent 4 with 6 programs active going to the Response 3 node. Now the Response 3 of the node limits the System of the node to 3. So immediately the Agent is lowered effectively to an Agent 3.
When calculating the Response degredaton of the Agent by counting the Programs running you use the Agent rating (not the System of the device/node). So it will be a 6/3 = -2. So yes, the Response for the Agent becomes a 3-2=1. Barely moving. If that agent tries to move to a Response/System 2 device it basically stops running (or maybe it can choose to shutdown programs to keep going, but it is going to need to shed a lot of them).
EDIT: BTW that means that in the original example if the Agent had 8 programs loaded instead of 6, even though it was on a Response/System 5 node, it would have an 8/4= -2 penalty to it's own Response rating. Thus having an effective Response of 5-2=3.
Anyone that sees a problem with this please jump in. I think i understand this stuff, but the wireless chapter is still my weakest section since i've not really used it extensively in play yet. We are still getting use to the idea that deckers can be real PCs.
Okay, I get that.
So an easy way to put a roadblock in the way of any IC or independent agent that is following your datatrail would be to go through several Response 1 or 2 nodes to make them stop functioning or at least unable to enter and follow the trail?
Wow, this stuff is confusing, good thing I haven't needed to use the matrix much.
| QUOTE (damaleon) |
| Okay, I get that. So an easy way to put a roadblock in the way of any IC or independent agent that is following your datatrail would be to go through several Response 1 or 2 nodes to make them stop functioning or at least unable to enter and follow the trail? |
| QUOTE (maikeru @ May 5 2006, 09:25 PM) |
| Wow, this stuff is confusing, good thing I haven't needed to use the matrix much. |
| QUOTE (blakkie) |
| Hrmm, didn't think of that. Maybe. Though as i mentioned earlier in the thread i read the Trace action acting on an active persona as all occuring from the node where the persona is being tracked from. So until the IC finds the end of the trail they don't leave their home node. |
| QUOTE (Rotbart van Dainig) | ||
That assumes that every Node in that chain allows Access... otherwise, that Node would have to be hacked to continue tracking. |
It's quite easy to force routing in SR4, especially if you create those 'anonymizer nodes' yourself.
An anonymizer duplicates the original requester and then passes back the results. So there is actual proccessing that needs to occur on the node to emulate both sides. For a web browser that's pretty straightforward. How easy that is within the SR Matrix, and whether or not a crappy node could pull it off without impact on performance of the end persona, isn't clear as that is getting well outside of the rules IMO.
Not really - that's exactly what the rules call hopping nodes.
Which page are you talking about? I didn't get that from my reading, but i want to make sure i'm looking at the same thing as you and didn't miss something.
p. 220, Loggin On/Off.
Ya, i don't get that as fuctioning as an anonymizer at all. I would perfer to read that as not having the requirement that you log into the node that you are hopping. The wording is vague, but if they required that you log in as a user on the node that would make the Matrix either a very unfriendly or a very unsecure place. I'm thinking in terms of the internet now, if i had to log into every system that datapackets traveled on to/from me....the mind boggles. That is how the internet works so well, routing is just happens by whatever means the network deems best. It doesn't even guarantee that each individual packet will travel the same route as the last. It doesn't even guarantee, if i remember correctly, that the order of packet arrival will be the same as the order sent.
That's the fundamental difference between Nodes that allow public access and nodes that don't - the latter don't route traffic, normally.
Cracking a vending machine and using it as anonymizer node is simple.
BTW, it's quite easy to make routing work a certain way... that's what proxies are for.
| QUOTE (Rotbart van Dainig @ May 7 2006, 08:55 AM) |
| That's the fundamental difference between Nodes that allow public access and nodes that don't - the latter don't route traffic, normally. |
| QUOTE |
| Cracking a vending machine and using it as anonymizer node is simple. BTW, it's quite easy to make routing work a certain way... that's what proxies are for. |
| QUOTE (blakkie) |
| Because of the range limitations of a low signal, i evision part of the protocol that each device do it's Matrix good citizenship duty by being willing to forwarding towards the nearest known hub node or the destination device/node the packets without requiring any sort of login. |
| QUOTE (blakkie) |
| Thus my point about it requiring processing power and specific programs, which proxy/firewall/anonymizers do. If you are trying to use a rating 1 device that has some other type of use it's going to suck going through it. |
| QUOTE (blakkie) |
| Remember also that such a system would be very easy to exploit to get it to cough up the anonymizer patch list. A lot better idea would be to use a hard to get into system (perhaps one that is partially trusted by the target system) that was protected with IC, sprites, or some other watchdog to protecting the hop. |
| QUOTE (blakkie) |
| As a GM i would generally add those as steps that the hacker realizes they must do just to have any chance of success. |
| QUOTE (blakkie) |
| But even then for a live connection the i see the Trace program sniffing the traffic going in and out to try track without having to log into the node itself. |
| QUOTE (blakkie) |
| Really all that fancy stuff is already abstracted into the Track action, page 219, quite neatly as things that a decker and their Stealth software would normally be trying to do. |
| QUOTE (blakkie) |
| So as such it makes great fluff, and can be used by the GM to add spice (both crunch and fluffwise) to a run on a host by making certain hops defacto mandatory (or perhaps giving IC bonus dice to their Track action if the decker chose not to do the intermediary hop(s)). |
| QUOTE |
| Stealth does not relay traffic - Stealth disguises it. |
| QUOTE | ||
Not really... it would make Track allmighty. |
| QUOTE |
| As the rules are pretty explicit about hackers having success without any hops at all, that does not really impress me. |
Powered by Invision Power Board (http://www.invisionboard.com)
© Invision Power Services (http://www.invisionpower.com)