![]() |
![]() ![]() |
![]() |
![]()
Post
#126
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,840 Joined: 24-July 02 From: Lubbock, TX Member No.: 3,024 ![]() |
I'm not seeing the point of slaving then, if you need exactly the same information to spoof a node either way. I guess it would only make it unhackable, and no other benefits.
|
|
|
![]()
Post
#127
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 ![]() |
But only FROM the Master Node, not from an independant node, because the Slave does not accept any connections except those from the Master Node. You cannot forge a connection except from the master node. Command Connections (The only thing a drone will listen to) need a Subscription. Unfortunately, you cannot forge a Subscription to a Slaved Drone with a Spoof Command. So therefore, you need to use the connection that already exists. The Master Node's connection. No you're completely wrong on this one. Because, if you can only spoof FROM the Master Node, then option 2 doesn't make ANYSENSE WHAT SO EVER. Lets look at each option: 1) Hack Directly to the slave with a +2 TN modifier, requiring a hardwire line. 2) Hack the Master Node 3) Spoof the Access ID of the Master Node and then spoof commands to the slave. If you've hacked the Master node, you don't need to spoof anything. You're already there. When you use Spoof with the ACCESSID you're actually pretending you HAVE the subscription. That's how spoof works. Remember, the subscriptions are 'virtual' they're in a table somewhere, linking access ID with subscription information. When you spoof the correct AccessID it thinks it's comming from the Master Node. That's what having the AccessID allows you to do. |
|
|
![]()
Post
#128
|
|
Moving Target ![]() ![]() Group: Members Posts: 433 Joined: 12-May 11 Member No.: 29,932 ![]() |
I'm not seeing the point of slaving then, if you need exactly the same information to spoof a node either way. I guess it would only make it unhackable, and no other benefits. The benefit is that there is only a single access ID that works, as opposed to a large number. The other benefit is of course the unhackable thing. Slaving is not "I win the matrix" it is a tactic to delay intrusion. Also, for a large part, you're going to want to hack into something, not simply spoof it, so you'll need to go through all these steps to be able to spoof the slave, then you'll need to use spoofing to break the connection or switch you to being the master. Then you'll need to actually do the stuff (possibly with hacking if you didn't make yourself the master). So yeah, slaving buys time against hackers (Which is often something very important) but it doesn't grant immunity to them. |
|
|
![]()
Post
#129
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,840 Joined: 24-July 02 From: Lubbock, TX Member No.: 3,024 ![]() |
But how is that different from spoofing any old node? Basically that way slaving has no benefit at all against spoofing, which seems odd.
The benefit is that there is only a single access ID that works, as opposed to a large number. The other benefit is of course the unhackable thing. Slaving is not "I win the matrix" it is a tactic to delay intrusion. Also, for a large part, you're going to want to hack into something, not simply spoof it, so you'll need to go through all these steps to be able to spoof the slave, then you'll need to use spoofing to break the connection or switch you to being the master. Then you'll need to actually do the stuff (possibly with hacking if you didn't make yourself the master). So yeah, slaving buys time against hackers (Which is often something very important) but it doesn't grant immunity to them. Which really means nothing to a hacker, because they will have to sniff out an access ID either way. I guess slaving in this case would make it harder to get an access ID out of someone with legwork? |
|
|
![]()
Post
#130
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,840 Joined: 24-July 02 From: Lubbock, TX Member No.: 3,024 ![]() |
double post
|
|
|
![]()
Post
#131
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
Do you have even the vaguest idea of what spoof does? When you try spoof a slaved node using the master's access ID, the slave will accept them because the instructions look like they are coming from the master. That is THE ENTIRE POINT of spoofing. A device can't tell the difference (without winning the opposed check) from a spoofed command saying it is coming from the master, and an actual command coming from the master. All a command is is a packet of information sent out through the wireless matrix with an access ID attached to it which gives authentication. All a spoofed command is is a packet of information sent out through the wireless matrix with a fake access ID attached to it which gives authentication. The rules you're posting just say that you have to use the master's access ID as opposed to any other access ID. So, if you have the master's access ID, spoofing a slaved device works exactly like spoofing any other device. Read again, you cannot hack the slaved node without direct physical access. Spoofing is not hacking. And you continue to go in circles. Yes, I know exactly what Spoof Does. However, Spoof begins to break down when Slaving is used. Why? Because you cannot forge a link with your damn spoof command against a Slaved Node. You must use the Master Node (and the Master Node's AID) to do so. Yes, You can Hack the Node, and subsequently have complete access to everything; OR you can Spoof the Master Node as a Legitimate User (Acting as them, remotely), and then Sppoof Commands form there uisng the Master's AID. That is exactly what the Slaving rules tell you. Since you are not hacking the Master Node, using the AID for the Spoof Action does not boot you, because you are not putting another persona/agent/program onto the Comlink/Nexus, you are using it as a bouncing point. Once you have spoofed your access, then you spoof the slaved node (Uisng the same AID). Now, the slaved node will take the command and run it. When a Node is NOT slaved, then any communications with the correct AID will work, because it is accepting such communications (as the Slamm-O! example provided above indicates). Any external communications with the correct AID will cause the Target to react. Unfortunately, if it is slaved, you cannot just connect, becuase your initial try will just shunt you back to the Master Node. You are NOT connecting to the Drone (in this case) node, you are connecting to the Riggers Node (Comlink or Nexus), and a Comlink/Nexus has no Pilot Program to execute the command (in the Drone Example). Spoofing is useful for some things, and Hacking is generally more useful for all things. Spoofing IS NOT HACKING... In fact, You would likely not even be able to analyze the Master node that you have spoofed to determine any slaved subscriptions, because you cannot run any such programs on the master node with a Spoofed ID, because you are NOT ACTUALLY IN THE NODE. You have to hack it for something like that. Anyways... (IMG:style_emoticons/default/wobble.gif) |
|
|
![]()
Post
#132
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,272 Joined: 22-June 10 From: Omaha. NE Member No.: 18,746 ![]() |
But how is that different from spoofing any old node? Basically that way slaving has no benefit at all against spoofing, which seems odd. Note that in unwired, a slave node is considered as running under admin. In unwired attempts at spoofing that require admin get -6 dice. So, in the above example, if the drone was slaved, Slamm-O! gets -6 dice to his spoof attempt under Unwired's rules. |
|
|
![]()
Post
#133
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 ![]() |
Because for example any old node might be setup to accept any number of access Id's.
Lets say you have a Node that controls a mechanical arm on your warehouse management system. It accepts commands from: the maintenance guys access ID's, the access id's of all the security riggers, the command and control node, the safety manager. If you slave it to the Command and Control node, then the ONLY way to control it is via the Command and Control node. The Security Riggers would need to connect via the command and control node, and sends their orders from there. The maintenance guys can't do any maintenance on site, etc... |
|
|
![]()
Post
#134
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
The benefit is that there is only a single access ID that works, as opposed to a large number. The other benefit is of course the unhackable thing. Slaving is not "I win the matrix" it is a tactic to delay intrusion. Also, for a large part, you're going to want to hack into something, not simply spoof it, so you'll need to go through all these steps to be able to spoof the slave, then you'll need to use spoofing to break the connection or switch you to being the master. Then you'll need to actually do the stuff (possibly with hacking if you didn't make yourself the master). So yeah, slaving buys time against hackers (Which is often something very important) but it doesn't grant immunity to them. Never said it was... Slaving is a tactic to make the Target more difficult to hack. That is really all it is used for. Slaving has a nice side benefit of also making it a bit more difficult to Spoof. |
|
|
![]()
Post
#135
|
|
Shooting Target ![]() ![]() ![]() ![]() Group: Members Posts: 1,840 Joined: 24-July 02 From: Lubbock, TX Member No.: 3,024 ![]() |
Note that in unwired, a slave node is considered as running under admin. In unwired attempts at spoofing that require admin get -6 dice. So, in the above example, if the drone was slaved, Slamm-O! gets -6 dice to his spoof attempt under Unwired's rules. Ah right. Thanks for pointing that out (IMG:style_emoticons/default/smile.gif) |
|
|
![]()
Post
#136
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 ![]() |
And you continue to go in circles. Yes, I know exactly what Spoof Does. However, Spoof begins to break down when Slaving is used. Why? Because you cannot forge a link with your damn spoof command against a Slaved Node. You must use the Master Node (and the Master Node's AID) to do so. Yes, You can Hack the Node, and subsequently have complete access to everything; OR you can Spoof the Master Node as a Legitimate User (Acting as them, remotely), and then Sppoof Commands form there uisng the Master's AID. That is exactly what the Slaving rules tell you. Since you are not hacking the Master Node, using the AID for the Spoof Action does not boot you, because you are not putting another persona/agent/program onto the Comlink/Nexus, you are using it as a bouncing point. Once you have spoofed your access, then you spoof the slaved node (Uisng the same AID). Now, the slaved node will take the command and run it. When a Node is NOT slaved, then any communications with the correct AID will work, because it is accepting such communications (as the Slamm-O! example provided above indicates). Any external communications with the correct AID will cause the Target to react. Unfortunately, if it is slaved, you cannot just connect, becuase your initial try will just shunt you back to the Master Node. You are NOT connecting to the Drone (in this case) node, you are connecting to the Riggers Node (Comlink or Nexus), and a Comlink/Nexus has no Pilot Program to execute the command (in the Drone Example). Spoofing is useful for some things, and Hacking is generally more useful for all things. Spoofing IS NOT HACKING... In fact, You would likely not even be able to analyze the Master node that you have spoofed to determine any slaved subscriptions, because you cannot run any such programs on the master node with a Spoofed ID, because you are NOT ACTUALLY IN THE NODE. You have to hack it for something like that. Anyways... (IMG:style_emoticons/default/wobble.gif) You do not need a subscription to the node, for spoofing to work. That's actually the whole point. But spoofing only lets you send 1 way commands. It's of limited use against anything but an agent or a drone. You do not need to spoof the AID of a user, and send that to the master node. What you do is spoof the AID of the master node, and send that to the slave. It's for once actually fairly clear english. |
|
|
![]()
Post
#137
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,272 Joined: 22-June 10 From: Omaha. NE Member No.: 18,746 ![]() |
You must use the Master Node (and the Master Node's AID) to do so. Apparently anyone at your table must use the Master Node, but (trust me on this one), we don't. Clearly we're not getting through to you either through sabs clear line of reasoning "If you've hacked the Master node, you don't need to spoof anything." or Tiger Eye's example of spoofing. At this point it's becoming a pointless shouting match, all the way down to the "damn"s. |
|
|
![]()
Post
#138
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
No you're completely wrong on this one. Because, if you can only spoof FROM the Master Node, then option 2 doesn't make ANYSENSE WHAT SO EVER. Lets look at each option: 1) Hack Directly to the slave with a +2 TN modifier, requiring a hardwire line. 2) Hack the Master Node 3) Spoof the Access ID of the Master Node and then spoof commands to the slave. If you've hacked the Master node, you don't need to spoof anything. You're already there. When you use Spoof with the ACCESSID you're actually pretending you HAVE the subscription. That's how spoof works. Remember, the subscriptions are 'virtual' they're in a table somewhere, linking access ID with subscription information. When you spoof the correct AccessID it thinks it's comming from the Master Node. That's what having the AccessID allows you to do. It makes perfect Sense. SPOOF is a poor Man's Hack, and that is ALL it is. Yes, If you are Hacking the Master Node, you don't need to spoof. Again, Spoofing is not hacking. For a Regular Node, you are correct. You pretend the orders ocme from the controller. Unfortunately, against a Slaved Node, You are not pretending that you have a subscription, because you do not have a Subscription. You must use one that is already in place. AS for your ideas on the Subscription List, It is only Virtual, ON THE LINK IT HAS BEEN CREATED ON, not floating somewhere in the Matrix. It is specific to each Master Device. If you do not have access to that List, well, then you are SOL. (IMG:style_emoticons/default/smile.gif) You either need to hack the Node to acquire the List (which changes constantly, I presume, as things are added and deleted from the list), or you spoof the Target with the AID of the USER, or for a Slaved Node, You spoof the Master, then Spoof the Slave (with the Correct AID). |
|
|
![]()
Post
#139
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
Because for example any old node might be setup to accept any number of access Id's. Lets say you have a Node that controls a mechanical arm on your warehouse management system. It accepts commands from: the maintenance guys access ID's, the access id's of all the security riggers, the command and control node, the safety manager. If you slave it to the Command and Control node, then the ONLY way to control it is via the Command and Control node. The Security Riggers would need to connect via the command and control node, and sends their orders from there. The maintenance guys can't do any maintenance on site, etc... This is correct... In the Frst Paragraph, the node is not slaved at all. In the 2nd, it is. What is the Problem here? |
|
|
![]()
Post
#140
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 ![]() |
The subscription list is on the SLAVE.
it says: AccessID 8763 is my master, I must listen to it. I spoof directly to it: I am AID 8763, execute shutdown command. If my spoof roll is good enough, the slave sends back to accessID 8763 okay (but I don't see that) and begins shutdown procedure. The slave has a list of all nodes that have a subscription to it. The Master has a list of all nodes IT has a subscription to. To fool the slave, you only need an AID on the access list. You don't give a damn about the Master. |
|
|
![]()
Post
#141
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
You do not need a subscription to the node, for spoofing to work. That's actually the whole point. But spoofing only lets you send 1 way commands. It's of limited use against anything but an agent or a drone. You do not need to spoof the AID of a user, and send that to the master node. What you do is spoof the AID of the master node, and send that to the slave. It's for once actually fairly clear english. Which is what I said. They are two different Scenarios. One is for a Normal (Non-Slaved) Node. Spoofing works great against Non-Slaved Nodes. Two is for a Slaved Node. You can only spoof the Slaved node from the Master Node, however, as it is the only one with a valid connection, all others will be refused. |
|
|
![]()
Post
#142
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 ![]() |
This is correct... In the Frst Paragraph, the node is not slaved at all. In the 2nd, it is. What is the Problem here? That there are some job functions where that's not useful. Where that level of security is TOO MUCH for the job needing to be done. You don't want everyone accessing the Control Arm to have Admin access to the damn thing. You want the maintenance guys to only have access to the maintenance functions, you want the safety shift supervisor only to have access to the emergency stop. |
|
|
![]()
Post
#143
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 ![]() |
Which is what I said. They are two different Scenarios. One is for a Normal (Non-Slaved) Node. Spoofing works great against Non-Slaved Nodes. Two is for a Slaved Node. You can only spoof the Slaved node from the Master Node, however, as it is the only one with a valid connection, all others will be refused. Except you're wrong! On the Internet! OMG (IMG:style_emoticons/default/smile.gif) I'm sorry but Scenario Two is not RAW. That maybe how you play on your table, but it's completely not RAW. And it requires a fundemental misunderstanding of the Slave/Master and Spoof rules to come to the conclusion you have. |
|
|
![]()
Post
#144
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
The subscription list is on the SLAVE. it says: AccessID 8763 is my master, I must listen to it. I spoof directly to it: I am AID 8763, execute shutdown command. If my spoof roll is good enough, the slave sends back to accessID 8763 okay (but I don't see that) and begins shutdown procedure. The slave has a list of all nodes that have a subscription to it. The Master has a list of all nodes IT has a subscription to. To fool the slave, you only need an AID on the access list. You don't give a damn about the Master. I think you confuse Subscriptions with Slaving. All your arguments work for standard Subscriptions that are non-slaved. There is NO ACCESS LIST for the SLAVE. There is Only 1 Connection that it recognizes. For standard Nodes, You would be correct. Any member on the Access List could send commands to a non-slaved connection. For a Slaved Connection, YOU ONLY HAVE A SINGLE CONNECTION, and commands are ONLY accepted through that connection. It is a Direct Link. A Slaved node will accept no other links whatsoever, because any attempt at such reroutes them directly back to teh master Node. Spoofing a Slaved Node is difficult. Spoofing a Non-Slaved Node is cake. (IMG:style_emoticons/default/wobble.gif) |
|
|
![]()
Post
#145
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
That there are some job functions where that's not useful. Where that level of security is TOO MUCH for the job needing to be done. You don't want everyone accessing the Control Arm to have Admin access to the damn thing. You want the maintenance guys to only have access to the maintenance functions, you want the safety shift supervisor only to have access to the emergency stop. But that is a Security Choice. Many things will likely not be slaved, as it is intensive and requires more effort, even for those intended to use the system. Just becasue it is less useful does not mean that it is of no use. Some things will be Slaved (I ALWAYS Slave my drones, because it is so much more difficult to get into). I understand your concerns, but that is not how the rules have been written. |
|
|
![]()
Post
#146
|
|
Moving Target ![]() ![]() Group: Members Posts: 433 Joined: 12-May 11 Member No.: 29,932 ![]() |
What is a subscription? A subscription is Device A having somewhere on it something saying "I have a subscription to device B" and device B having somewhere on it something saying "I have a subscription to device A" and them sending data back and forth to confirm this.
What is an Access ID? An Access ID is something saying that Device A is Device A, and not Device C. What is a command? A command is a packet of data sent out into the matrix that contains 1) instructions to do something and 2) an Access ID to act as verification that the instruction should be followed. What is a spoofed command? A spoofed command is a command which has 2) from above artificially altered. What happens when a device receives a command? It checks the Access ID provided by 2) against the list of Access IDs that it should accept commands from. It then looks at the command and checks that the Access ID provided by 2) has the proper level of authority to perform the command. If this checks out, the device performs the command. What happens when a device receives a spoofed command? Exactly the same thing as a non-spoofed command, except that the checking of the Access ID provokes an opposed check to see if the device believes the forged Access ID. What happens when a slaved device receives a command? Exactly the same thing as any other device, with the exception that the list of accepted Access IDs only contains a single possibility, and the additional instructions that if the Access ID doesn't match, it send a warning of some kind to the Access ID that is listed. What happens when a slaved device receives a spoofed command? Exactly the same thing as a non-spoofed command, except that the checking of the Access ID provokes an opposed check to see if the device believes the forged Access ID. In no way is it required that the master be involved in spoofing except that its Access ID needs to be found, and indeed the idea of sending a spoofed command from the master is ridiculous, because if you can send a spoofed command from the master, you could send a normal command from the master, which would be accepted. It is also ridiculous because to do that, you would first have to hack into and gain total control of the master, at which point you have total control of all slaves regardless. Also, to whoever said slaving doesn't provide much advantage against spoofing, you're largely right. But nothing claims that slaving is an improvement against spoofing. Slaving is put forth as a security against hacking, which it is, and it does help somewhat against spoofing due to the decreased accepted Access ID list, and the fact that failure is more directly acted upon. |
|
|
![]()
Post
#147
|
|
Prime Runner ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 3,996 Joined: 1-June 10 Member No.: 18,649 ![]() |
the slave HAS to have an access list. Otherwise it doesn't know who to send all it's requests to. Or How to send them.
That Single Connection isn't really a single connection. (unless you use a wire, and turn off wireless) The Slave gets a signal on the wireless, and it says, "are you AID 7843" If the answer is yes, it accepts the input, if it's no it says, "please contact AID 7843, rerouting connection". So, if I happen to be able to spoof AID 7843, then, when I send my command 'as AID 7843' the slaved node says, "oh.. okay." But when it goes to send a response, that gets sent to AID 7843 as registered on the ad hoc network, which I can't do, unless I have 'permanspoofed' my AID on my commlink. (which causes some issues) EDIT: Ninjad by Ghost in a more coherent fashion. And my point was that, you can't slave everything a s asecurity concern. Somethings do get slaved, but not everything under the sun. |
|
|
![]()
Post
#148
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
Apparently anyone at your table must use the Master Node, but (trust me on this one), we don't. Clearly we're not getting through to you either through sabs clear line of reasoning "If you've hacked the Master node, you don't need to spoof anything." or Tiger Eye's example of spoofing. At this point it's becoming a pointless shouting match, all the way down to the "damn"s. Sorry, I am enjoying the Discussion, and I have been using caps, because it faster than other formatting... Sorry for the "Shouting." Not everyone likes penetrating a Slaved System. I get that. If you have HACKED something, then the Spoof Command is totally useless (Unless youwere detected, at which point you must spoof everything). I agree with that. But there are others who only want to just Spoof a command or two, and Hacking is not needed for that. Unfortunately, a Slaved node presents certain obstacles that MUST be bypassed. There are only 3 ways to get around them, after all, and they are very explicit. Unfortunately, you need to also understand the nature of subscritptions and slaving in concert, if you want to Spoof through the Master Node. Not saying that you don't, but apparently, you do not like how they interract, and that is quite okay. Again, Tiger Eye's Example shows that you can indeed spoof a non-slaved node with ease. I never argued that you could not. (IMG:style_emoticons/default/smile.gif) |
|
|
![]()
Post
#149
|
|
Advocatus Diaboli ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 13,994 Joined: 20-November 07 From: USA Member No.: 14,282 ![]() |
I don't see why it's so hard. Slaving requires admin access, so spoofing a slave is at -6; not easy, but not impossible. You can attempt it as long as you're within signal range. There's no 'spoofing *through* the master', only spoofing *as* the master. A subscription is not a prerequisite.
An encrypted link does require a subscription, and it seems like you should easily be able to set up an encrypted slaved link and be done with the whole question. |
|
|
![]()
Post
#150
|
|
Prime Runner Ascendant ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 17,568 Joined: 26-March 09 From: Aurora, Colorado Member No.: 17,022 ![]() |
the slave HAS to have an access list. Otherwise it doesn't know who to send all it's requests to. Or How to send them. That Single Connection isn't really a single connection. (unless you use a wire, and turn off wireless) The Slave gets a signal on the wireless, and it says, "are you AID 7843" If the answer is yes, it accepts the input, if it's no it says, "please contact AID 7843, rerouting connection". So, if I happen to be able to spoof AID 7843, then, when I send my command 'as AID 7843' the slaved node says, "oh.. okay." But when it goes to send a response, that gets sent to AID 7843 as registered on the ad hoc network, which I can't do, unless I have 'permanspoofed' my AID on my commlink. (which causes some issues) EDIT: Ninjad by Ghost in a more coherent fashion. And my point was that, you can't slave everything a s asecurity concern. Somethings do get slaved, but not everything under the sun. The slave does not need a list, all it needs is the Master Node's AID to reference. (I guess a list of 1 is still a list, though). And since the Connection IS a Subscription directly with the Master node, it is as good as hardwired, in any event (Any communications must travel along that specific port, or it will be rerouted). Now, a non-slaved node can accept any other subscription request it likes or receives. Unfortunately, a Slaved node cannot. It will re-direct any such request back to the Master node, which may or may not accept such a request, depending upon its configuration. You cannot force a subscription request onto a Slaved Node. I agree that not everything is going to be Slaved on a network. That creates an unwieldy system in a lot of respects. |
|
|
![]() ![]() |
![]() |
Lo-Fi Version | Time is now: 21st May 2025 - 12:49 PM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.