IPB

Welcome Guest ( Log In | Register )

10 Pages V  « < 5 6 7 8 9 > »   
Reply to this topicStart new topic
Tymeaus Jalynsfe...
post Jun 3 2011, 08:08 PM
Post #151


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Yerameyahu @ Jun 3 2011, 02:01 PM) *
I don't see why it's so hard. Slaving requires admin access, so spoofing a slave is at -6; not easy, but not impossible. You can attempt it as long as you're within signal range. There's no 'spoofing *through* the master', only spoofing *as* the master. A subscription is not a prerequisite.

An encrypted link does require a subscription, and it seems like you should easily be able to set up an encrypted slaved link and be done with the whole question.


A subscription is a requirement, because a Spoof Command issues a Command, and only subscriptions can support such things according to Unwired.

Subscriptions and Data Requests are two completely different animals. (IMG:style_emoticons/default/wobble.gif)
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jun 3 2011, 08:10 PM
Post #152


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



I dunno. If a subscription is a requirement, spoofing anything is impossible. I read that bit about commanding drones (not devices) as referring to a persistent "sensible" connection that you *maintain* with your drones. It's not the same as being able to send a single command to a given device.
Go to the top of the page
 
+Quote Post
sabs
post Jun 3 2011, 08:13 PM
Post #153


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



Except that subscriptions are only for two way links. They are a Fast, two way, maintained connection. Completely unnecessary for Spoofing.



Go to the top of the page
 
+Quote Post
Yerameyahu
post Jun 3 2011, 08:14 PM
Post #154


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Right.
Go to the top of the page
 
+Quote Post
sabs
post Jun 3 2011, 08:16 PM
Post #155


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



TJ: Normally I think you have solid grasp of the SR rules. But I think in this one, you have a fundamental disconnect.
Go to the top of the page
 
+Quote Post
deek
post Jun 3 2011, 08:18 PM
Post #156


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



I see where TJ is going on this. Its kind of like a VPN connection. When the master and slave negotiate the connection, they are authenticating each other and making a secure tunnel between each other and only traffic using that secure tunnel, is valid.

This assumption, I think, is more between the lines then RAW. We can certainly argue both points. TJ is supported by the book saying a slaved node can only accept commands from the master node and the text saying you need access to the master node to send commands to the slave. That "feels" like there is a secure connection between the two that cannot be spoofed.

Ghost has a case, because nowhere in the book does it say spoof can't spoof, well, anything.

I think it comes down to how powerful you want to let the spoof command be and how tough you want to make slave nodes from being hacked...
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 3 2011, 08:20 PM
Post #157


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



QUOTE (sabs @ Jun 3 2011, 04:16 PM) *
TJ: Normally I think you have solid grasp of the SR rules. But I think in this one, you have a fundamental disconnect.

I think it comes from the fact that it says you need to spoof the master then spoof the slave. It is using two different definitions for the word spoof. "Spoof the master" means 'spoof' as in 'pretend to be' while "Spoof the slave" means 'spoof' as in 'send a fake command'. When put together you 'pretend to be the master then send a fake command' which is covered in a single spoof action.
Go to the top of the page
 
+Quote Post
sabs
post Jun 3 2011, 08:20 PM
Post #158


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



except that VPN is not a slave connection.

VPN is an encrypted connection, which is something completely different.
The way to cockblock spoof, is of course to encrypt your slave connection.

Then you need to:
Sniff the traffic
decrypt the traffic
spoof the AID
encrypt properly
spoof your command using your spoofed aid and the new encryption.
Go to the top of the page
 
+Quote Post
sabs
post Jun 3 2011, 08:22 PM
Post #159


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



QUOTE (Ghost_in_the_System @ Jun 3 2011, 09:20 PM) *
I think it comes from the fact that it says you need to spoof the master then spoof the slave. It is using two different definitions for the word spoof. "Spoof the master" means 'spoof' as in 'pretend to be' while "Spoof the slave" means 'spoof' as in 'send a fake command'. When put together you 'pretend to be the master then send a fake command' which is covered in a single spoof action.



the exact wording is:
You can spoof the access ID of the master node, and then spoof commands to the slave.

It does not say:
You can spoof the access id fo someone with access to the master node, and spoof commands to the master that will be relayed to the slave.
Go to the top of the page
 
+Quote Post
deek
post Jun 3 2011, 08:22 PM
Post #160


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



QUOTE (sabs @ Jun 3 2011, 02:30 PM) *
No you're completely wrong on this one. Because, if you can only spoof FROM the Master Node, then option 2 doesn't make ANYSENSE WHAT SO EVER.

Lets look at each option:

1) Hack Directly to the slave with a +2 TN modifier, requiring a hardwire line.
2) Hack the Master Node
3) Spoof the Access ID of the Master Node and then spoof commands to the slave.

If you've hacked the Master node, you don't need to spoof anything. You're already there.
When you use Spoof with the ACCESSID you're actually pretending you HAVE the subscription. That's how spoof works.

Remember, the subscriptions are 'virtual' they're in a table somewhere, linking access ID with subscription information. When you spoof the correct AccessID it thinks it's comming from the Master Node.
That's what having the AccessID allows you to do.

You would still need to use spoof if you didn't have a security or admin access on the master node. It kind of goes back to what I was saying. You could hack into the master node as a user and then spoof commands to the slaves. Or, you could create a legitimate account in the master node and just send commands without fear of setting an alarm. Hacking the master node for a security or admin access to begin with is making it more difficult to get in without setting off an alarm.
Go to the top of the page
 
+Quote Post
sabs
post Jun 3 2011, 08:24 PM
Post #161


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



QUOTE (deek @ Jun 3 2011, 09:22 PM) *
You would still need to use spoof if you didn't have a security or admin access on the master node. It kind of goes back to what I was saying. You could hack into the master node as a user and then spoof commands to the slaves. Or, you could create a legitimate account in the master node and just send commands without fear of setting an alarm. Hacking the master node for a security or admin access to begin with is making it more difficult to get in without setting off an alarm.


READ page 55 of the book. It doesn't say any of those things. It says, hard hack the slave, hack the master, or spoof the slave.

You could also user hack the Master, and then use spoof to send commands to the slave.
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 3 2011, 08:25 PM
Post #162


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



QUOTE (deek @ Jun 3 2011, 04:18 PM) *
I see where TJ is going on this. Its kind of like a VPN connection. When the master and slave negotiate the connection, they are authenticating each other and making a secure tunnel between each other and only traffic using that secure tunnel, is valid.

This assumption, I think, is more between the lines then RAW. We can certainly argue both points. TJ is supported by the book saying a slaved node can only accept commands from the master node and the text saying you need access to the master node to send commands to the slave. That "feels" like there is a secure connection between the two that cannot be spoofed.

How is this tunnel created? What prevents another device from sending something that looks like it came from the master? What method of identification above and beyond Access ID that cannot be duplicated is being used to confirm that something actually came from the master and not another source?

Now, I did just realize that for added security, you could encrypt the connection between master and slave, which would then require the encryption to be broken so that the hacker could properly encrypt the spoofed command so that it gets recognized properly by the slave.
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 3 2011, 08:30 PM
Post #163


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



QUOTE (sabs @ Jun 3 2011, 04:20 PM) *
except that VPN is not a slave connection.

VPN is an encrypted connection, which is something completely different.
The way to cockblock spoof, is of course to encrypt your slave connection.

Then you need to:
Sniff the traffic
decrypt the traffic
spoof the AID
encrypt properly
spoof your command using your spoofed aid and the new encryption.

Almost correct, but you don't need to spoof your AID as a separate action, that is part of what spoofing a command does.

QUOTE (sabs @ Jun 3 2011, 04:22 PM) *
the exact wording is:
You can spoof the access ID of the master node, and then spoof commands to the slave.

That doesn't change anything. Just replace 'master' with 'access ID of the master node' and you still get 'pretend to be the access ID of the master and then send a fake command' which is still a single spoof action.
QUOTE
It does not say:
You can spoof the access id fo someone with access to the master node, and spoof commands to the master that will be relayed to the slave.

I never said anything remotely approaching that.
Go to the top of the page
 
+Quote Post
Bigity
post Jun 3 2011, 08:31 PM
Post #164


Shooting Target
****

Group: Members
Posts: 1,840
Joined: 24-July 02
From: Lubbock, TX
Member No.: 3,024



Sometimes, just sometimes, I miss the days when everything in the matrix was very standard, and you had rectangle data stores and hexagon CPUs and little triangle access points (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Bigity
post Jun 3 2011, 08:31 PM
Post #165


Shooting Target
****

Group: Members
Posts: 1,840
Joined: 24-July 02
From: Lubbock, TX
Member No.: 3,024



double post again, freaking internet here is bonkers today.


On a side note, is there a way to delete a post?
Go to the top of the page
 
+Quote Post
sabs
post Jun 3 2011, 08:33 PM
Post #166


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



QUOTE (Ghost_in_the_System @ Jun 3 2011, 09:30 PM) *
Almost correct, but you don't need to spoof your AID as a separate action, that is part of what spoofing a command does.


That doesn't change anything. Just replace 'master' with 'access ID of the master node' and you still get 'pretend to be the access ID of the master and then send a fake command' which is still a single spoof action.

I never said anything remotely approaching that.


Ghost, we're on the same side on this (IMG:style_emoticons/default/smile.gif)

I was talking to Deek and TJ who both DID say that.
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 3 2011, 08:33 PM
Post #167


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



QUOTE (Bigity @ Jun 3 2011, 04:31 PM) *
Sometimes, just sometimes, I miss the days when everything in the matrix was very standard, and you had rectangle data stores and hexagon CPUs and little triangle access points (IMG:style_emoticons/default/smile.gif)

I do admit, having a more abstracted system like that has its advantages, because you don't have people comparing it to real life. It also means somewhat less freedom though, so there is that.
Go to the top of the page
 
+Quote Post
suoq
post Jun 3 2011, 08:41 PM
Post #168


Running Target
***

Group: Members
Posts: 1,272
Joined: 22-June 10
From: Omaha. NE
Member No.: 18,746



I just want to make sure we're down to the following impassible barrier.

Side 1: "Spoof the Access ID of the Master Node" = Spoof the Master Node
Side 2: "Spoof the Access ID of the Master Node" = Get the Access ID of the Master Node

Any other points of contention?
Go to the top of the page
 
+Quote Post
sabs
post Jun 3 2011, 08:42 PM
Post #169


Prime Runner
*******

Group: Members
Posts: 3,996
Joined: 1-June 10
Member No.: 18,649



No you got it in 1 (IMG:style_emoticons/default/smile.gif)

Ghost and I think that #2 is the right interpretation, TJ and Deek think #1 is.
Go to the top of the page
 
+Quote Post
deek
post Jun 3 2011, 08:48 PM
Post #170


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



QUOTE (Ghost_in_the_System @ Jun 3 2011, 03:25 PM) *
How is this tunnel created? What prevents another device from sending something that looks like it came from the master? What method of identification above and beyond Access ID that cannot be duplicated is being used to confirm that something actually came from the master and not another source?

Now, I did just realize that for added security, you could encrypt the connection between master and slave, which would then require the encryption to be broken so that the hacker could properly encrypt the spoofed command so that it gets recognized properly by the slave.

I was just adding some information to support TJ and make a case that it made sense and could be interpreted this way. I would say that the tunnel creation is a part of the slaving a node process. That's all part of the setup and the effects of slaving a node. Obviously, its not spelled out in detail, but some of the wording used in RAW supports that.

I could also see you bypassing the whole thing and taking sabs (I think) point and taking a -6 to your spoof if the target is a slaved node. Then you could send whatever command you want using spoof. Just at a -6 die pool. And, you'd also have to know the master nodes AID, which is easy enough to get. A -6 to spoof is likely not a trivial matter for most.
Go to the top of the page
 
+Quote Post
deek
post Jun 3 2011, 08:52 PM
Post #171


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



I'm not saying either is right actually. But I do agree those are the 2 points of intention.

I can see where TJ is coming from and can read into some of the text to support that. I can also see where Ghost and sabs is coming from.

Personally, I'd prefer my players to feel safer when they slave their comm to the master hacker and not have to worry about being spoofed. That puts the spotlight on the hacker if someone is screwing around with hacking comms. And, I also feel that was the intention of the rules introducing slaving as an option. Not to make anything unhackable, but make it a single point of entry on a assumedly harder target.

PS: I do like the tag team debate going on here. It is rather enjoyable.
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 3 2011, 09:08 PM
Post #172


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



QUOTE (suoq @ Jun 3 2011, 04:41 PM) *
I just want to make sure we're down to the following impassible barrier.

Side 1: "Spoof the Access ID of the Master Node" = Spoof the Master Node
Side 2: "Spoof the Access ID of the Master Node" = Get the Access ID of the Master Node

Any other points of contention?

You need to define spoof in side one, because spoof has two major meanings 1) pretend to be 2) send fake command with fake credentials to. So, to further clerify:

Side 1: "Spoof the Access ID of the Master Node" = Send fake commands to the Master Node
Side 2: "Spoof the Access ID of the Master Node" = Get the Access ID of the Master Node (so that it can be used as part of the "Spoof a Command" action)
Side 3: "Spoof the Access ID of the Master Node" = Use Spoof to make yourself temporarily have the access ID of the Master node (And yet still have to spoof commands instead of sending regular commands)

I'm not entirely sure if TJ is on side 1 or 3 or both. I know that I am firmly in 2 because that is how the rules for spoofing a command work, and nothing in slaving says that spoofing works any differently from normal.

Note: I believe you would suffer the -6 penalty for the spoofing because you are using an admin account.
Go to the top of the page
 
+Quote Post
Bearclaw
post Jun 3 2011, 09:14 PM
Post #173


Shooting Target
****

Group: Members
Posts: 1,632
Joined: 26-February 02
From: Portland Oregon, USA
Member No.: 1,304



QUOTE (Tymeaus Jalynsfein @ Jun 3 2011, 01:08 PM) *
A subscription is a requirement, because a Spoof Command issues a Command, and only subscriptions can support such things according to Unwired.

Subscriptions and Data Requests are two completely different animals. (IMG:style_emoticons/default/wobble.gif)


I think you are misunderstanding what spoofing is.
In Shadowrun, spoofing and hacking are two different things. In real life, of course, spoofing is one of the main tools of a hacker.

When you spoof, you are attempting to convince the recieving node that the sending node is a different node, such as the system that it's slaved to. It already has a subscription.
If you were to have a subscription you would have had to hack it, and there would be no point in spoofing.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jun 3 2011, 09:49 PM
Post #174


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Bearclaw @ Jun 3 2011, 02:14 PM) *
I think you are misunderstanding what spoofing is.
In Shadowrun, spoofing and hacking are two different things. In real life, of course, spoofing is one of the main tools of a hacker.

When you spoof, you are attempting to convince the recieving node that the sending node is a different node, such as the system that it's slaved to. It already has a subscription.
If you were to have a subscription you would have had to hack it, and there would be no point in spoofing.


Again, I am not confused here. I do know that the two tasks are completely different in Shadowrun. You cannot treat both Normal Nodes and Slaved Nodes the same for purposes of Spoof. And the Rules support that. (IMG:style_emoticons/default/wobble.gif)

And Ghost_in_the_System, Essentially Option 3 above (which is exactly what Unwired says). You are creating a temporary access remotely (using the Master Node AID) that will use the Master Node to communicate with the Slaved Node. The reason that this is necessary is because the Slaved node will not accept any other connections except that of the Master Node. You then use this temporary poiont of access (the Spoofed Master Node) to send that Spoofed COmmand to the Slaved Node. It is NOT a Hack, because you are not actually implanting anything on the Master Node at all. You are using its own protocols and subscriptions to gain your own ends.

The reason the Slaved node will not accept commands outside of the Subscription port that is subscribed, is because the Slave will forward ANY other connection attempts right back to the Master node. This is a result of how Subscriptions and Slaving interact. You cannot generate a Command connection without a successful Subscription. Slaved Nodes ONLY accept a such commands through the Subscription that the Master Node has established for itself (as it only needs the one).

Now, functionally, there are ways around that. The 3 discussed routes are the methods established on Page 55 in Unwired. Another possible method, which has been briefly talked about, is to completely disrupt communications in such a way that the subscription is disconnected. Then you can attempt to re-establish the connection using your own hardware and the Spoofed AID of the original Master Node. Thsi will, in theory, work, if you can pull it off. It is harder than you think it is to do so, however.

The only Surefire ways to do so are the 3 ways described in Unwired.

In any case, you should still suffer the -6 penalty to the Spoof attempt upon a Slaved Node becasue you have to do so with Administrative Access.

I continue this debate because, otherwise, Spoofing a Slaved node is no harder than spoofing a non-slaved node, and this is obviously NOT the intent of the rules as presented in Unwired. The Story in the SR4A Book, with Slamm-O! and Netcat, only uses Basic Rules, which does not include Slaving. If they were the same difficulty, then why have slaving at all, as there would be no functional difference?

Anyways... (IMG:style_emoticons/default/wobble.gif)
Go to the top of the page
 
+Quote Post
Ghost_in_the_Sys...
post Jun 3 2011, 09:52 PM
Post #175


Moving Target
**

Group: Members
Posts: 433
Joined: 12-May 11
Member No.: 29,932



QUOTE (Tymeaus Jalynsfein @ Jun 3 2011, 05:49 PM) *
Again, I am not confused here. I do know that the two tasks are completely different in Shadowrun. You cannot treat both Normal Nodes and Slaved Nodes the same for purposes of Spoof. And the Rules support that. (IMG:style_emoticons/default/wobble.gif)

Sure you can. Tell me where it says you can't. Spoofing is not a connection, and does not require a connection, so don't try pulling out the connection thing again (Unless you can also tell me where is says that spoofing is or requires a connection)
Go to the top of the page
 
+Quote Post

10 Pages V  « < 5 6 7 8 9 > » 
Reply to this topicStart new topic

 

RSS Lo-Fi Version Time is now: 18th May 2025 - 11:15 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.