IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
Nosaji
post Jul 28 2010, 05:49 AM
Post #1


Target
*

Group: Members
Posts: 8
Joined: 5-June 08
Member No.: 16,037



Hi everyone this'll be my first time posting on dumpshock. Nice to meet Everyone (IMG:style_emoticons/default/smile.gif)

I have a question. If I daisy-chain a series of proxy commlinks together using a a fiber-optic cable will this assist in slowing down or stopping an invading hacker from getting to my main comm? What are the ups and downs to doing this?

The idea behind this is that the main commlink is being protected by several layers of proxy commlinks each with a firewall and denfense agents with the last one being public and having wireless transmission that holds all my falsified documentation.

Any thoughts or am I just over complicating things? (IMG:style_emoticons/default/rollin.gif)
Go to the top of the page
 
+Quote Post
Voran
post Jul 28 2010, 06:26 AM
Post #2


Running Target
***

Group: Members
Posts: 1,405
Joined: 23-February 04
From: Honolulu, HI
Member No.: 6,099



Welcome. Mind your fingers and don't feed the inmates. (IMG:style_emoticons/default/smile.gif)

You've touched upon a subject of debate here. In terms of hacking, to get to the 'end node' I would say, sure this adds layers of defense that would have to be passed in order to get to that last node. It would have little to no effect in defending (we'll say you, for this example, as in this is your node/commlink chain), as your telepresence location is considered to be where its at. Example, if you're using this link chain to hack into someone else's node, the number of links you have doesn't matter, all that matters is where your 'matrix form' is located (usually, in this case, its in someone else's node)

I would say there is still a benefit for the chaining though.
Go to the top of the page
 
+Quote Post
KarmaInferno
post Jul 28 2010, 06:30 AM
Post #3


Old Man Jones
********

Group: Dumpshocked
Posts: 4,415
Joined: 26-February 02
From: New York
Member No.: 1,699



Heh, this is the like the fifth time in the past month this has come up.

It will protect somewhat against someone coming IN.

For a simple set-up, throw a high Analyse program in each commlink and have it set to shut off the hardware if it detects an intrusion. You can, of course, get a lot more complicated with layered defenses. In the end, though, it's not so much "stopping" an intruder as "slowing him down".

However! If you are connecting OUT to the Matrix via that commlink daisy chain, and run into some nasty IC or enemy, chaining the commlinks won't do a damn thing to protect you from the attacker. You have an Icon extended out into the Matrix, and that provides the attacker a direct line to your persona.



-karma
Go to the top of the page
 
+Quote Post
Nosaji
post Jul 28 2010, 06:40 AM
Post #4


Target
*

Group: Members
Posts: 8
Joined: 5-June 08
Member No.: 16,037



This is more for protection from hackers trying to get into my primary comlink without my notice and start messing with the data and other stuff inside there.

One of my other concerns is whether or not this daisy-chain configuration will slow down my activities in the matrix assuming that each comm carries similar or better stats to the primary one.
Go to the top of the page
 
+Quote Post
Warlordtheft
post Jul 28 2010, 03:16 PM
Post #5


Neophyte Runner
*****

Group: Members
Posts: 2,328
Joined: 2-April 07
From: The Center of the Universe
Member No.: 11,360



It won't effect going out. Keep in mind that one of the things about the matrix is where your virtual self is.

1. Hacking anothers comm, your vritual self is on his com (the chain of comms has no effect on your matrix capabilities in another node).
2. Defending your main comm, they will have to hack through your wired links first (but they can shut down the first com, so you'd have to activate the wireless node on another commlink in the chain).
3. If all but your main commlink is wireless you only really need 1 other commlink (the rest are not worth it as an intruder is 1 node away from the main commlink).
4. Good encryption is cheaper, and going beyond 3 linked nodes is probably not worth it.
5. Slaving all wireless stuff to the main comlink is a good idea too (Tacnet, otherteams comms, drones, smartlinks, etc,etc).
Go to the top of the page
 
+Quote Post
BobChuck
post Jul 28 2010, 04:59 PM
Post #6


Target
*

Group: Members
Posts: 91
Joined: 6-July 10
Member No.: 18,795



Another thing to remember is that whatever you can do, your GM can do.

That's one of the problems with taking the layering or optimization route; if it's interpreted to work the way some players want to read it, if you use it to protect your gear, then logically anything of significance out there in the corporate world will be set up with the same set of protections, only as large and robust as money can buy.

Putting a fake commlink with a fake SIN and legal stuff on it as your wireless connection and running your main commlink in hidden mode with all your high-tech illegal software and cyberware linked in is almost standard practice, at least among those with significant software.

But the value of going beyond that is a topic of much debate.
Go to the top of the page
 
+Quote Post
Johnny B. Good
post Jul 28 2010, 06:12 PM
Post #7


Moving Target
**

Group: Members
Posts: 219
Joined: 16-November 09
From: United States
Member No.: 17,876



Remember that if you're hacking from your main commlink that you get response degradation for each proxy in use. If you're hacking from a commlink on the outer edge of the chain, then what's the point of layering anyway?
Go to the top of the page
 
+Quote Post
Warlordtheft
post Jul 28 2010, 06:20 PM
Post #8


Neophyte Runner
*****

Group: Members
Posts: 2,328
Joined: 2-April 07
From: The Center of the Universe
Member No.: 11,360



I don't recall the degradation when using the commlinks in this manner. But the advantage in defense is that if the intruder wants to crash your home node he'd have to go through the others. As I recall, the intermediate comlinks in the daisy change funtion like a router (and this is how the wireless matrix works too).
Go to the top of the page
 
+Quote Post
BobChuck
post Jul 28 2010, 07:01 PM
Post #9


Target
*

Group: Members
Posts: 91
Joined: 6-July 10
Member No.: 18,795



As I understand it, most everyone agrees that you can stack one commlink in front, running public, with your main commlink running in hidden. This gives you a basic layer of protection. It's similar on a conceptual level to how routers/gateways/servers work today.

It also seems to be the default assumption for the structure of Matrix nodes - a single door in/out that must be hacked in order to gain access to all the other linked nodes on the network. Secure nodes may not be on that network at all - probably no matrix access - and thus can require an "in the meat" visit.

The main point of debate is whether or not you can put more than one router/server/gateway in place with a single sequential order that forces someont to hack through many levels. Further points ask what the cost is, besides just nuyen, to doing things this way, and why aren't AAA-secure facilities built with this kind of protection.
Go to the top of the page
 
+Quote Post
Doc Chase
post Jul 28 2010, 07:03 PM
Post #10


Runner
******

Group: Members
Posts: 3,179
Joined: 10-June 10
From: St. Louis, UCAS/CAS Border
Member No.: 18,688



Query: Wouldn't daisy-chaining with a fiberop cable connecting all of them sort of defeat the purpose?
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jul 28 2010, 07:06 PM
Post #11


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Apparently, you have to hack through each node. Not sure why. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
suoq
post Jul 28 2010, 07:16 PM
Post #12


Running Target
***

Group: Members
Posts: 1,272
Joined: 22-June 10
From: Omaha. NE
Member No.: 18,746



1) I'd have a ball with glitches on that system. You've added a lot of points of possible failure.

2) If someone does get in and realizes what you have, they're golden. They can drop anything in the middle of that chain and you'll be fighting your own haystack trying to find the needle that's betraying you.

3) I don't know anyone who does a lot of software work who doesn't regularly curse their firewalls (and even more frequently the firewalls of their customer). If you have some new software that you want to use, you're gonna have to get past all those firewalls. The first one is assumed to be taken care of when you install, but the whole point of a firewall is to keep something new from getting through. I can easily see you having to make a lot of rolls when you upgrade or get some new ware.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jul 30 2010, 01:15 AM
Post #13


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Warlordtheft @ Jul 28 2010, 12:20 PM) *
I don't recall the degradation when using the commlinks in this manner. But the advantage in defense is that if the intruder wants to crash your home node he'd have to go through the others. As I recall, the intermediate comlinks in the daisy change funtion like a router (and this is how the wireless matrix works too).



Degradation occurs when you set tyte comlink cahin as Proxy Servers... you would generally not want to do this because of the degradation... A better option is to just chain them, and thus you will have no degradation, it is just another node that you pass through... In this manner, it is also just another node an intruding hacker has to pass through, though you could protect the hell out of them. As a note, this becoems expensive somewhat quickly, so it is probably not something that you would want to do if you are lacking in funds. (IMG:style_emoticons/default/smokin.gif)
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jul 30 2010, 02:41 AM
Post #14


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



On the other hand, it's essentially nothing to most corporations, which means you're never getting in. (IMG:style_emoticons/default/smile.gif)
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jul 30 2010, 02:48 AM
Post #15


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Yerameyahu @ Jul 29 2010, 08:41 PM) *
On the other hand, it's essentially nothing to most corporations, which means you're never getting in. (IMG:style_emoticons/default/smile.gif)


No, it means that getting in is going to take a fair amount of time and expertise, and you will not do it trivially. Not everyone can be FastJack after all... (IMG:style_emoticons/default/smokin.gif)

And yes, Most Corporations will take this route... (IMG:style_emoticons/default/wobble.gif)
Go to the top of the page
 
+Quote Post
Nosaji
post Jul 30 2010, 06:14 AM
Post #16


Target
*

Group: Members
Posts: 8
Joined: 5-June 08
Member No.: 16,037



QUOTE (Tymeaus Jalynsfein @ Jul 29 2010, 05:15 PM) *
Degradation occurs when you set tyte comlink cahin as Proxy Servers... you would generally not want to do this because of the degradation... A better option is to just chain them, and thus you will have no degradation, it is just another node that you pass through... In this manner, it is also just another node an intruding hacker has to pass through, though you could protect the hell out of them. As a note, this becoems expensive somewhat quickly, so it is probably not something that you would want to do if you are lacking in funds. (IMG:style_emoticons/default/smokin.gif)


Thanks for clearing up the rules on degradation (IMG:style_emoticons/default/smile.gif)

For a second there I thought this comlink topography wouldn't be all that useful after reading pg 104


quick question though. If all the nodes are protected by firewalls does this also help in slowing down an invading hacker without slowing down my response?
Go to the top of the page
 
+Quote Post
Nosaji
post Jul 30 2010, 06:14 AM
Post #17


Target
*

Group: Members
Posts: 8
Joined: 5-June 08
Member No.: 16,037



double post sry bout that (IMG:style_emoticons/default/frown.gif)
Go to the top of the page
 
+Quote Post
suoq
post Jul 30 2010, 12:41 PM
Post #18


Running Target
***

Group: Members
Posts: 1,272
Joined: 22-June 10
From: Omaha. NE
Member No.: 18,746



QUOTE (Nosaji @ Jul 30 2010, 01:14 AM) *
If all the nodes are protected by firewalls does this also help in slowing down an invading hacker without slowing down my response?

Are you running anything on those nodes besides firewalls? Are you running Encryption, Analyze, and an Agent? Are you running them at level 3 or at a level that's going to detect a serious threat and alert you? Are you spending enough cash to give those agents the response and system to depend themselves or are you expecting them to alert and delay you while you log out and unplug the commlink. (And then what? Do you manually check all those commlinks before plugging in again?)

I'm trying to figure out what you're planning on doing. Either you have a lot of daisy chained Sony Emperors that can be hacked on the fly by an agent program while the hacker is busy elsewhere or you have a very expensive collection of high response and system comlinks (with NO signal rating) running expensive software. If you actually price out the system, you could then test the difficulty of hacking it.
Go to the top of the page
 
+Quote Post
Eratosthenes
post Jul 30 2010, 05:43 PM
Post #19


Moving Target
**

Group: Members
Posts: 356
Joined: 3-April 10
Member No.: 18,409



Expense is the biggest drawback, as suoq said. All it will really do is delay the dedicated hacker: instead of doing one probe, they have to do three (if there are three chained commlinks). It is far more economical to just use Strong Encryption (changed regularly, be it weekly or monthly) on the hidden node that is your main commlink, with perhaps a cheap decoy commlink for public use.
Go to the top of the page
 
+Quote Post
Nosaji
post Jul 30 2010, 07:04 PM
Post #20


Target
*

Group: Members
Posts: 8
Joined: 5-June 08
Member No.: 16,037



QUOTE (suoq @ Jul 30 2010, 05:41 AM) *
Are you running anything on those nodes besides firewalls? Are you running Encryption, Analyze, and an Agent? Are you running them at level 3 or at a level that's going to detect a serious threat and alert you? Are you spending enough cash to give those agents the response and system to depend themselves or are you expecting them to alert and delay you while you log out and unplug the commlink. (And then what? Do you manually check all those commlinks before plugging in again?)

I'm trying to figure out what you're planning on doing. Either you have a lot of daisy chained Sony Emperors that can be hacked on the fly by an agent program while the hacker is busy elsewhere or you have a very expensive collection of high response and system comlinks (with NO signal rating) running expensive software. If you actually price out the system, you could then test the difficulty of hacking it.


I think I'm going for the high system & response comlinks with defense software & agents running on it but I'm likely going to keep it to a maximum of 3 or 4 total comms which includes the transmitting wireless comm.
Go to the top of the page
 
+Quote Post
KarmaInferno
post Jul 30 2010, 07:41 PM
Post #21


Old Man Jones
********

Group: Dumpshocked
Posts: 4,415
Joined: 26-February 02
From: New York
Member No.: 1,699



QUOTE (Eratosthenes @ Jul 30 2010, 12:43 PM) *
Expense is the biggest drawback, as suoq said. All it will really do is delay the dedicated hacker: instead of doing one probe, they have to do three (if there are three chained commlinks). It is far more economical to just use Strong Encryption (changed regularly, be it weekly or monthly) on the hidden node that is your main commlink, with perhaps a cheap decoy commlink for public use.


Eh. "Too expensive" can be a problem, but "Not Paranoid Enough" can be a bigger problem.

Do all of it. Layered nodes WITH strong encryption and decoys.

You can always adjust your spending habits to budget for a big purchase. Adjusting anything is much harder if you are dead because decided to be cheap on your security.

(IMG:style_emoticons/default/smile.gif)



-karma

Go to the top of the page
 
+Quote Post
Yerameyahu
post Jul 30 2010, 07:53 PM
Post #22


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



And for basically any corporation (not just the big boys), the money that would cost is trivial.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post Jul 30 2010, 11:10 PM
Post #23


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Yerameyahu @ Jul 30 2010, 12:53 PM) *
And for basically any corporation (not just the big boys), the money that would cost is trivial.


You keep saying that like the Corporations are not doing this already... they are...

When is the last time you hacked a Corporate System and it consisted of only a single Node? I would be willing to bet that you can't tell me, as a single node system is ludicrous for something as large as a Corporation, let alone a Mega. (IMG:style_emoticons/default/wobble.gif)
Go to the top of the page
 
+Quote Post
IceKatze
post Jul 30 2010, 11:56 PM
Post #24


Moving Target
**

Group: Members
Posts: 325
Joined: 18-January 09
From: Middle of Nowhere
Member No.: 16,788



hi hi

I don't know if I have any particularly useful advice. After my character got her cybereyes hacked I decided to actually lay out my commlink defense topography.

This is what I came up with.

Perhaps it will give you some ideas.
Go to the top of the page
 
+Quote Post
Yerameyahu
post Jul 31 2010, 03:01 AM
Post #25


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



No, Tymeaus, I mean that any corp could easily have *hundreds* of layers, to the point that any hacking takes longer than physically rerouting the network; that is, literally unhackable. The ZO is only listed as having like 16, so no, I think it's right to say that no one is doing this.
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 

RSS Lo-Fi Version Time is now: 7th July 2025 - 07:50 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.