IPB

Welcome Guest ( Log In | Register )

6 Pages V  « < 4 5 6  
Reply to this topicStart new topic
> Another realitybraker, subscription rule kills wireless hacking
kigmatzomat
post Feb 22 2006, 06:44 PM
Post #126


Moving Target
**

Group: Members
Posts: 914
Joined: 26-August 05
From: Louisville, KY (Well, Memphis, IN technically but you won't know where that is.)
Member No.: 7,626



A subscription list is a way to limit who a client device (like a coffee maker) can talk to.
Without a subscription list the device will talk to *anyone.* So you set your coffee maker's subscription list to be your and your roomie's Comms. Why? So you're punk neighbor doesn't change it from double-foam cappucino to triple shot espresso.

The IRL equivalent of a subscription list is a MAC address restriction where the client will only talk to specified devices. And, like in the game, this can be spoofed IRL but you have to do a little checking (aka a matrix perception test) to get the IDs. Subscription lists aren't true security (just like MAC restrictions aren't real security) but they are an easy way to filter out the weenies and reduce traffic so the masses treat it like security.

Runners should have a subscription list on every device they own. Normals... well, how often do people set the security up right on WiFi now? Yeah, that's how often they will use subscription lists; mostly never.
Go to the top of the page
 
+Quote Post
The Jopp
post Feb 23 2006, 07:35 AM
Post #127


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Rotbart van Dainig)
No, it just makes the idea that those nodes are not connected, yet should communicate somehow quite strange. ;)

So what's stopping me from havign my devices communicate in a strange way so that I can have a tiered network as well? If tiered network communicate "in a strange way" then I'm gonna use the same strange way to have my own tiered network to communicate.

The way I understand the rules there are several options with subscriptions lists.

A: Your devices have no connection to another device, they don’t communicate with each other.

B: A subscription list tells what device another device can talk to.

C: Devices are not communicating but one can still access a device with a legal access code, very much like a login code on a computer.

With “A” you don’t have a subscription list, with “B” you have a subscription list and with “C” there is no subscription - list but you have access to the device through legal codes.

No subscription list AT ALL means that they will not have any AUTOMATIC access to another device, there is still nothing stopping you from login into the node legally with a password. The device will not “talk” to another device but it can still be accessed.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Feb 23 2006, 08:35 AM
Post #128


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Connecting to/acessing a device is called subscribing it. ;)

It's a rather bad play of words, but essentially, if there's a connection, there's a connection, which can and will be followed.
Go to the top of the page
 
+Quote Post
The Jopp
post Feb 23 2006, 08:57 AM
Post #129


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Rotbart van Dainig)
Connecting to/acessing a device is called subscribing it. ;)

It's a rather bad play of words, but essentially, if there's a connection, there's a connection, which can and will be followed.

What about password security then? I’m not entirely against what you are saying but there are flaws in that logic. A subscription list is mostly about what devices is allowed to talk to each other, what about one way communications? Hacker Device instead of HackerDevice.

Subscription list is always two-way and that’s where I see a flaw in the rules. If we take it literally then tiered network security is impossible and if we say that the network is designed in some kind of quasimystic way incomprehensible for normal people and/or players that’s limiting the game a lot.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 23 2006, 10:11 AM
Post #130


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE (Rotbart van Dainig @ Feb 23 2006, 03:35 AM)
Connecting to/acessing a device is called subscribing it. ;)

It's a rather bad play of words, but essentially, if there's a connection, there's a connection, which can and will be followed.

Subscribing has another meaning per SR4 rules, as I quoted in my initial post.

Furthermore, in Shadowrun, you always had to hack your way through x nodes (one at a time) while a data package with the right access codes was just relayed through those nodes.
So if the data went through 10 heavily protected nodes, you would have to hack your way through everyone of those.

Hacking just the first and then being relayed never worked in Shadowrun.

It would be interesting to find a solution for that, and tell the SR4 developers to include that change in unwired, to avaoid problems.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Feb 23 2006, 11:36 AM
Post #131


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Serbitar)
Subscribing has another meaning per SR4 rules, as I quoted in my initial post.

It is used in two ways - and that's where the confusion comes from.

QUOTE (Serbitar)
Hacking just the first and then being relayed never worked in Shadowrun.

What a stroke of luck that this isn't what Jopp and I are talking about. ;)

QUOTE (The Jopp)
what about one way communications?

With the current set of rules, those are not specified.

Keep in mind that anything interactive needs a two way communication.
So any device in that chain needs to know how to find (Access ID) it's 'adjoining' devices - putting those in stealth mode may cost a hacker more time to find the chain, but once he is in the chain, he can hack his way through... he could even use part of the chain to scan for the rest and then try to use a shortcut.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 23 2006, 11:48 AM
Post #132


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



I still think that the main issue is to force the hacker to hack through a large number of nodes.
Go to the top of the page
 
+Quote Post
The Jopp
post Feb 23 2006, 12:03 PM
Post #133


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Serbitar)
I still think that the main issue is to force the hacker to hack through a large number of nodes.

Well, for simplicity I’ll go with the INTENT of the SR4 rules.

No subscription= No access unless having the correct code/id/etc

Subscription= Devices talks/gossip/fileshare with each other

Tiered network= No subscription list, only correct ID/backdoor avoids the need for hacking.

Avoiding tiered network: Only possible if within signal range of final destination node (IF it is wireless at all.)

Too much reality and everything will be either too simple or too impossible.

Go to the top of the page
 
+Quote Post

6 Pages V  « < 4 5 6
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 1st February 2026 - 11:34 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.