IPB

Welcome Guest ( Log In | Register )

6 Pages V  < 1 2 3 4 5 > »   
Reply to this topicStart new topic
> Another realitybraker, subscription rule kills wireless hacking
Rotbart van Dain...
post Feb 18 2006, 01:23 PM
Post #51


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Serbitar)
That would make everything, even a smartlink and contact lenses a full blown node.
Doesnt sound so good.

Sorry, but I don't care what you think that sounds like - that's exactly what the rules say.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 18 2006, 01:52 PM
Post #52


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



The rules also say, that any tests are made using the riggers own attributes when jumped into a drone.

Do you resist damage to a drone with the body attribute of the rigger, because that's exactly what the rules say ?

Think first, then use the rules.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Feb 18 2006, 02:46 PM
Post #53


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Double Post.
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Feb 18 2006, 02:49 PM
Post #54


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



QUOTE (Serbitar)
Think first

Exactly.

That sentence is already restricted some paragraphs later.

On the other hand, the very basic design concept of the matrix is not something to be dismissed as loose wording.
Go to the top of the page
 
+Quote Post
mfb
post Feb 18 2006, 04:31 PM
Post #55


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



QUOTE (Serbitar)
Skip the rule. PAN devices with a rating of 0 are already more then enough protected by their very short broadcasting length and possible skinlink solutions.

untrue. the whole point of the mesh network setup is that it doesn't matter how low the signal rating on a given device is, as long as that device is within transmission range of another device. i might be outside the wirless range of your smartlink, but i can hop to your smartlink over the Matrix.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 18 2006, 05:20 PM
Post #56


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



There has to be a 2 way connection over the mesh network. If a hacker can reach the smartlink over the mesh via another node, he still cant hack the smartlink, because the smartlink can not talk back if the node is not within 3 meters range.

This stays true und aller circumstances if they havent severely changed physics till 2070.
Go to the top of the page
 
+Quote Post
mfb
post Feb 18 2006, 05:35 PM
Post #57


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



lemme give you an example:

you're a streetsam with a wireless smartlink. you're standing at a crosswalk in a crowd of people, most or all of them with commlinks. i'm a hacker a block away, outside the range of your smartlink's wireless link. i pick one of the bystanders at random, hack into their commlink. their commlink is within range of your smartlink, so i can now hack your smartlink.

the way the mesh network is explained, i actually shouldn't have to hack anyone at all--your smartlink's wireless signal should be automatically repeated by any node that recieves it, and i'd just have to search for the smartlink's identifier from anywhere on the Matrix. that's insane, though--information overload, i don't care how much infinite memory there is floating around.
Go to the top of the page
 
+Quote Post
Aku
post Feb 18 2006, 05:39 PM
Post #58


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



which, ofcourse, as it seems prevelent, the two of them aren't "talking" with each other, so your commlink doesnt know your smartlink exists.

This is something i hope the "wired" book covers, exactly what sort of communications occur between what devices. As far as i can understand right now, the smartlink does all of the calculations for firing, and puts a target in your FoV, so it only needs to be linked to your vision method (contacts, cyber eyes, etc)
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 18 2006, 06:23 PM
Post #59


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



QUOTE

you're a streetsam with a wireless smartlink. you're standing at a crosswalk in a crowd of people, most or all of them with commlinks. i'm a hacker a block away, outside the range of your smartlink's wireless link. i pick one of the bystanders at random, hack into their commlink. their commlink is within range of your smartlink, so i can now hack your smartlink.


Thats perfectly acceptable.

QUOTE

the way the mesh network is explained, i actually shouldn't have to hack anyone at all--your smartlink's wireless signal should be automatically repeated by any node that recieves it, and i'd just have to search for the smartlink's identifier from anywhere on the Matrix. that's insane, though--information overload, i don't care how much infinite memory there is floating around.

That is the case when every single piece of equipment funtions as a full blown server node. This could be the case, but is extremely unpracticable.
At least to my understanding, everything above comlink level is part of the real "everything is a server" mesh network. Comlinks and devices beyond function only as clients, that do not relay traffic not directed to them.
This is personal opinion of course. But everything else would lead to extreme security problems.
Go to the top of the page
 
+Quote Post
hobgoblin
post Feb 18 2006, 11:36 PM
Post #60


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



i suspect that only comlinks and stronger actualy register as a node.

ie, every wireless device transmitt their "class", either node or device.

node traffic is normaly repeated (if the node that picks up the transmission either have a direct connection to the node its addressed to, or know of a node that can bring it closer to it), device traffic is not.

most likely the MSP providers run a number of high signal rating nodes (in the area they provide their services) that can be used to get a transmission around the world.

hell, im starting to wonder if the talk about using spoof to hijack a device is just people reading to much into the programs abilitys.

i would suspect that you allways need to go thru a comlink to highjack a device unless its not subscribed (or as i wonder about calling it, paired) with a comlink.

basicly a device have two settings. subscribed/paired, and standby. if its paired it only talkes to the comlink its paired to, in standby it waits for a pairing command and nothing else.

i fear that the unwired book will have to be about as thick as the SR4 main to realy cover all aspects of the wireless matrix.
Go to the top of the page
 
+Quote Post
mfb
post Feb 19 2006, 03:54 AM
Post #61


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



QUOTE (hobgoblin)
hell, im starting to wonder if the talk about using spoof to hijack a device is just people reading to much into the programs abilitys.

for the sake of realism (hiss! it burnsss us!), i'd allow it. subscribing a device to your commlink is nothing more than setting up a password for the device--to send commands to the device, you have to use the password. it's just another level of encryption, and it should be able to be broken just like all the other encryption in SR.
Go to the top of the page
 
+Quote Post
FrankTrollman
post Feb 19 2006, 05:18 AM
Post #62


Prime Runner
*******

Group: Banned
Posts: 3,732
Joined: 1-September 05
From: Prague, Czech Republic
Member No.: 7,665



QUOTE (Serbitar)
AND this means that the subscriber rule doesnt actually do anything. You can still hack every device.


No and yes. You can still hack every device, but the subscriber rule still does things. A subscribed device will only accept input from a single Access ID. Spoof can allow you to replicate a different Access ID. So to Hack a subscribed device you have to Spoof the Access ID of whatever it is subscribed to, then you have to actually hack into the device (using Exploit).

The subscribed device loses a little bit of functionality (you can't give it instructions or request information from another Commlink even if it's really you and you have the correct password and encryption key and everything), and gain a little bit of security (a would-be Hacker needs to successfully Spoof your real Commlink's adress before they can Haxxor you). It's like running an extra layer of Encryption on your signals - you lose the ability to interact with your device from remote networks that aren't running your home software suite (that has your encryption scheme on it), and a Hacker needs to Decrypt your network before they can get anywhere with it.

:shrug:

Some people are willing to go the extra level of hassle for the extra layer of protection, some people are not. Immunity to the malicious is at no time gained, just like in the real world.

-Frank
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Feb 19 2006, 10:28 AM
Post #63


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



The major point about slave subscriptions is that any attacker has to go through Electronic Warfare first (or the Chokepoint).

As that costs additional time, it increases security quite a bit against professionals, and mostly will be untouchable by script kiddies.
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 19 2006, 12:17 PM
Post #64


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



The reasoning is OK, but I have two problems with this:

You have to think alot about this issue. Most of the time when you really have to think alot about how something works ruleswise, there is a good chance that the game designers did not inted it to work at all, or in the way you figured out.

It makes gameplay much more complex. The philosophy of the matrix system in SR4 is: Hack everything with only a small number of dice rolls, to keep things simple and fast. Thats why almost everything is wireless, so that it can be hacked directly without going through a lot of security. I think it is OK for security facilities, who go through the pain of actually using wired links, to take more time to be hacked, but not for everything else. Form a GM point of view I don't want a rule that, for realism reasons, forces me to alter the security setup of security aware people (like Mr. Johnson, drohne networks) in a way, that makes hacking more complex and time consuming.

The drone is the perfect example. Using the subscriber rule here, almost doubles the amount of needed dice rolls.

Subscription is perfectly acceptable from a realism point of view (as it is already used today by only allowing certain MAC addresses in a wireless network), but I think such measures should be included in the abstract firewall rating, and thus be defeated by normal hacking rules.

After including the spoofing rule to defeat subscription, both vaariants, seem consistent with the game world, and it comes down to personal taste (as I consider the spoofing rule a kind of house rule as you have to do a lot of interpreatation to get to that point).
Go to the top of the page
 
+Quote Post
mintcar
post Feb 19 2006, 12:25 PM
Post #65


Karma Police
***

Group: Dumpshocked
Posts: 1,358
Joined: 22-July 04
From: Gothenburg, SE
Member No.: 6,505



That's something I could agree with. Most of the time when something has to be hacked fast, you could just say that the device is not subscribed, though. The rules are so simple I might actually want to have the possibility as a GM to increase the number of steps needed. But if a more important device needs to be hacked, and I want it to be done with a minimal number of dice rolls for some reason, I'm going to just increase the threshold and resolve it normaly.
Go to the top of the page
 
+Quote Post
Aku
post Feb 19 2006, 12:37 PM
Post #66


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



the easiest way to garuntee something can be hacked quickly, is to make it wireless. Make some LazyJeo netowrking wageslaveinstall the node and have him plob it into wireless mode "just for today" because he wants to get home to see the urban brawl game tonight.

The biggest problem i have with the wireless section, is rules stuff vs. fluff stuff. The rules, pretty much say that everything is wireless. The fluff says that pretty much everyone thats an idiot (joe wage slave) is wireless, but hey, those coprs that know security still use wires!

oh, and the fluff says that wireless has taken over the world! but the rules say it's not quite there yet, and a large portion of the world still has some wireless connectivity issues. <grumble>
Go to the top of the page
 
+Quote Post
Serbitar
post Feb 19 2006, 12:44 PM
Post #67


Running Target
***

Group: Members
Posts: 1,498
Joined: 4-August 05
From: ADL
Member No.: 7,534



@mintcar
That is, of course, an option, but I at least try to be an objective GM and not tailor the different situations to how I want it to work ruleswise.
Id rather tailor the world and overall rules to my needs and then be as consistent as possible, as I think that especially in SR where the players are kind of competing against the game world, this game world has to be consistent and with objective rules, to allow for planning.
(how many dice rolls do I want this to take and tailor the situation (whether something is subscribed) accordingly vs. how is the situation (would this device be subscribed in a consistent game world?) and thus the relevant number of dice rolls)
Go to the top of the page
 
+Quote Post
mintcar
post Feb 19 2006, 12:47 PM
Post #68


Karma Police
***

Group: Dumpshocked
Posts: 1,358
Joined: 22-July 04
From: Gothenburg, SE
Member No.: 6,505



To each his own, Serbitar. :)
Go to the top of the page
 
+Quote Post
mfb
post Feb 19 2006, 05:55 PM
Post #69


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



i dunno, maybe i'm missing something. hacking a subscribed device seems pretty simple--you just spoof a command at it, and it takes the action you want it to take, right? you don't have to actually take over the device, just send it fake commands.
Go to the top of the page
 
+Quote Post
mintcar
post Feb 19 2006, 06:33 PM
Post #70


Karma Police
***

Group: Dumpshocked
Posts: 1,358
Joined: 22-July 04
From: Gothenburg, SE
Member No.: 6,505



mfb: The way I understand it, you have to know the Access ID of the controlling node or network. That at least provides some extra complications for a hacker, as he has to find out who controls the device and then make a matrix perception test against the persona of that node.
Go to the top of the page
 
+Quote Post
mfb
post Feb 19 2006, 06:41 PM
Post #71


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



well, yeah. but still, Matrix perception test, and then a spoof whenever you want to mess with the guy? i can't imagine tripping over my dice during that. of course, i enjoy SR3 decking and rigging, so my opinions on complexity might be... off.
Go to the top of the page
 
+Quote Post
Brahm
post Feb 19 2006, 06:43 PM
Post #72


Shooting Target
****

Group: Members
Posts: 1,635
Joined: 27-November 05
Member No.: 8,006



QUOTE (mintcar)
mfb: The way I understand it, you have to know the Access ID of the controlling node or network. That at least provides some extra complications for a hacker, as he has to find out who controls the device and then make a matrix perception test against the persona of that node.

Don't you also need to Decrypt if the connection between the controlling node and the device was originally created using Encrypt?
Go to the top of the page
 
+Quote Post
mfb
post Feb 19 2006, 06:48 PM
Post #73


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



yeah, i forgot about that because it's crazy. crazy things slip my mind. the reason it's crazy: subscribing a device to only accept commands from your commlink is just a form of encryption. you'd just be encrypting encryption, which in real life doesn't add much complexity to the overall task of decrypting it. i, personally, would not allow such connections to be encrypted for this reason. encrypt or subscribe, one or the other.

but, yes, by the rules, you'd also need to decrypt it before commanding it--but you'd only have to do it once, not every time you wanted to spoof the device.
Go to the top of the page
 
+Quote Post
Brahm
post Feb 19 2006, 06:55 PM
Post #74


Shooting Target
****

Group: Members
Posts: 1,635
Joined: 27-November 05
Member No.: 8,006



QUOTE (mfb @ Feb 19 2006, 01:48 PM)
yeah, i forgot about that because it's crazy. crazy things slip my mind. the reason it's crazy: subscribing a device to only accept commands from your commlink is just a form of encryption. you'd just be encrypting encryption, which in real life doesn't add much complexity to the overall task of decrypting it. i, personally, would not allow such connections to be encrypted for this reason. encrypt or subscribe, one or the other.

but, yes, by the rules, you'd also need to decrypt it before commanding it--but you'd only have to do it once, not every time you wanted to spoof the device.

:(

When you make a Man In The Middle attack you need to know where the commands are originating from, and you need to know the information that is being expected or will be sent. This is why HTTPS exists, it attempts to hide the information even when someone knows where both ends of the conversation are and is listening in or even trying to alter the data stream. The encryption is another unknown to be discovered, but it isn't nessasarily the same thing as the addresses of both ends.
Go to the top of the page
 
+Quote Post
mfb
post Feb 19 2006, 07:03 PM
Post #75


Immortal Elf
**********

Group: Members
Posts: 11,410
Joined: 1-October 03
From: Pittsburgh
Member No.: 5,670



hm, okay. wasn't thinking of it that way, but that makes more sense. consider my assertions of craziness rescinded.

so, yeah. perception (once), decrypt (once), spoof (until you get tired of their horrified screams as you force them to perform acts that God did not intend to be physically possible). untough, in my opinion.
Go to the top of the page
 
+Quote Post

6 Pages V  < 1 2 3 4 5 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 3rd February 2026 - 03:49 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.