![]() ![]() |
Apr 17 2007, 11:30 AM
Post
#26
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
I think you understand it perfectly, except the password part. Check out page 215 for Passcodes (Authorized Access), that explains a lot of my reasoning. You can have public nodes (webpages/forums) that requires passwords to enter and that means that some nodes MUST be hacked unless you have the correct passcode.
Exploit and hacking is needed to get through and that was the main point, to buy time because you must start hacking a lot earlier, in a node designed for intrusion defense where you have multiple agents/IC that runs constant Analyze tests for just that event instead of the node you WANT to hack. Its main strength is that you cannot HACK the main commlink directly. SR4 requires you to have access to the Node in order to hack it and unless it has its own signal you must be inside the node that provides it with a matrix connection. In order to reach the first Node you must get through the router (commlink 2) Yes, it allows data traffic from the main commlink but also ONLY for that commcode. Any other Commcode, persona, icon or agent needs a passcode to get inside, and the main commlink must verify it with another code. Once that commlink HAS been hacked it’s no biggie to hack the second one – but it requires a second hacking test. Oh, just thought on something else, these are the layers of defense in this case: Hidden Signal Encrypted Signal Linked Password (Legal Access to B) Commlink B Password (Legal Access to A) Commlink A The above buys time and increases the risk for someone trying to hack from B to A getting caught. References: Network Security (Page 223 SR4) Hacking and Accounts (Page 221 SR4) Authorized Access (Page 215 SR4) |
|
|
|
Apr 17 2007, 04:28 PM
Post
#27
|
|||||
|
Moving Target ![]() ![]() Group: Members Posts: 239 Joined: 21-August 05 Member No.: 7,586 |
u can take an example from reallife: if a hacker attacks your Computer some firewalls offer the option to diplay the hackers id. However this id is an ip of the hackers ISP, in order to identify the hacker u have to ask the service provider to tell you who had this ip at the time of the attack, or you hack the ISP Server. Same goes for comlinks, do not assume that everybodys comlink is a router for everybody elses comlink, that would be to much traffic for any wireless device , dedicated satellites excluded. Wireless comunication requires a wired infrastructure like cellular phones do today. This infrastrcture includes Server (hosts) that forward the requests to the net (basically other servers) and will also forward the results of your request back to your computer (comlink). A command or code and even an attack is such a request. The big difference between a comlink and a host is that a host is basically a server (it serves information), which is why u can hack it from the net, a comlink however does not serve information to the net, so in order to hack it u would either hack its ISP first to get to it, or you attack it directly by intercepting and spoofing its wireless signals with next infrastructure antenna.
i hope this clears it up. |
||||
|
|
|||||
Apr 17 2007, 09:32 PM
Post
#28
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 |
right... so what you're saying is that i can buy myself some RFID tags (1 nuyen per 20) a firewall program (rating 6, of course) for 3,000 nuyen, and use an encrypt program (we'll assume rating 5 for chargen, so 500 nuyen) on all of those RFID tags... oh, and add in the cost of some fiberoptic cable (however much it is, i doubt that it's much more expensive than, say, myomeric cable... 20 nuyen per meter...)
the result? anyone who wants to hack my commlink has to go through some stupidly large number of encrypted firewall 6 RFIDs (i assume device rating of 1 otherwise... arguably, stealth and security tags should be higher). heck, why not run an analyse program on it to increase it's dicepool... not that it matters. the important thing is that you're eventually going to glitch or critically glitch, no matter how big your dice pool is, because i can make you hack into 500 nodes before you get into my actual commlink. and sooner or later, if i set up enough nodes, you'll get detected. it will happen at some point or another. of course, on the other hand, no company, no matter how much of a cheapskate they are, is going to have anything less defending their nodes... i mean, it's costing *maybe* as much as 300 nuyen for some crazy impenetrable defense hardware, and the software can conveniently be copied as much as they like. even if they don't own a legitimate master copy, you can bet there are matrix security companies offering their services who will... so you can forget about hacking anything, pretty much, because it just isn't going to happen. |
|
|
|
Apr 17 2007, 09:34 PM
Post
#29
|
|
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
That's correct. See the black box on p. 223.
|
|
|
|
Apr 17 2007, 09:49 PM
Post
#30
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 239 Joined: 21-August 05 Member No.: 7,586 |
Wrong, RFID are powered by wireless, they are offline without it, secondly you would have to hardwire them, which should prove quite challenging, since it is a closed circuit with microscopic (possibly nanoscopic) scale.
|
|
|
|
Apr 17 2007, 09:54 PM
Post
#31
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
Sure, I see how you're explaining it now. I usually sit ont he LTG or on the matrix gateway outside the host waiting for intruders like a bouncer outside his nightclub but sure, you could have a second host and then require a passcode/passkey/exploit test to gain access. Of course, once you auithenticate you're immune to being detected as an intruder unless additional monitoring/measures are taken. If you hack in as Security access or Admin access you just create a legit account, backdate its creation, and then log out of the exploited access and log in using legit access. Then you're no longer in danger of being discovered in that node and can even dump the sprites in the other node by killing its matrix connection. I dont see a huge advantage but I'll concede that it's valid according to RAW.
In the end it makes an intruder no less able to screw the contents up and makes the defenders have to spread out more. If access were ALWAYS challenged for authentication at a chokepoint the delay created might make for good detection but as you describe it I'm not so convinced it'd be a deterrant to a hacker or even do more than slow them down a tad. Heck, take over the first (outer) node and then use it to determine all the passcodes coming in so you gather them all up. I wonder how many folks use the same passcode in multiple nodes. For that matter gather up the biometric signals and reproduce their retinal/finger prints by uploading them from saved copies as often as you like. At worst you might have to edit them in to bypass temp sensors on palm readers, etc. |
|
|
|
Apr 17 2007, 10:02 PM
Post
#32
|
|||
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
That is a minor detail, as this example can be replicated with other kind of cheap appliances. Keep in mind that you could also simply order such a setup. |
||
|
|
|||
Apr 17 2007, 10:08 PM
Post
#33
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
What sort of Build/Repair roll is necessary for a homemade, hardwired RFID that already costs less than a small fry at McSoyShack? Maybe 2 hits? :-)
|
|
|
|
Apr 17 2007, 10:49 PM
Post
#34
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 239 Joined: 21-August 05 Member No.: 7,586 |
I was just pointing out that RFIDs are a poor example.
Wasabi: Just one example, hacker A pissed off hacker B in the matrix, so hacker B tries to locate his meat to send over his pals. he succeeds until he reaches the host of hacker As ISP. In order to triangulate hacker A he has to hack into the ISP for security rights (+3). The big problem is that it is a F**CKING ISP host, meaning it will be controlled pretty good, because ISPs know that there are hackers and in fact these are what they dislike the most. Once hacker B has succeeded he can try to hack hacker As commlink. Chaining commlinks will not stop other hackers but will slow them down and increase the chance that they fail. Chaining should be capped by response though. Another problem i find much more disturbing is layered encryption. The setup: H:Hacker D:drone commlink HA: encryption A wired to commlink HB: encryption B connects wireless to commlink DB: decryption B wired to commlink DA: decryption A normaly u just juggle the encrypted code around until it makes sense, which wont work here because code B never makes sense because it is still encrypted... so while normal decryption takes "encryption rating x 2, 1 Combat turn) to break this encryption i would suggest "encryption rating x 2², 1 Combat turn). |
|
|
|
Apr 17 2007, 10:52 PM
Post
#35
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 171 Joined: 5-February 05 Member No.: 7,053 |
In order to hack my commlink, first you must hack.... Every single one of these toasters I am carrying! Ahahaha!
Incidentally, they also give some impact armour. And wonderful mid-fight snacking opportunities. Seriously, guys, stop and think for a moment what this will do to the game. Jopp, you're describing a very specific two-commlink setup, but the rules you're claiming for it cover a million RFID tags or a bandolier of kitchen appliances just as easily. My experience is that, when the proverbial excreta impacts with the ventilation, players start looking for an edge. Maybe he'll want to route his hax through another comm, then after the dust has settled, what motivation has he got to go back to two? Three? Four? Unhackable hackers versus unhackable corporate facilities? Millions of nodes to game with? Do you actually want to do this? |
|
|
|
Apr 17 2007, 11:03 PM
Post
#36
|
|||||||||
|
Moving Target ![]() ![]() Group: Members Posts: 615 Joined: 26-February 02 Member No.: 1,895 |
Reposted since it seems not to be read. The FAQ makes this pretty clear. 1) 'subscribing' is not granting you any persmissions. It is establishing a connection.
2) By the basic rules is something is on the matrix it is 'on the matrix'. It is either Isolated 'totally seperate' or you can access it directly.
3) To continue this line. Chaining doesn't help. If a node (doesn't specify wireless/wired/or meta-magic-mumbo-jumbo-techno-crypticed) is connected it can be reached, without having to go through intermediary nodes. You do so by 'pretending' to be a legitimate user. Pwnzyou is not attempting to access your Commlink, rather it appears as if Zurich-Orbital Refund Department is attempting to access your commlink.
You may not like it (I have some problems with it). You may think it really couldnt work like that in a 'real' world; however, until Unwired comes out, by RAW that is the rules. Peace |
||||||||
|
|
|||||||||
Apr 17 2007, 11:11 PM
Post
#37
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
Although it could be house ruled differently using a Trace program does indeed get you the physical jackpoint of the victim. ["Track Action", BBB p219]
The largest vulnerability of a multihost/chained system is locating an intruder. They needn't go to the end of the chain to decrypt. They just have a dozen agents spread through the first three nodes taking as long as they like to decrypt the datastream while the hacker flies cover. If an inner node is being a problem and you have admin rights on a outer node, simply invalidate the other passcodes and let the owner hack his own node. Then as soon he does, manually set off an alarm. Hack his node, initate a reboot, log off, and let him spend his time not taking dumpshock. Multi-node schemes are colorful but not "all that and a bag of chips". |
|
|
|
Apr 17 2007, 11:55 PM
Post
#38
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 239 Joined: 21-August 05 Member No.: 7,586 |
I think it is save to assume that subscription is only necessary for wireless connected devices. Reallife example: your mobile phones bluetooth headset needs to be subscribed to your phone, while your cable headset does not.
Narmio: go ahead with your toasters, just make sure the power cable is long enough.. :rotfl: But seriously if a GM allows chaining and i see no reason not to, he should also cap it. Wasabi: i dont understand what you mean.. mind to elaborate? |
|
|
|
Apr 17 2007, 11:57 PM
Post
#39
|
|||
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
Won't somebody please think of the children? |
||
|
|
|||
Apr 18 2007, 12:29 AM
Post
#40
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
maeel:
What I'm saying is that if an intruder wants to listen in he can do it anywhere along the 'pipe' and the 'pipe's length aids the intruder. |
|
|
|
Apr 18 2007, 01:17 AM
Post
#41
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 239 Joined: 21-August 05 Member No.: 7,586 |
Ok, i think i know what you mean, keep in mind my example only applies to connections between two identical chains.
The point i was trying to make is that multilayered encryption poses a much bigger problem in game terms than chaining does. Theoretically you could simply run two encryption programs on one commlink. The time to decrypt does not increase linear with the layers of encryption, but possibly exponentialy if not worse. if allowed by the GM this has to capped (system? response?) |
|
|
|
Apr 18 2007, 01:36 AM
Post
#42
|
|
|
Running Target ![]() ![]() ![]() Group: Members Posts: 1,251 Joined: 11-September 04 From: GA Member No.: 6,651 |
A hacker is limited in how many programs can be loaded at once but a TM isn't limited on how many Complex Forms he can load at once. ACK!
|
|
|
|
Apr 18 2007, 01:58 AM
Post
#43
|
|
|
Moving Target ![]() ![]() Group: Members Posts: 239 Joined: 21-August 05 Member No.: 7,586 |
A TM could compile a sprite to use its hash power...
|
|
|
|
Apr 18 2007, 07:00 AM
Post
#44
|
|||
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
I agree, it isn’t THAT much of an advantage but since a hacker is limited by his response regarding active programs you can load beef up the commlink with higher defenses by using more agents without dropping the response. A Response 5 Commlink can have 9 active rating 4 programs, and since agents are limited to 4 it’s a good number to use. So my regular setup is the following: Rating 6 Firewall Encryption (Signal) (If they try to hack the signal) Encryption (Device) (Must decrypt before hacking) Databomb (Device) (Must defuse before hacking) Analyze (Around the clock surveillance) Agent 1 Agent 1 Analyze (Counts as an active program by FAQ when agent uses it) Agent 2 Agent 2 Analyze Agent 3 (on standby and will start Analyzing and report to user if Databomb is disabled) It’s not über but it is above professional rating of a by-the-book hacker (rating 3) That means that I can run a hacking setup with 9 programs not dedicated for defensive measures like above. Ok, lots will say that this is no good hacker with “only” rating 4 programs and no rating 6 whatnot but I don’t really care since the hacker got the skills for the job and above average hardware. |
||
|
|
|||
Apr 18 2007, 07:20 AM
Post
#45
|
|||||
|
Moving Target ![]() ![]() Group: Members Posts: 171 Joined: 5-February 05 Member No.: 7,053 |
Children? Perfect! A whole line of them, all with implanted commlinks and a skinlink unit, all holding hands, with a hacker at the end. In order to stop me, you must first hack Mrs Mugwirth's first grade class! But thanks to the FAQ-poster. That line about "if it's on the matrix, it's on the matrix" is always how I've run it. |
||||
|
|
|||||
Apr 18 2007, 07:39 AM
Post
#46
|
|||
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
I do agree to that in a sense but in regards to nodes, especially wired nodes it all comes down to the fact that you DO have to hack those you do not have access to. Why on earth would corporations have tiered networks otherwise if the hacker can just go directly to the source and ignore all the security hosts/nodes that are supposed to stand before it. It would be like teleporting directly into fort knox to open the big safe (node 4) and ignore the huge fence with guards surrounding it (node 1) the locked gate to the building with two huge dogs (node 2) and finally the guardroom that stands between the gate and the vault door (node 3). NOTHING is “on” the matrix, it’s all on nodes as the matrix is built on nodes, there is no supernode that stores all the matrix. It can be wired or it can be wireless and IF you can find the signal to a wireless node, sure, you can hack it directly, otherwise you have to take the long route. The main reason no-one sits with X amounts of beefed up nodes is the hassle of passcodes, clearances, networking problems and not to mention support staff for all those nodes. Sure, a hacker COULD be the commlink carrier OF DOOM and have them all connected but it would be too much hassle. Sure, he would be defended from attack but so what, there are TONS of things a node that is being hacked can do, and will do instead of hunting down a hacker. The only reason for sitting with it if he/she is paranoid of getting his Commlink hacked as it will not stop his persona getting attacked, his drones/agents spoofed or signal tapped. |
||
|
|
|||
Apr 18 2007, 11:36 AM
Post
#47
|
|
|
Great Dragon ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 7,089 Joined: 4-October 05 Member No.: 7,813 |
the thing is, there are no rules given for tiered networks, or chokepoints, or anything like that. so far as we know, that could just as easily be an explanation of the difference between a node with firewall 1 and a node with firewall 6, rather than actually being represented by actual nodes.
and making stuff effectively unhackable is a problem with the game. arguing otherwise is like arguing that since a critter with immunity to normal weapons can still be harmed by magic, it wouldn't be unbalancing to the game if you just handed it out to everyone. just because you can do other things to an unhackable node doesn't make it acceptable that the node is hackproof. |
|
|
|
Apr 18 2007, 11:42 AM
Post
#48
|
|||||
|
Hoppelhäschen 5000 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 5,807 Joined: 3-January 04 Member No.: 5,951 |
|
||||
|
|
|||||
Apr 18 2007, 11:48 AM
Post
#49
|
|
|
Runner ![]() ![]() ![]() ![]() ![]() ![]() Group: Members Posts: 2,925 Joined: 26-February 02 Member No.: 948 |
I do agree that it opens up a can of worms in regard to the endless node hacker with X amount of tiered commlinks that he has hidden about his person, but that is just ONE possible way of upping the defense.
Lets look at it from another view then, you skip the tiered node setup and just get 1+ extra commlinks with agents in it. They are all on standby and watch your commlink for intrusion 24/7 and runs constant Analyze too see if someone is stupid enough to hack it. That is a perfectly valid wireless defence since your commlink is fully hackable but you have 4+ extra Analyze checks at the moment of intrusion and whoever hacked it will most likely be spotted. We have then skipped the “extra” commlink but added a larger amount of agents from commlinks with a signal setting of zero which gives them an effective range of 0-3 meters so whoever hacks you wont pick up their signal,but they can connect to your commlink. Add also that the agents have secondary offensive programs... |
|
|
|
Apr 18 2007, 01:16 PM
Post
#50
|
|||
|
Target ![]() Group: Members Posts: 17 Joined: 10-April 07 Member No.: 11,421 |
Hi All, New GM here, struggling with matrix issues. Fun discussion. I would rule that if Fort Knox never accepts data from the matrix, then all previous levels have to be hacked. On the other hand, if the characters find out that foolish guard likes to play WoW XII every evening from a terminal in Fort Knox, then the hacker only has to beat node 4, not the other nodes. I see the point that is being made about intervening nodes checking everything out before passing it on, thereby enhancing security at the cost of response. Perhaps raising the threshold would be a way to account for the various analyze programs that are running in the intermediate nodes, and not add any dice rolls. Anything else already complicates a slow, confusing (at least to me) system. Same thing if one of my players spent hard-earned nuyen for an arrangement like this, raise the threshold for intruders. Almost all electronic devices are supposed to be hackable but some are harder than others. Sleepyman |
||
|
|
|||
![]() ![]() |
|
Lo-Fi Version | Time is now: 16th April 2026 - 01:45 AM |
Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.