IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Spoof protection, Not perfect, but useful.
The Jopp
post Apr 18 2007, 08:26 AM
Post #1


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



The Persona is a combination of the following parts:
See page 211 SR4 (Persona)

Commcode (ID)
Hardware
Software

So, as long as you have two commlinks and two commcodes you can make your Drones a bit safer from spoofing, not fool proof but safer.

Persona 1 (commlink 1) grants user access to Persona 2 (Commlink 2) to Drone 1.
Shut down Commlink 1 or at least log off from the matrix with it.

Access the matrix with persona 2 and command your drone. Anyone analyzing the persona that commands the drone will not get anything but user access even if they demand it and succeeds with the diceroll because the Drone is not allowed to give that persona a higher access.

Depending on what one can do with a user access (that’s up to the owner) but I would limit it to regular Rigger commands like move, target, shoot, analyze etc. Changing subscription lists and the like would be at least security access.

Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post Apr 18 2007, 08:38 AM
Post #2


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



You don't need two comlinks - that is what the whole 'user privileges' thing is all about.

As long as you don't need it - don't log in as root.
Go to the top of the page
 
+Quote Post
The Jopp
post Apr 18 2007, 10:27 AM
Post #3


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



Hmm, since you must analyze the ID of the controlling Persona, how do i do that if they are behind a firewall in another Node and just use Command to the drone? Is the Drone tagged with the ID or does it become impossible to spoof them? In that case it becomes impossible to spoof remote controlled drones, feels kind of wrong.
Go to the top of the page
 
+Quote Post
Wasabi
post Apr 18 2007, 10:34 AM
Post #4


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



Exploit is all about bypassing safeguards in place. If you use Exploit successfully to create forged access its not being granted by a legitimate authority.

Command is a hacking program and I don't believe programs can be used from outside their node. You could instruct a Pilot program to do something from outside the node but short of instructing it then going offline not much to do.

After writing this I had an idea though as a defense... crash the Pilot program in the drone running without a hacker present then upload and run your own Pilot program to handle the drone. It'd probably require Admin access but hey, once in place its great for a surprise... :-)

My own preferred method of avoiding spoofing and hacking in general is to have the wireless turn off for a set period and operate with prior instructions. If I need to update it in an emergency use a biometric/skin link interface and touch the drone to emergency-stop it.
Go to the top of the page
 
+Quote Post
The Jopp
post Apr 18 2007, 10:44 AM
Post #5


Runner
******

Group: Members
Posts: 2,925
Joined: 26-February 02
Member No.: 948



QUOTE (Wasabi)
Command is a hacking program and I don't believe programs can be used from outside their node.

Nope, command is a common program and is used to send instructions. Exploit is all well and dandy but then we have moved away from spoofing – you’re talking about hacking and that’s a more secure route but it takes longer.
Go to the top of the page
 
+Quote Post
Cheops
post Apr 18 2007, 05:44 PM
Post #6


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 26-February 02
Member No.: 392



QUOTE (The Jopp)
Hmm, since you must analyze the ID of the controlling Persona, how do i do that if they are behind a firewall in another Node and just use Command to the drone? Is the Drone tagged with the ID or does it become impossible to spoof them? In that case it becomes impossible to spoof remote controlled drones, feels kind of wrong.

According to the RAW you just Intercept Wireless Traffic (EW + Sniffer 3) then make a Matrix Perception (computer + analyze vs. rating + stealth (if active)) followed by Spoof Command. The Wireless Signal contains the AID.

The best way to defeat spoofing is to have encryption on your communications (or better yet Hash). At encryption 5 you are expecting a Response 6, Decrypt 6 hacker to take 2.5 combat turns to break the encryption. That gives your drone plenty of time to whale away on the opponents before it turn on your own team.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 29th April 2024 - 11:23 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.