IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Trace/Redirect Trace
Yoan
post Oct 7 2007, 09:02 PM
Post #1


Moving Target
**

Group: Members
Posts: 179
Joined: 8-June 05
From: Montréal, République du Québec
Member No.: 7,433



Can one (IC, Hacker, etc) only run 'Trace' against something/someone currently 'connected' to his device, or is it something more abstract like a commcode/phone number/IP address (ie: found this commcode in my logs from last weeks, now to trace it... OR, I have the Mitsuhama exec's commcode, so why not trace it to find his location?). If it's the 2nd, what about the hidden PAN mode?

:please:

http://forums.dumpshock.com/index.php?show...361&hl=commcode
This was a little helpful, making a stark difference between commcode (screen name) and access ID (mac address/ip)... but how frequently does an access ID 'change', if at all? Is it dependent on your physical location (ie: where you're connecting from?), or would it be tied to the hardware itself (mm, time to destroy my comlink!)?

As in, my COMMCODE is a screen name my friends and contacts know to send messages to, and my Matrix provider will worry about tying that commcode towards my access ID... you can not 'Trace' a commcode, right?

Etc etc etc...
Go to the top of the page
 
+Quote Post
Tarantula
post Oct 8 2007, 04:51 PM
Post #2


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



An access ID can be spoofed, (changed via software) or hardware (and can be changed via a hardware check). SR4, 224-225 for how to do that.
Go to the top of the page
 
+Quote Post
Dashifen
post Oct 8 2007, 05:00 PM
Post #3


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



I allow both, though if you have a commcode which isn't currently connected (or is hidden) then you might find a record of where this person most recently was rather than where they actually are. Tracing a commcode from last week's log will always lead you to where the that connection originated from last week and from there you'd have to use some other technique to find the person who connected to you.
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 9 2007, 05:18 AM
Post #4


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



i would say that the trace program is used for when a agent or persona is present in a host, if not its more of a data search aimed at searching logs.

as for access id, i would say it depends. joe wageslave would rarely change access id (how often does one change a phone number? ok, that can vary depending on the nations as some do not have number-portability) while a hacker would do it more often then he would change underwear (given some hacker archetypes that maybe be very rarely but still).
Go to the top of the page
 
+Quote Post
deek
post Oct 9 2007, 02:10 PM
Post #5


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



Well, IMO, a trace is when you have a commcode/access id, and you want to find its physical location. So, while the commcode/access id has to be online (you can't trace a comm that is turned off), I don't think you need to have any sort of active connection to it.

And because there is a redirect action, I commonly allow anyone being traced to know they are being traced, with a fairly easy matrix perception test. Granted, in my campaign, this doesn't come up all that much, but that is the way I have handled it.

As for whether the comm is in hidden mode or not, I don't have that impact anything. In order to get that commcode/access id, at some point you would have had to have accessed it or intercepted some sort of traffic. Once you have it, the trace is pretty basic.

Although, because I make that so easy, I do usually have important NPCs using either anonymous or disposable comms, so a trace might get you to a public library node. Normally, the only contacts that give you accurate location info are you own "trusted" contacts or people that just don't know any better.
Go to the top of the page
 
+Quote Post
hobgoblin
post Oct 9 2007, 02:26 PM
Post #6


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



trace in SR is one of the things one should not apply to much real life knowhow to.

its designed around the action movie moment of seeing that dot on the map jumping around while trying to get a fix on where the attacker or similar is hidden.
Go to the top of the page
 
+Quote Post
Eryk the Red
post Oct 9 2007, 02:43 PM
Post #7


Moving Target
**

Group: Members
Posts: 633
Joined: 23-February 06
Member No.: 8,301



I do not allow normal hacking actions through commcodes. (For example, being on a phone call with someone does not give you the opportunity to try to hack their comm.) This is because I see commcalls as a service you connect to. You are accessing your phone provider (a shadow commservice for most characters), they are accessing the phone network, which the other caller is connected to (also through a provider). You'd have to hack the phone company to get at the other person through a phone call or with their commcode. Not impossible, not as dangerous as hacking the bank, certainly. But not a walk in the park.

To me, trace is for tracking down a hacker accessing your system (which is why it's something that more often gets done to characters, rather than them doing it to someone else).
Go to the top of the page
 
+Quote Post
deek
post Oct 9 2007, 03:00 PM
Post #8


Shooting Target
****

Group: Members
Posts: 1,706
Joined: 30-June 06
From: Fort Wayne, IN
Member No.: 8,814



QUOTE (Eryk the Red)
I do not allow normal hacking actions through commcodes. (For example, being on a phone call with someone does not give you the opportunity to try to hack their comm.) This is because I see commcalls as a service you connect to. You are accessing your phone provider (a shadow commservice for most characters), they are accessing the phone network, which the other caller is connected to (also through a provider). You'd have to hack the phone company to get at the other person through a phone call or with their commcode. Not impossible, not as dangerous as hacking the bank, certainly. But not a walk in the park.

To me, trace is for tracking down a hacker accessing your system (which is why it's something that more often gets done to characters, rather than them doing it to someone else).

I don't know...in a recent session, one of the PCs contacts was kidnapped. He was able to send out a cryptic message but leave his comm on. Because it was on, the PCs were able to run a trace and pinpoint where he was being held captive.

I like players being able to use the trace this way.
Go to the top of the page
 
+Quote Post
noonesshowmonkey
post Oct 9 2007, 03:05 PM
Post #9


Moving Target
**

Group: Members
Posts: 393
Joined: 2-July 07
Member No.: 12,125



I just added a post about the topic of traceroutes to the Matrix Explained... sort of... post.

If the post does not answer your questions, feel free to elaborate and inquire.

- der menkey

"Certainly there is no hunting like the hunting of man and those who have hunted armed men long enough and liked it, never really care for anything else thereafter."
~ Ernest Hemingway
Go to the top of the page
 
+Quote Post
Yoan
post Oct 9 2007, 05:37 PM
Post #10


Moving Target
**

Group: Members
Posts: 179
Joined: 8-June 05
From: Montréal, République du Québec
Member No.: 7,433



Thanks for all the replies, especially since my question was awfully vague ;)

I think I'll run it as;

You can run a trace on any Commcode or Access ID, but a Commcode trace will likely end up in the dark (ie: last place his Commcode was? A Public Library, before he went Passive/Hidden/Off)... but tracing an Access ID is easier and more reliable (I imagine that, in a node, IC/Security Hackers would use the Access ID-- since you're logged into their host, it's easy to get it-- whatever 'it' is).

Being something of a network engineer "in RL", I'm familiar with traceroute etc... but let's see where this goes! Thanks, again, now off to the other thread! ;)
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 16th April 2024 - 08:35 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.