IPB
X   Site Message
(Message will auto close in 2 seconds)

Welcome Guest ( Log In | Register )

4 Pages V   1 2 3 > »   
Reply to this topicStart new topic
> The Rules Obscure, Did you know that...
Nightwalker450
post Jan 7 2008, 03:34 PM
Post #1


Moving Target
**

Group: Members
Posts: 698
Joined: 26-October 06
From: Iowa, United States
Member No.: 9,720



Some things in the rules are not laid out as well as they could be. And as such there are rules that are just not well known. So if there is some obscure rule that completely changed your view on how something worked post it. It might help clear up things for some of the others around here.

Example: Method posted this on the Illusions forum... Little to say my hacker is now underskilled dramatically..

BBB p.125 under the forgery skill

QUOTE (BBB p.125)
Note that some forgeries will require additional skill tests in
order to pull them off ; the quality of the forgery (hits scored) will
be limited by the complementary skill hits. Forging a painting,
for example, requires an ability to paint—the hits on the Forgery
Test cannot exceed the hits scored on the Artisan Test to create the
painting. As another example, doctoring an image would require a
Computer + Edit program Test in addition to the Forgery Test.
Go to the top of the page
 
+Quote Post
Nightwalker450
post Jan 7 2008, 03:42 PM
Post #2


Moving Target
**

Group: Members
Posts: 698
Joined: 26-October 06
From: Iowa, United States
Member No.: 9,720



QUOTE ("BBB p. 216")

Note that standard electronic devices only have admin accounts, as there is no need for other accounts for their software.


Target Commlink - Standard secure, but not hacker elite
Firewall (5) + Admin (6) = 11
Analyze (4) + Firewall (5) = 9 avg 3 hits

Hacker - Elite System
Hacking (6) + Exploit (6) + VR (2) = 14 avg 4-5 hits
Stealth (6)

The hacker will need from 2-4 passes to hack into the system, on a fast hack the system will run analyze each try for the extended threshold. It will only take 2 or 3 passes for the system to spot the hacker. Once this is done, the system can drop link to the Hacker (looses all his work), then will be on Alert status providing it +4 to its Firewall.
Go to the top of the page
 
+Quote Post
Feshy
post Jan 7 2008, 04:21 PM
Post #3


Moving Target
**

Group: Members
Posts: 715
Joined: 4-September 05
From: Metaplane GEPLK136 (The one with the lizards. You remember the lizards, don't you?)
Member No.: 7,684



I doubt that would apply to commlinks, as they are full fledged computers that may very well have legitimate uses for other levels of access. Think corporate computers for traveling salesmen, for instance. You want your IT security to be able to lock the device down and make sure it stays secure even if your salesman is likely to download some garbage from the matrix, so you don't give him full access.

Drones would likely have other access levels as well. For instance, I could see corporations allowing every security grunt to have "read only" access to the drones to get tactical information, while only the security riggers get full command access (admin)

Admin-only I tend to think applies to "simple" devices -- like toasters, MP3-playing underwear, and other things that do not have a stat listing for either pilot or system.
Go to the top of the page
 
+Quote Post
Fortune
post Jan 7 2008, 06:51 PM
Post #4


Immoral Elf
**********

Group: Members
Posts: 15,247
Joined: 29-March 02
From: Grimy Pete's Bar & Laundromat
Member No.: 2,486



QUOTE (Feshy)
I doubt that would apply to commlinks ...

I disagree. In my opinion, Commlinks typically only come with Admin Access.
Go to the top of the page
 
+Quote Post
Nightwalker450
post Jan 7 2008, 06:56 PM
Post #5


Moving Target
**

Group: Members
Posts: 698
Joined: 26-October 06
From: Iowa, United States
Member No.: 9,720



The salesmen would log onto his companies network. Not have all the companies data on his commlink.. Unless he door-to-doors in a deadzone, in which case its really not a problem at all. As to drones they can give a readout without providing access, just as you can link your cybereyes input to teammates without them controlling your eyes.

So yes, I think when these were written it was very much intended for drones/commlinks/vehicles... Most drones/vehicles though don't have analyze or systems very high. I think the ruling is they use pilot for everything, so upping your pilot is useful to protect it, but it already comes with a +6 due to ADMIN only.

Anyways don't want to argue, I want more rules that have been overlooked in the books! (I'll get the exact page/quote out of the book when I get home, so I can update my prior post)
Go to the top of the page
 
+Quote Post
Redjack
post Jan 7 2008, 07:46 PM
Post #6


Man Behind the Curtain
**********

Group: Admin
Posts: 14,868
Joined: 2-July 89
From: End of the Yellow-Brick Road
Member No.: 3



QUOTE (Fortune)
QUOTE (Feshy @ Jan 8 2008, 02:21 AM)
I doubt that would apply to commlinks ...

I disagree. In my opinion, Commlinks typically only come with Admin Access.

I would have to agree with Feshy. Even my pda phone has two levels of access. There is no reason to think that a comlink would have a poor security model as to have only one level of access.
Go to the top of the page
 
+Quote Post
augurer
post Jan 7 2008, 08:35 PM
Post #7


Target
*

Group: Members
Posts: 56
Joined: 19-July 07
Member No.: 12,304



QUOTE (Redjack @ Jan 7 2008, 02:46 PM)
QUOTE (Fortune @ Jan 7 2008, 01:51 PM)
QUOTE (Feshy @ Jan 8 2008, 02:21 AM)
I doubt that would apply to commlinks ...

I disagree. In my opinion, Commlinks typically only come with Admin Access.

I would have to agree with Feshy. Even my pda phone has two levels of access. There is no reason to think that a comlink would have a poor security model as to have only one level of access.

In SR, a "poor security model" is actually superior to the known "best practice" of having multiple accounts. This is primarily because once a Hacker has attained any access at all, it's relatively trivial for them to acquire Admin status without raising an alarm.

If you don't mind that the Hackers are all a Complex Action or two away from having Admin with little to no consequence, that's fine. If you do feel this is a bit undesired, either insist that most devices only have one user account (Admin) or change the rules for ratcheting up access levels once hacked inside.
Go to the top of the page
 
+Quote Post
knasser
post Jan 7 2008, 09:05 PM
Post #8


Shadow Cartographer
*******

Group: Members
Posts: 3,737
Joined: 2-June 06
From: Secret Tunnels under the UK (South West)
Member No.: 8,636




How do you figure that raising your access level is easier once you're inside? All that hacking yourself access at Public level before you hack yourself Security or Admin access does, is throw in an extra hacking attempt during which you may be detected.
Go to the top of the page
 
+Quote Post
Fortune
post Jan 7 2008, 09:37 PM
Post #9


Immoral Elf
**********

Group: Members
Posts: 15,247
Joined: 29-March 02
From: Grimy Pete's Bar & Laundromat
Member No.: 2,486



I don't see what is to be gained from a normal commlink having more than Admin level access.

Oh, and knasser ... I was under the impression (through your pdf stuff) that you were in agreement about commlinks and admin access. Hmm ...
Go to the top of the page
 
+Quote Post
Jaid
post Jan 7 2008, 10:11 PM
Post #10


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



QUOTE (knasser)
How do you figure that raising your access level is easier once you're inside? All that hacking yourself access at Public level before you hack yourself Security or Admin access does, is throw in an extra hacking attempt during which you may be detected.

you just edit the account list, of course... which is going to be a simple hacking + edit test, since it likely isn't something your hacked account is allowed to do.
Go to the top of the page
 
+Quote Post
knasser
post Jan 7 2008, 10:19 PM
Post #11


Shadow Cartographer
*******

Group: Members
Posts: 3,737
Joined: 2-June 06
From: Secret Tunnels under the UK (South West)
Member No.: 8,636



QUOTE (Fortune)
I don't see what is to be gained from a normal commlink having more than Admin level access.

Oh, and knasser ... I was under the impression (through your pdf stuff) that you were in agreement about commlinks and admin access. Hmm ...


I didn't disagree with the idea of commlinks only having one security level in that post. I only commented that having hacked your way into a system at a lower level didn't do much to help you then hack it at a higher level. About the only advantage I can see is if it let you move to a different part of the network where no IC was currently residing, so you could hack in peace. However, that would be of limited value in my networks. Usually I set my networks up so that logical groups of nodes share access permissions, but when you come to a logically distinct area, you may have to make a new hack attempt. An example would be two separate offices owned by the same company that shared some matrix resources, but not all. I've never had much difficulty in pitching the difficulty of hacking a network about where I want. Usually, I only make it moderately difficult, knowing that I can complicate things further if I need to. Once a node has detected the presence of a hacker, there are so many things it can do to make things difficult that it gets silly. Amateurs care about breaking into a node. The pros care about do so without being noticed while they do it. And the masters care about not being noticed after they're gone. ;)

It's a bit of a judgement call on commlinks and access levels. You could use an example of how many people today have phones that are tied to a particular network provider. The user does not have Admin access to their phone. But regardless of whether or not there is an Admin level to the commlink, if the user can get their data in and out, make calls, etc. with just the user level access, then so can the hacker. With simple devices, it's harder to determine the functional differences between Public, Security and Administration. You have to either round up or round down, really. The name "public" encourages you to round up for most things that aren't publically accessible, but that has the negative effect of making your auto-fridge conceptually harder to hack than an office computer network. I tend to solve this by making it a non-issue. E.g. the fridge is not really a node, it is a device that is subscribed to your house node and it is the house node which is an entity that you hack. Then it becomes simple - the Hacker hacks the house node and if they want to defrost your fridge while you're out, they need user / public access because that's what you would normally need as a user to do this. If I want to turn off the alarm system, you'll be wanting Security access. And if you want to add a new user account to the household so you can live there while the owner's on holiday... that's Admin.
Go to the top of the page
 
+Quote Post
knasser
post Jan 7 2008, 10:31 PM
Post #12


Shadow Cartographer
*******

Group: Members
Posts: 3,737
Joined: 2-June 06
From: Secret Tunnels under the UK (South West)
Member No.: 8,636



QUOTE (Jaid)
QUOTE (knasser @ Jan 7 2008, 04:05 PM)
How do you figure that raising your access level is easier once you're inside? All that hacking yourself access at Public level before you hack yourself Security or Admin access does, is throw in an extra hacking attempt during which you may be detected.

you just edit the account list, of course... which is going to be a simple hacking + edit test, since it likely isn't something your hacked account is allowed to do.


Maybe in your game. But a public user doesn't have the access rights to that sort of data in my game. There's no boot strapping.

The rules in SR are abstract. They need to be as we're dealing with computer technology over sixty-years in the future. If someone is getting themself security level access to a system, then maybe one way they would do that is to hack an account list, but that attempt is a hack attempt at the node and we have rules for that. It's certainly not a generic Edit test (for which the book gives example such as changing text documents, graphics, video, transferring files, etc), unless the GM says "by the way, there's a file in this node that lists who's an Administrator. Do you want to add your name?"

You're falling into a trap of adjusting the rules to fit an overly-developed guess at how the Matrix would work. And it's also a way that I don't think the Matrix would work, anyway.
Go to the top of the page
 
+Quote Post
Jaid
post Jan 7 2008, 10:38 PM
Post #13


Great Dragon
*********

Group: Members
Posts: 7,089
Joined: 4-October 05
Member No.: 7,813



i agree with you conceptually (that is, i agree that the rules *should* work like that), but i'm not sure that they do. iirc, you can attempt any test while in a node. if you are acting within the privileges of your account, you use your computer skill. if you are going beyond them, you use hacking.

i certainly can understand *why* you wouldn't want to allow that kind of nonsense though.
Go to the top of the page
 
+Quote Post
Dashifen
post Jan 7 2008, 10:44 PM
Post #14


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



For what it's worth, I think it would be a Hacking + Edit test but, because a general user account wouldn't have access rights to that file, the system would get to try and detect either (a) the change or (b) the action that's causing the change or © both, depending on how strict the security is going to be.

I've even run some extremely secure hosts as systems which continue to add any new hits on analyze tests to the original hits to prevent hacking (whether on the fly or probing the target) which has almost always made things very tense on the team's hacker!
Go to the top of the page
 
+Quote Post
knasser
post Jan 7 2008, 11:07 PM
Post #15


Shadow Cartographer
*******

Group: Members
Posts: 3,737
Joined: 2-June 06
From: Secret Tunnels under the UK (South West)
Member No.: 8,636




@Jain: Okay, well I guess we're allowed to play differently. :) There are lots of easy fluff explanations for any particular Matrix rules, though. So I see no need to let someone with a few preconceptions about how computers work alter elements of the rules.

@Dashifen: By the time you've added in those counter-tests, it's starting to look a lot like the original hacking on the fly rules anyway. ;)

One important difference between the Internet of today and the Matrix of tomorrow, is that today we deal with static files. A video is a video, an access list is an access list. In the Matrix, we're living in an always-on, distributed computing, post-DRM, post-P2P, post-Virutalisation re-designed from the bottom up infrastructure. Static files are a thing of the past. I envisage almost everything as a running process, handed from node to node (I also picture the Matrix 2.0 to have strong countermeasures built into it to prevent runaway replication). This is why agents can travel from node to node, editing a file is akin to interacting with a separate program. It's why IC can be embedded in a file to prevent it being copied.

I can zip up an entire virtual machine as a file and send it to you, complete with all the installed preferences, programs and conceivably processes. It's a small step from there to making the freezing and re-starting of that virtual machine invisible to the user. With SR2070's cannon technology, we can justify, and justify very well, any aspect of the Matrix rules we like.

Long-winded way of saying if any player thinks they're going to type their account name into a permissions file somewhere and become an Admin, they're out of luck. ;)

-K.
Go to the top of the page
 
+Quote Post
Jhaiisiin
post Jan 7 2008, 11:33 PM
Post #16


Running Target
***

Group: Members
Posts: 1,416
Joined: 4-March 06
From: Albuquerque
Member No.: 8,334



So I'm fairly knowledgeable on computers, but only basic info on networking security, so decided to ask a buddy of mine who knows more than is probably healthy on networking and security. I specifically asked why it'd be easier to upgrade access once inside as opposed to attacking the higher level from the outside directly. This is basically what he told me:

When attacking from the outside, you're basically fighting a login prompt. One way or the other, you have to pass that. Generally speaking, user access will be easier to get to due to social engineering and such, and because general users frankly don't pick good passwords as a rule. Admin access is typically harder to break through simply because the passwords are generally much better. (Obviously only talking general, not specific people right now) Once inside however, even at the user level, now you have access to the OS, the programs, whatever. There are more points of exploitation, more things you can use against the system to help give you more access.

So basically, yes, when you're inside, apparently it would be easier to get more access. The exact hows and whys are subject to interpretation and fluff, but the mechanics should show that it's slightly easier from inside than out. Interior walls of a house are never as sturdy as the exterior walls is a good analogy I guess...
Go to the top of the page
 
+Quote Post
Nightwalker450
post Jan 7 2008, 11:43 PM
Post #17


Moving Target
**

Group: Members
Posts: 698
Joined: 26-October 06
From: Iowa, United States
Member No.: 9,720



QUOTE (BBB p. 219)
You can also alter a device's output--video taken by a security camera, for example, or telemetry data taken by a vehicle sensor.  A single Edit action only alters output for a short period (one Combat Turn).  In order to alter output for a longer period, you must first take control of the device (see p.220) prior to the Edit action.

Edit can also be used for creative output, such as crafting a life-like 3-D holo to use as a distraction, or forging a convincing set of fake credential printouts.


I assume this is how people are bumping themselves up a level. Since this is the closest it comes to saying its possible. But this is an output only, not a file. Basically if they are printing out information on you, you can intercept and edit the "No Record" to read your information. But it doesn't put you in the system, you only exist for that one time it is being referenced.

Basic users wouldn't have access to the admin user list, so it makes no sense for someone to edit them in. The only way to do that is to be Admin level, then you'd be able to do that. That's how you make a back door. You can only edit what you have access to, Security has access to video feeds, but they aren't allowed to change them, thats a hacking edit. Edit doesn't give you access, only exploit, so you can't Edit your way into a system.

Also I added the page reference for the access above, its short, and just one of those "Oh yeah, and this" type lines.
Go to the top of the page
 
+Quote Post
Aaron
post Jan 8 2008, 05:16 AM
Post #18


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



Okay, let's take a crack at it. Some of these are just things I discovered after running the game for a while, and kinda surprised me.
  • If someone ducks behind cover, it becomes more likely that your EX ammo will explode in your weapon. I think we all knew about this one, though.
  • Treating a magically active person's injuries with First Aid or Medicine imposes a -2 dice pool penalty.
  • Fake SINs tend to be disposable, since they only roll their ratings, which increases the chances for a glitch.
  • Tests made with SkillSofts can't have Edge added to them.
  • The threshold for determining whether a hologram is real or fake is 2.
  • Characters using a shield take a -1 dice pool penalty to all physical actions.
  • A dice pool of 2 glitches more often than a dice pool of 1.
  • A Body + Willpower (2) Test is required to successfully stand up.
Go to the top of the page
 
+Quote Post
Tarantula
post Jan 8 2008, 05:44 AM
Post #19


Dragon
********

Group: Members
Posts: 4,664
Joined: 21-September 04
From: Arvada, CO
Member No.: 6,686



Wheres that stand up rule?
Go to the top of the page
 
+Quote Post
Method
post Jan 8 2008, 07:59 AM
Post #20


Street Doc
*******

Group: Admin
Posts: 3,508
Joined: 2-March 04
From: Neverwhere
Member No.: 6,114



QUOTE (Aaron)
Fake SINs tend to be disposable, since they only roll their ratings, which increases the chances for a glitch.


This is interesting. I think in my game I would allow the PC to add dice equal to the net hits on a Con+Charisma test...
Go to the top of the page
 
+Quote Post
Ryu
post Jan 8 2008, 09:14 AM
Post #21


Awakened Asset
********

Group: Members
Posts: 4,464
Joined: 9-April 05
From: AGS, North German League
Member No.: 7,309



The basic (and really obscure to me) problem is that everyone is checking the integrity of your SIN. The part where they check if YOU match up with YOUR SIN is actually left alone.

How can the whole economic system be based on a number that does nothing for business except linking data (can be done without SIN today), and that basically noone has trust in? Plus, I calculated that a rating 6 SIN will fail against a rating 1 scanner about 3% of the time.
Go to the top of the page
 
+Quote Post
kzt
post Jan 8 2008, 04:48 PM
Post #22


Great Dragon
*********

Group: Members
Posts: 5,537
Joined: 27-August 06
From: Albuquerque NM
Member No.: 9,234



No SR designer would have passed a basic statistics class.
Go to the top of the page
 
+Quote Post
Aaron
post Jan 8 2008, 05:39 PM
Post #23


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Tarantula)
Wheres that stand up rule?

In the section on actions in the chapter on combat. Let's see, page ... hang on, my PDF is still loading ... page 137 in your hymnal.
Go to the top of the page
 
+Quote Post
Aaron
post Jan 8 2008, 05:40 PM
Post #24


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



QUOTE (Method)
QUOTE (Aaron)
Fake SINs tend to be disposable, since they only roll their ratings, which increases the chances for a glitch.


This is interesting. I think in my game I would allow the PC to add dice equal to the net hits on a Con+Charisma test...

Actually, I like the system, and wouldn't be surprised if this was intentional. Fake identities should be more like commodities and less like real estate, at least in my opinion.
Go to the top of the page
 
+Quote Post
Moon-Hawk
post Jan 8 2008, 06:00 PM
Post #25


Genuine Artificial Intelligence
********

Group: Members
Posts: 4,019
Joined: 12-June 03
Member No.: 4,715



QUOTE (Aaron)
Actually, I like the system, and wouldn't be surprised if this was intentional. Fake identities should be more like commodities and less like real estate, at least in my opinion.

Cheap ones should, but reliable ones should be vaguely reliable.
If a rating 6 fake SIN fails against a rating 1 scanner 3% of the time, then buying a frozen burrito once per day from the stuffer shack with no other activity whatsoever means the best of the best fake ID will fail 60% of the time within a month under the lightest scrutiny. Boo.
Go to the top of the page
 
+Quote Post

4 Pages V   1 2 3 > » 
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 12th April 2022 - 06:10 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.