IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Data Bomb Detection/Ignoring
BlackHat
post Jul 16 2008, 03:45 PM
Post #1


Great Dragon
*********

Group: Members
Posts: 5,486
Joined: 17-March 05
From: Michigan
Member No.: 7,180



Okay, this is probably covered somewhere, and I am just not finding it - but the only reference I can find to detecting databombs says that you can do so with a successful matrix perception test. Does that mean that they only need one success (in which case, just about everyone would see them)? or does the placement of a data bomb include the act of attempting to hide it in the file (in which case it would roll program rating + stealth)?

Also, if it is the later case, which I suspect it is, whose stealth is used? The persona that is placing the bomb, or the node upon which the file rests? The first one makes the most sense, I suppose, but its bizarre that his stealth program would help long after he has left and logged off. The later just means that if you're going to bother data bombing your data, it better be on a node that can afford to run a stealth program in addition to analyze, encrypt, and the usual fare.

Also, it says "Anyone attempting to access the file without the proper passcode". Does that mean someone tries to open a databombed email message and they're given a prompt to enter the passcode into, and the bomb only goes off if they enter the wrong one? Can they wait it out and not enter anything? Can they cancel? I doubt any of that is in the rules, anywhere, but I am having trouble mapping the passcode aspect of a databomb to anything in real life. If you're going to accept a password, a user needs a way to enter it - which means they need time to enter it, which means they have plenty of warning that the file is, in fact, bombed before the bomb really goes off.
Go to the top of the page
 
+Quote Post
DireRadiant
post Jul 16 2008, 04:02 PM
Post #2


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



No one is going to open a data bomb when they know it's a data bomb? They are going to open a file. When the file prompts for a password, and they enter it, that is when it goes off revealing that it is a data bomb instead?

If you are looking for a data bomb, then you aren't looking for that file you want.

So you browse for File X. You read File X, it asks for a password, you enter one, It's wrong the bomb goes off.

If you check for data bombs. You browse for file X, you do a matrix perception test on file X, you see it has a data bomb attached. You get the password prompt. You can enter the correct password and be fine, or enter the incorrect one and have it blow up, or you can attempt to disarm the databomb.
Go to the top of the page
 
+Quote Post
BlackHat
post Jul 16 2008, 04:12 PM
Post #3


Great Dragon
*********

Group: Members
Posts: 5,486
Joined: 17-March 05
From: Michigan
Member No.: 7,180



I mean, let's say someone left an email on their computer, and data bombed it in case his wife comes snooping around.
His big corporate job gives him a legal databomb program, and a license, but not a stealth program.

His wife sees the file and uses he perfectly legal, and probably reasonably rated analyze program to find out what it is. My first question was, does she only need one success to notice there is a bomb (a successful matrix perception test) or is it an opposed roll between her computer+analyze and the databomb's rating (with no stealth, since there is no stealth program involved in this example)?

Lets assume she doesn't notice the databomb, but does notice that it is an email, that it isn't encrypted, and that she suspects it has something juicy in it, so she decides to use her edit program to take a peek at the contents of this file. She tries to open it, and the computer asks her for a password, which, given that it wasn't encrypted, can mean only one thing.
Data bomb.

At this point, if she types in the wrong password, the email will probably be deleted, and her persona will take some damage (not enough to crash it - more of a kick in the knees) and she'll have to explain to her husband why she was snooping around on his work computer. My second question was, if she just stands there, or logs off, rather than entering a passcode, does the bomb still go off? If it goes off for a non-response to the passcode query, it seems like there would have to be some delay (to give the user a chance to enter it, look it up, etc) or it would require split-second reflexes for safety reasons.
Go to the top of the page
 
+Quote Post
DireRadiant
post Jul 16 2008, 04:19 PM
Post #4


The Dragon Never Sleeps
*********

Group: Admin
Posts: 6,924
Joined: 1-September 05
Member No.: 7,667



QUOTE (BlackHat @ Jul 16 2008, 11:12 AM) *
His wife sees the file and uses he perfectly legal, and probably reasonably rated analyze program to find out what it is. My first question was, does she only need one success to notice there is a bomb (a successful matrix perception test) or is it an opposed roll between her computer+analyze and the databomb's rating (with no stealth, since there is no stealth program involved in this example)?


Ah, in this case just one hit should reveal the file has a data bomb attached. In principle there's no reason to have a data bomb hidden. The existence of a data bomb is often deterence enough. I'd say you need to make the effort to hide a data bomb with stealth actively in order to produce something intended to hurt someone.

QUOTE (BlackHat @ Jul 16 2008, 11:12 AM) *
Lets assume she doesn't notice the databomb, but does notice that it is an email, that it isn't encrypted, and that she suspects it has something juicy in it, so she decides to use her edit program to take a peek at the contents of this file. She tries to open it, and the computer asks her for a password, which, given that it wasn't encrypted, can mean only one thing.
Data bomb.


Encryption != Authentication
You can have unpassworded encrypted files, and password protected unencrypted files.

So a password prompt does not mean there is a databamb.

QUOTE (BlackHat @ Jul 16 2008, 11:12 AM) *
At this point, if she types in the wrong password, the email will probably be deleted, and her persona will take some damage (not enough to crash it - more of a kick in the knees) and she'll have to explain to her husband why she was snooping around on his work computer. My second question was, if she just stands there, or logs off, rather than entering a passcode, does the bomb still go off? If it goes off for a non-response to the passcode query, it seems like there would have to be some delay (to give the user a chance to enter it, look it up, etc) or it would require split-second reflexes for safety reasons.


It shouldn't go off unless someone specifically has it set that when prompted a password must be entered within X time, which is somewhat unusual.
Go to the top of the page
 
+Quote Post
BlackHat
post Jul 16 2008, 04:28 PM
Post #5


Great Dragon
*********

Group: Members
Posts: 5,486
Joined: 17-March 05
From: Michigan
Member No.: 7,180



That all makes sense. Thanks for the help.

The encryption vs authentication thing is a little bit fuzzy, though.

AFAIK there are three ways to password protect something in SR4. Encrypted files (which can be decrypted), data bombs (which can be defused) and accounts on nodes (which can be hacked). If you could put password protection on any-old file, without using either of the first two methods, there aren't any rules for someone else trying to bypass it (although, I suppose using exploit as if hacking in would suffice). Yeah, I like that ruling, actually. You'd basically have ot hack the other guy's account to read his files (or give yourself security or admin privileges).


Go to the top of the page
 
+Quote Post
Jack Kain
post Jul 16 2008, 04:48 PM
Post #6


Moving Target
**

Group: Members
Posts: 906
Joined: 16-October 06
Member No.: 9,630



Databombs also have a nasty habit of destroying the attached file, so in general you'd rather the hacker knows the databomb is there and hope it deters him then he blunders in sets off the data bomb and destroys your file. I suppose you could have some stealth databomb attached to phony files and such.

I recall a couple encrypted files with databombs attached, had to disarm the databomb before you could attempt decryption.
Go to the top of the page
 
+Quote Post
Dashifen
post Jul 16 2008, 10:11 PM
Post #7


Technomancer
********

Group: Retired Admins
Posts: 4,638
Joined: 2-October 02
From: Champaign, IL
Member No.: 3,374



Unwired provides rules for nodes running programs (e.g., Analyze as discussed in the main book). I wouldn't have a problem with a node running a Stealth program actively working to hide a databomb and/or a Construct of some kind (e.g., an Agent/Sprite) doing the same. Regardless, DireRadiant is correct: 1 success will tell you about the data bomb.
Go to the top of the page
 
+Quote Post
Aaron
post Jul 16 2008, 10:41 PM
Post #8


Mr. Johnson
******

Group: Dumpshocked
Posts: 3,148
Joined: 27-February 06
From: UCAS
Member No.: 8,314



I think Unwired already has a thing for running Stealth on a file. Yeah, it's under Decoys, p. 72.

Also, I believe that each hit on a Matrix Perception Test lets you ask one question about what you're looking at. I believe "does it have a data bomb?" is fair game.
Go to the top of the page
 
+Quote Post
Cheops
post Jul 17 2008, 01:56 AM
Post #9


Shooting Target
****

Group: Members
Posts: 1,512
Joined: 26-February 02
Member No.: 392



QUOTE (BlackHat @ Jul 16 2008, 04:28 PM) *
That all makes sense. Thanks for the help.

The encryption vs authentication thing is a little bit fuzzy, though.

AFAIK there are three ways to password protect something in SR4. Encrypted files (which can be decrypted), data bombs (which can be defused) and accounts on nodes (which can be hacked). If you could put password protection on any-old file, without using either of the first two methods, there aren't any rules for someone else trying to bypass it (although, I suppose using exploit as if hacking in would suffice). Yeah, I like that ruling, actually. You'd basically have ot hack the other guy's account to read his files (or give yourself security or admin privileges).


You hit it pretty much on the head at the end of this post. I'd suggest rereading Account Privileges (BBB 216, Unwired 52) with this question in mind. Admin sets up privileges for each user and group of users. So everyone in Accounting has read access to the Accounting Software while everyone in HR has read access to the HR Database. Accounting cannot access the HR Database and HR cannot access the Accounting Software. A Basic User in either department would have access to certain extra parts of each system.

eg. The AR Clerk has write access to the Accounts Receivables functions but only read for everything else.

At Security status you'd have the department managers or "priviledged" users. They can access and modify bigger areas of the computer system.

eg. At my job everyone is able to enter trades for clients but only a few people are allowed to access Staff accounts to place trades.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 18th April 2024 - 06:27 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.