IPB

Welcome Guest ( Log In | Register )

2 Pages V   1 2 >  
Reply to this topicStart new topic
> Protecting drone nodes with agents
Odsh
post May 10 2009, 09:00 PM
Post #1


Moving Target
**

Group: Members
Posts: 107
Joined: 14-August 07
Member No.: 12,638



I would like to use agents or IC to protect my drones from hacking attempts. If the agent and all the programs it's using are running on the drone's node however, it counts for the drone's processor limit and will likely reduce its response (especially if the drone is using some autosofts to act on its own).

What if I use one or more separate commlinks that are fully loaded with agents that "assist my persona" instead of "acting independently" and establish an AR connection from each of those commlinks to all my drones? Technically, I would have all of those agents in each drone's node, without affecting the drone's response. I would not control those AR connections, simply order all agents to permanently scan each drone's node for intruders and attack them. The only program loaded in those commlinks' personas would be Stealth, in order to hide the defenseless personas (since I'm not monitoring those connections at all) while my agents do the job. I don't even need to carry those commlinks with me, they could be hidden at different places around Seattle to confuse anybody trying to track my physical location. Finally, the agents could run at their full rating without the need to boost the drones' matrix attributes, which would save a lot of nuyen and at least compensate somewhat for the additional commlinks' and agents' costs.

Would that work?
Go to the top of the page
 
+Quote Post
Backgammon
post May 10 2009, 10:40 PM
Post #2


Ain Soph Aur
******

Group: Dumpshocked
Posts: 3,477
Joined: 26-February 02
From: Montreal, Canada
Member No.: 600



Sure, it would work. The only downside I can think of is if many of your drones get attacked at the same time, you won't be able to defend them all (well) at the same time. Also, if a hacker did his homeword and sicovered this topography, it would be very easy to knock out the defending node beforehand, then take over the drones leisurely.

Still, IMO, the downsides are acceptable for the amount of cash you'd save.
Go to the top of the page
 
+Quote Post
Odsh
post May 10 2009, 11:39 PM
Post #3


Moving Target
**

Group: Members
Posts: 107
Joined: 14-August 07
Member No.: 12,638



Ok, thanks.

QUOTE (Backgammon @ May 10 2009, 06:40 PM) *
The only downside I can think of is if many of your drones get attacked at the same time, you won't be able to defend them all (well) at the same time.


Well I can live with that. (IMG:style_emoticons/default/smile.gif) It's still unlikely to happen, and anyway the aim is not to make an impenetrable defense.

QUOTE (Backgammon @ May 10 2009, 06:40 PM) *
Also, if a hacker did his homeword and sicovered this topography, it would be very easy to knock out the defending node beforehand, then take over the drones leisurely.


Indeed. I could use this system to defend the commlinks' nodes too though, which would then benefit from the exact same protection as the drones.

QUOTE (Backgammon @ May 10 2009, 06:40 PM) *
Still, IMO, the downsides are acceptable for the amount of cash you'd save.


Not only am I potentially saving cash (I didn't verify), but I can have a lot more agents in each drone's node than that node could possibly support by itself. It all comes down to the number of agents that can run per commlink and the nodes' subscription limits.
Go to the top of the page
 
+Quote Post
Method
post May 11 2009, 12:28 AM
Post #4


Street Doc
*******

Group: Admin
Posts: 3,508
Joined: 2-March 04
From: Neverwhere
Member No.: 6,114



I'll be the first to admit that the Matrix is not my forte as a GM, but what if you were to slave all those commlinks to your main comm? Then each slaved comm can run an agent that defends a drone's node remotely, but any attempts to hack the slaved comms will bump the attacker up to your main comm to deal with you, right?

{edit} Or couldn't you slave all the drone's nodes to a single commlink that is loaded with IC?
Go to the top of the page
 
+Quote Post
Wasabi
post May 11 2009, 01:29 AM
Post #5


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



===== SUBSCRIPTIONS
A node can have ( System Rating * 2 )in subscriptions
Slaves each require a subscription [Unwired, pg204]
Slaves nodes may only be subscribed to the master node and thats it. [Unwired, pg55]
To access a node requires a subscription. [Unwired, pg204]

This means each slaved node eats up a subscription on the master node. A matrix connection uses an additional subscription. Each drone is its own node also requiring a subscription.

Thats a lot of subscriptions if you want to have 5 agents in 5 drones you'd need 10 subscriptions to have the drones subscribed and one agent covering each. If you want to get to the matrix thats an 11th subscription.

===== PAYLOAD
Note the payload section in SR4A, pg234. Programs on agents count against the processor limit of the node. This means a loaded-to-bear agent with 5 ergonomic programs and 6 regular programs is going to fill a response-6 node. The way around it is Sprites. They ignore Response being Resonance-based creatures/constructs.


===== SUMMARY
All in all you're better off with a talented hacker or high-rating fault sprite to guard the slaved network.

...and don't forget, in "Jumped In" mode you cannot have your drone hijacked. It can be intruded on but the intruder is powerless to tell your drone what to do.
Go to the top of the page
 
+Quote Post
Telion
post May 11 2009, 02:29 AM
Post #6


Moving Target
**

Group: Members
Posts: 152
Joined: 11-May 06
Member No.: 8,547



Would maxing out the connections on all your drones personal node assist in preventing intrusion?
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post May 11 2009, 02:34 AM
Post #7


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Telion @ May 10 2009, 07:29 PM) *
Would maxing out the connections on all your drones personal node assist in preventing intrusion?



No, because you can exceed the Subscription Limit by RAW... it just starts to degrade your respnse, just as using excessive programs does...
Go to the top of the page
 
+Quote Post
Wasabi
post May 11 2009, 02:40 AM
Post #8


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



QUOTE (Tymeaus Jalynsfein @ May 10 2009, 10:34 PM) *
No, because you can exceed the Subscription Limit by RAW... it just starts to degrade your respnse, just as using excessive programs does...


Source?
Go to the top of the page
 
+Quote Post
Wasabi
post May 11 2009, 02:47 AM
Post #9


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



QUOTE (Telion @ May 10 2009, 10:29 PM) *
Would maxing out the connections on all your drones personal node assist in preventing intrusion?


AFAIK if the rigger can access the matrix and his drones and YOU can access the matrix you're subscriptions are already set. Use the matrix as your vector in. If not, shoot down a drone, repair/juryrig the commlink portion of the drone and use a hardwire through that subscription as your vector in. Maxing subscriptions means introducing vectors and you just need to see how to take advantage of those extra ways in! (IMG:style_emoticons/default/smile.gif)

If you want to prevent intrusion tell the drones what to do then instruct an agent inside it to turn off the wireless for 6sec. Then one combat turn later it will be back on the wireless and you can issue one more instruction then kill wireless again, etc. Limiting ALL access is a pretty good way to limit the chance of getting hacked.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post May 11 2009, 02:53 AM
Post #10


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Wasabi @ May 10 2009, 07:40 PM) *
Source?



Unwired... Page 55 under the Topic of Subscriptions...
Go to the top of the page
 
+Quote Post
Wasabi
post May 11 2009, 03:09 AM
Post #11


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



QUOTE (Tymeaus Jalynsfein @ May 10 2009, 10:53 PM) *
Unwired... Page 55 under the Topic of Subscriptions...


My hero!!!
(I honestly never knew that... thanks for the page ref sir!)
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post May 11 2009, 03:10 AM
Post #12


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Wasabi @ May 10 2009, 08:09 PM) *
My hero!!!
(I honestly never knew that... thanks for the page ref sir!)


Your Welcome...
Always willing to be of service...
Go to the top of the page
 
+Quote Post
crizh
post May 11 2009, 10:22 AM
Post #13


Runner
******

Group: Members
Posts: 2,666
Joined: 29-February 08
From: Scotland
Member No.: 15,722



I've been using this trick for a while. I use a rack of cheap nexuses (Response 3) in a safehouse somewhere running cracked copies of Firewall and System 6. I find the sweet spot is a Processor Limit of 15. Set up one nexus with all the others and your drones slaved to it and all the other Nexuses have room for 2 Agents/IC each.

Any incoming hacker has to penetrate the main Node before anything else and it is swarming with IC. Give it strong encryption and perform rolling encryption on your wireless signals and you are pretty much air-tight.
Go to the top of the page
 
+Quote Post
Zaranthan
post May 11 2009, 01:33 PM
Post #14


Moving Target
**

Group: Members
Posts: 503
Joined: 3-May 08
Member No.: 15,949



QUOTE (Wasabi @ May 10 2009, 10:47 PM) *
AFAIK if the rigger can access the matrix and his drones and YOU can access the matrix you're subscriptions are already set. Use the matrix as your vector in. If not, shoot down a drone, repair/juryrig the commlink portion of the drone and use a hardwire through that subscription as your vector in. Maxing subscriptions means introducing vectors and you just need to see how to take advantage of those extra ways in! (IMG:style_emoticons/default/smile.gif)


You've lost me with these "vectors." You didn't quote anybody, so I don't know what you're responding to.

QUOTE
If you want to prevent intrusion tell the drones what to do then instruct an agent inside it to turn off the wireless for 6sec. Then one combat turn later it will be back on the wireless and you can issue one more instruction then kill wireless again, etc. Limiting ALL access is a pretty good way to limit the chance of getting hacked.


This is flagrant metagaming and won't fly on anyone's table, sorry. Issuing orders isn't an instant of thought followed by exactly six seconds of thumb-twiddling. It's constant adjustments via your command panel to react to the situation at hand. We just resolve the results every six seconds or so for simplicity.
Go to the top of the page
 
+Quote Post
AngelisStorm
post May 11 2009, 04:01 PM
Post #15


Moving Target
**

Group: Members
Posts: 616
Joined: 30-April 07
From: Edge of the Redmond Barrens, Borderline NAN. Runnin' the border for literal milk runs.
Member No.: 11,565



QUOTE (Zaranthan @ May 11 2009, 09:33 AM) *
This is flagrant metagaming and won't fly on anyone's table, sorry. Issuing orders isn't an instant of thought followed by exactly six seconds of thumb-twiddling. It's constant adjustments via your command panel to react to the situation at hand. We just resolve the results every six seconds or so for simplicity.


... are you sure of that? I'm pretty sure when you issue an order, such as "kill target X which is designated" the pilot/dog brain runs off to do it. I don't see a reason why you can't put into the Pilot's script (don't even need an Agent) "Recieve order, disable wireless for 6 seconds, then reactivate."
Go to the top of the page
 
+Quote Post
crizh
post May 11 2009, 04:31 PM
Post #16


Runner
******

Group: Members
Posts: 2,666
Joined: 29-February 08
From: Scotland
Member No.: 15,722



You could do that if you trusted your GM not to screw you in the two and a half combat rounds that your drone was completely beyond your control.

Heck in that time even my Melee Phys Ad could have hacked your drone and sent it back to blow you into tiny little chunks....
Go to the top of the page
 
+Quote Post
DuctShuiTengu
post May 11 2009, 07:08 PM
Post #17


Moving Target
**

Group: Members
Posts: 191
Joined: 11-May 09
Member No.: 17,162



QUOTE (AngelisStorm @ May 11 2009, 05:01 PM) *
... are you sure of that? I'm pretty sure when you issue an order, such as "kill target X which is designated" the pilot/dog brain runs off to do it. I don't see a reason why you can't put into the Pilot's script (don't even need an Agent) "Recieve order, disable wireless for 6 seconds, then reactivate."


Setting up a script to tell the drone to "Go do X, and shut down wireless while doing X (unless other pre-defined circumstances (things you know it won't be able to handle without oversight/back-up, things its programming doesn't cover, etc) come up before it finishes its assignment)" is fine. Similarly, having the Drone's wireless connection blinking in and out so that it's only open to having signals sent to it every other turn is fine (though it seems a bit odd to do it that way). What it sounds like you're wanting, however, is "my drone only has wireless enabled for the portion of a combat round in which I am acting and is disabled whenever it's anyone else's turn," which doesn't work, since most/all of the difference in order of actions represented by initiative is an abstraction.

Think shoot-outs in old Westerns. Both gunslingers move to draw and shoot the other at (roughly) the same time, but one of them is slightly faster and manages to shoot their opponent before they can get a shot off. That's what the difference in initiative is intended to represent, even if at the table it looks more like the other players sitting on their hands waiting for the Street Samurai to finish his/her action.
Go to the top of the page
 
+Quote Post
Draco18s
post May 11 2009, 07:12 PM
Post #18


Immortal Elf
**********

Group: Members
Posts: 10,289
Joined: 2-October 08
Member No.: 16,392



QUOTE (DuctShuiTengu @ May 11 2009, 02:08 PM) *
That's what the difference in initiative is intended to represent, even if at the table it looks more like the other players sitting on their hands waiting for the Street Samurai to finish his/her action.


"Why did you let him hit you?"

"It was his turn!"

~Press Start (the Movie)
Go to the top of the page
 
+Quote Post
Telion
post May 12 2009, 12:25 AM
Post #19


Moving Target
**

Group: Members
Posts: 152
Joined: 11-May 06
Member No.: 8,547



Some Defensive measures I've Thought to use:

Giving drones a hefty comlink to run a number of defensive programs.
This gives the drone plenty of space to run its autosofts behind the defensive node. They would be directly connected so as to avoid any means to bypass.

Since the drones are being slaved to the riggers link, they can send their access log onto riggers comlink/nexus.

24 hour full encyption on all nodes.
Dynamic encryption on all links.

Obviously running in hidden mode, but add in rating 6 non-standard wireless link.

I'd consider a botnet full of agents and IC on the riggers node, and moving around the network hunting for others.

Feel free to poke holes in these ideas.
Go to the top of the page
 
+Quote Post
Wasabi
post May 12 2009, 12:34 AM
Post #20


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



QUOTE (Zaranthan @ May 11 2009, 09:33 AM) *
This is flagrant metagaming and won't fly on anyone's table, sorry. Issuing orders isn't an instant of thought followed by exactly six seconds of thumb-twiddling. It's constant adjustments via your command panel to react to the situation at hand. We just resolve the results every six seconds or so for simplicity.


The dog brain follows the orders. If the interval being 6sec bothers you change it to 10, 15, or whatever you like. I try to use multiples of six seconds to make it simpler to have it turn back on. You could also tell it to turn back on after 6 increments of a variable with +1 per long burst fired, +2 per 10 rounds of full auto fired, +1 per 2sec spent aiming and bog it down as much as you like. I've used the timed-wireless-off before and its not for the meek of heart. Imagine if your favorite honey comes out of a club panicking from a firefight and your drone kills her dead as shit because you had no way to tell it to stop.

And yes, I can twiddle my thumbs in combat as my drone's dog brain acts. I spend a lot of time along with the multiprocessing echo doing nothing but updating the tactical AR and e-sensing opponents thankyouverymuch. (IMG:style_emoticons/default/wink.gif)
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post May 12 2009, 01:05 AM
Post #21


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Telion @ May 11 2009, 06:25 PM) *
Some Defensive measures I've Thought to use:

Giving drones a hefty comlink to run a number of defensive programs.
This gives the drone plenty of space to run its autosofts behind the defensive node. They would be directly connected so as to avoid any means to bypass.

Since the drones are being slaved to the riggers link, they can send their access log onto riggers comlink/nexus.

24 hour full encyption on all nodes.
Dynamic encryption on all links.

Obviously running in hidden mode, but add in rating 6 non-standard wireless link.

I'd consider a botnet full of agents and IC on the riggers node, and moving around the network hunting for others.

Feel free to poke holes in these ideas.



Well...
Using Strong Encryption (24 Hour) and Dynamic Encryption would remove the abilities of the Hacker Completely, which would completely eliminate the utility of any Hacker types (includiong Technomancers)... These schema make sense in the real world, but have no real place in a game that makes these archtypes useful... Implementation kills the archtypes...

Instead, Slave all nodes to communications nodes that are controlled... slap on High rating Encryption, and high rating Data bombs on all access points and then utilize patrolling IC for defense... You will still probably get hacked, but it WILL slow them down greatly, and may even manage to keep your nodes somewhat clean... keep in mind that all nodes are in a perpetual state of being hacked in the world of 2072, with viral advertising, surveillance, etc.

Just my preference though, as this allows the hacker to still be useful (though challenged)... resetting the decryption test to 1 roll per day will destroy the capabilities of hackers/technomancerssuch that you will need new characters for those players...

Seems counterproductive to me...
Go to the top of the page
 
+Quote Post
Telion
post May 12 2009, 01:11 AM
Post #22


Moving Target
**

Group: Members
Posts: 152
Joined: 11-May 06
Member No.: 8,547



Couldn't they attempt to attack the encrypt program directly?
Go to the top of the page
 
+Quote Post
AngelisStorm
post May 12 2009, 01:14 AM
Post #23


Moving Target
**

Group: Members
Posts: 616
Joined: 30-April 07
From: Edge of the Redmond Barrens, Borderline NAN. Runnin' the border for literal milk runs.
Member No.: 11,565



QUOTE (DuctShuiTengu @ May 11 2009, 02:08 PM) *
...stuff...


If this is your first account here Tengu, then congratulations and welcome.

Back to the topic at hand. I meant what I said litterally. The poster I was responding to said it was metagaming. I say it's not, for the reasons myself and other people have stated.

However, to answer your point, yes, I'm sure you could set up a really bitznitchy script that turns itself on and off at "random" intervals, in a pattern that only you (and anyone else who has ever take a standardized test before) can figure out. If I act before everyone else... wait, upon re-reading your example, you appear to be agreeing with me. Faster is faster. If you can shoot the other guy before he can shoot you, then you can give your drone an order then shut the wireless off.
Go to the top of the page
 
+Quote Post
Tymeaus Jalynsfe...
post May 12 2009, 01:19 AM
Post #24


Prime Runner Ascendant
**********

Group: Members
Posts: 17,568
Joined: 26-March 09
From: Aurora, Colorado
Member No.: 17,022



QUOTE (Telion @ May 11 2009, 07:11 PM) *
Couldn't they attempt to attack the encrypt program directly?



To directly attack a program , they must BE IN THE NODE... until they actually crack the node, then no, all they could do is decrypt it... and honestly, once decrypted, why bother bringing down the Encryption, just reboot the system, everything will go down with it...
Go to the top of the page
 
+Quote Post
Wasabi
post May 12 2009, 01:28 AM
Post #25


Running Target
***

Group: Members
Posts: 1,251
Joined: 11-September 04
From: GA
Member No.: 6,651



Telion, commlinks on drones are important but their need can be mitigated with program options. Check out the Ergonomic and Optimization-3 program options in Unwired. [pages 114-115]. Notes that you could also have a third option if its a rating 6 program.

When using a drone that comes with a weapon mount it counts as a security drone in the opinion of most (if not all) GM's. This means its commlink is 4/4/4/4
Load qty4 rating-6 ergonomic programs and qty8 non-ergonomic programs and you've got 12 programs running. The node then suffers a -1 for being overloaded. With Optimization-3 your 12 modded programs still all run at rating 6 and intruders without Optimization for their programs suffer.

Buying program options for every program is tedious [Do you get your Databomb with Pavlov or Optimization... decisions, decisions!] but they work pretty well. Just a thought to add to your list of ideas, sir!
Go to the top of the page
 
+Quote Post

2 Pages V   1 2 >
Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 26th April 2024 - 03:35 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.