IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Authorization for Drones, Now I'm Spoofed!
Tsithlis
post Mar 9 2010, 03:00 PM
Post #1


Target
*

Group: Members
Posts: 92
Joined: 28-August 08
Member No.: 16,286



So under Authorization and Authentication (p. 225 SR4 Sp. Ed.) it states that in order to allow you access to anything beyond a public account [...] the node must have your access ID associated with an access level/account privileges. (for example, your soycaf dispenser will have your access ID on a list that shows that you have an admin account on its node).

So if you've spoofed your Access ID can you log into your drones or vehicle, it seems to imply that when you changed your ID they would no longer recognize you as having an account on them.
Go to the top of the page
 
+Quote Post
Night Jackal
post Mar 9 2010, 03:10 PM
Post #2


Target
*

Group: Members
Posts: 76
Joined: 18-January 09
Member No.: 16,789



That's why that added that accounts can be set up to require a passcode for access. This allows you to spoof your Access ID and still log into your own drones.

Also...point out...spoofing your access ID will require you to relog into the Matrix. As the connection router was changed at the source.
Go to the top of the page
 
+Quote Post
Tsithlis
post Mar 9 2010, 03:22 PM
Post #3


Target
*

Group: Members
Posts: 92
Joined: 28-August 08
Member No.: 16,286



First I'm not disagreeing with you... but I really dislike the way this is worded.

QUOTE
In order to give you access to anything beyond a public account, the node must be given three things.
This states that if it dosen't have all three of the following things then the login fails.

QUOTE
The First is your access ID.


QUOTE
Second, the node must have you're access ID associated with an access level/account privileges. This is called authorization.


QUOTE
Third, you must have a way of proving your are the person who has the authorization in question; this is authentication.
Then it goes on to say how you can authenticate yourself. But here is the problem. The first sentence says that all three things must be given. If you have spoofed your Access ID then that ID will not qualify for the second part which states that the ID in question must be listed in the node with those account privileges. Which means you would never get to the authorization part because the second part would fail.
Go to the top of the page
 
+Quote Post
Neowulf
post Mar 9 2010, 05:19 PM
Post #4


Moving Target
**

Group: Members
Posts: 103
Joined: 20-October 09
Member No.: 17,773



If the device MUST have your access ID associated with an existing account for it to grant you anything above public access, then how do people configure new devices?
Your interpretation says that their brand new Deluxe Caffo-Soy 9000 will refuse to work because it doesn't have their access ID already. And there is no way to login to it with the default administrator account and password to associate it with yourself because again, it doesn't already have your access ID.

How about this, Commcodes, the email address/phone number of ze future, is specifically there so you can have a standard online identified people can use to contact you, no matter what commlink you're using at the time.
But by your interpretation commcodes are worthless, because to login to the commcode provider and register your current access ID you have to login using the same access ID you used to signup.
Go to the top of the page
 
+Quote Post
Tsithlis
post Mar 9 2010, 08:33 PM
Post #5


Target
*

Group: Members
Posts: 92
Joined: 28-August 08
Member No.: 16,286



Again I totally agree with you. It would be stupid to think it would be that way because you would never be able to log into anything after the first time you spoofed your access ID. What I'm saying is that's the way it's written in the book and certainly needs to be changed.
Go to the top of the page
 
+Quote Post
Neowulf
post Mar 9 2010, 09:58 PM
Post #6


Moving Target
**

Group: Members
Posts: 103
Joined: 20-October 09
Member No.: 17,773



Yeah, the text does need to be rewritten. That sentence on authorizing is correct for a post login situation, as in you log in and the node links your access ID with the account, and authorizes you to access certain files and features.
In a pre-login situation the act of linking an account to a specific access ID is part of authentication, and is normally a high security "it's better to lose the files than them fall into the enemies hands" situation, not par for the course with coffee machines and can openers.

If you just cut out that second requirement it all makes sense.
A better way to explain it is "An account on a low security node may have one or more access IDs associated with it for automatic authorization, bypassing the need for other forms of authentication. High security nodes may restrict certain accounts to specific access IDs, refusing any other IDs from authenticating as that user."
Go to the top of the page
 
+Quote Post
Night Jackal
post Mar 10 2010, 05:48 PM
Post #7


Target
*

Group: Members
Posts: 76
Joined: 18-January 09
Member No.: 16,789



Ok....I see what they did...they listed the Access ID Accounts from Unwired page 54 and did not explain that there are other accounts that don't need to know the Access ID to allow user to log on.

See Page 54 Protocols in Unwired.

It describes all the Account types that you can have set up.

SR4A's only describing one of 3 account.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 25th April 2024 - 08:04 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.