IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Data Bombs and Spoof
Kirk
post Aug 15 2011, 04:26 PM
Post #1


Moving Target
**

Group: Members
Posts: 210
Joined: 4-August 11
From: Vicinity Houston
Member No.: 34,911



(crossposted at Shadowrun4 forum)

I'm requesting a rules check as it looks to me as though there's a defense against (some) spoofing.

Put a databomb on the access port.

As I read the rules, to issue a command (with the access ID) the node must be accessed.

Now I'd not put this on devices that have a wide range of interaction. Putting them on the slaved drones and other devices, however, looks to me like a nice way to cover the only weakness of slaved devices -- their vulnerability to spoof attacks.

However, I'm still learning and could be wrong, so I'm asking for a doublecheck. Thanks.
Go to the top of the page
 
+Quote Post
Aku
post Aug 15 2011, 04:38 PM
Post #2


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



MM, i dont think so, since the DB only goes off if someone is unauthorized, if they spoof and succeed they're authorized, however,i would say if they spoof and fail, then it could go boom
Go to the top of the page
 
+Quote Post
Kirk
post Aug 15 2011, 05:09 PM
Post #3


Moving Target
**

Group: Members
Posts: 210
Joined: 4-August 11
From: Vicinity Houston
Member No.: 34,911



No, you set a different passcode for the data bomb.
QUOTE
When you [set a data bomb], you must
choose the rating for the data bomb (up to the rating of the Data
Bomb program), whether or not it will delete the file or crash the
node to which it is attached when activated as a secondary effect, and
the passcode required to deactivate it.

and
QUOTE
If the passcode is used, the data bomb does not activate
and remains attached to the file or node.


On the other hand I maybe found the answer, in the middle of those two quotes.
QUOTE
The way a data bomb triggers depends on whether it is attached
to a file or a node: it activates when a file is accessed, or when an icon
logs onto a node, respectively, without using the data bomb’s passcode.


The question is whether spoofing is logging on for that single command. Just as with hacking on the fly and probing it has to deal with a firewall check. Unlike either, a failure means no alert as the command is considered 'just a bad packet' and discarded.

I know that as GM I'll have to make up my own mind, but I'm looking for some clarity for basis. at this point probably not, but the possibility...
Go to the top of the page
 
+Quote Post
Fatum
post Aug 15 2011, 06:16 PM
Post #4


Runner
******

Group: Dumpshocked
Posts: 2,801
Joined: 2-September 09
From: Moscow, Russia
Member No.: 17,589



I'd say no, it's doesn't count as a login - after all, you're not hacking the node's login mechanism, and while spoofing a slaved device you can't as a result login to the node it's slaved to. But ymmv.
Go to the top of the page
 
+Quote Post
LurkerOutThere
post Aug 15 2011, 06:32 PM
Post #5


Runner
******

Group: Dumpshocked
Posts: 2,946
Joined: 1-June 09
From: Omaha
Member No.: 17,234



Databombs only affect you if your logging in, if your spoofing your not logging in. By design slaving is vulnerable to spoofing there should not be a 100% foolproof unhackable system anyway.
Go to the top of the page
 
+Quote Post
Kirk
post Aug 15 2011, 07:38 PM
Post #6


Moving Target
**

Group: Members
Posts: 210
Joined: 4-August 11
From: Vicinity Houston
Member No.: 34,911



Lurker, this wouldn't make it unhackable.

It would just make it a bit more difficult/risky to spoof. (grin)
Go to the top of the page
 
+Quote Post
Yerameyahu
post Aug 15 2011, 08:36 PM
Post #7


Advocatus Diaboli
**********

Group: Members
Posts: 13,994
Joined: 20-November 07
From: USA
Member No.: 14,282



Spoofing is not logging in. It's touchless. Even if the data bomb could go off, there's literally nothing there for it to hit.
Go to the top of the page
 
+Quote Post
Aku
post Aug 15 2011, 09:32 PM
Post #8


Running, running, running
*****

Group: Dumpshocked
Posts: 2,220
Joined: 18-October 04
From: North Carolina
Member No.: 6,769



hurray for right answer, wrong reason (IMG:style_emoticons/default/biggrin.gif)
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 24th April 2024 - 12:38 AM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.