calypso
Feb 28 2006, 10:19 PM
So, I'm working on some generic system setups. You know... daisy-chained, master-slave setup, others I'm sure.
The most common, and the one advocated by the book, is the master-slave setup. The commlink is the master, and all of your other devices (cyberware, cameras, etc) are subscribed to it.
This has benefits: The (probably) better security of the commlink must be breached before a hacker can access your other devices, since your other devices will only talk to your commlink.
However, is it possible, using the Spoof Command option, to interface directly with someone's stuff by pretending to be their commlink?
Calypso
Darkness
Feb 28 2006, 10:24 PM
calypso
Feb 28 2006, 10:32 PM
Thanks. That more or less confirmed what I thought, with the possible exception of: Sniffer. I was assuming it would go:
Device A will only talk to Device B, and vice versa.
Make a Spoof test against Device A so that it thinks I'm Device B, and do as I please.
However, I may have to include the following step (which was mentioned in that thread).
Make a Sniffer test to intercept and analyze their communications.
Calypso
mdynna
Feb 28 2006, 10:39 PM
I have been making my players make a successful Trace operation as well as the Intercept test as the rules specifically state that a successful Trace gets you the Commlink ID. Don't forget having to Decrypt the signals if they're Encrypted.
Darkness
Feb 28 2006, 11:59 PM
QUOTE (calypso @ Feb 28 2006, 11:32 PM) |
Thanks. That more or less confirmed what I thought, with the possible exception of: Sniffer. I was assuming it would go:
Device A will only talk to Device B, and vice versa. Make a Spoof test against Device A so that it thinks I'm Device B, and do as I please.
However, I may have to include the following step (which was mentioned in that thread).
Make a Sniffer test to intercept and analyze their communications.
Calypso |
IIRC correctly, it was mentioned in the thread given, that you have to use Electronic Warfare rules to find the correct wireless transmissions between A and B. Intercepting a wireless Signal (p. 225) includes an Electronic Warfare + Sniffer (3) test, so your assumption was right on target.
TinkerGnome
Mar 1 2006, 12:16 AM
There is nothing in the rules that lets you use spoof to get in the way of any subscriber link except for drones and agents.
Just thought I'd point that out.
If I were to allow it as a GM, I'd only allow the hacker to issue commands to the device and not really hack it. Anything you do with two way communication involved is going to tip off the real commlink that something is up.
calypso
Mar 1 2006, 01:38 AM
To say that a drone is different than any other Node is silly.
Anything that is communicating with something else is subject to a "man in the middle" attack. While it's true that spoofing commands to something isn't the same as having compromised it, it very easily can be.
1) If the thing with which it thinks it's communicating has account creation priveledges, then you can spoof the command.
2) Really, the only way such an attack, in this case, can be detected is if you say to Device A "Okay device, give me admin priveledges." Device A broadcasts "Okay!" Which both you AND Device B receive. Device B kinda goes "... huh? I didn't ask for that. ALERT!"
Calypso
TinkerGnome
Mar 1 2006, 02:33 AM
QUOTE (calypso) |
To say that a drone is different than any other Node is silly. |
Not really. The only rules for using spoof to mess with a device are very specific to drones and agents. The drone gets to use its pilot program to resist the inserted command. This leads me to believe that drones really are different from most other nodes.
calypso
Mar 1 2006, 03:27 AM
If you want to do a strict reading of the rules, Agents don't have a Pilot rating.
TinkerGnome
Mar 1 2006, 03:32 AM
QUOTE (calypso) |
If you want to do a strict reading of the rules, Agents don't have a Pilot rating. |
Huh?
QUOTE (SR4 @ p227) |
Agents have a Pilot attribute just like drones |
calypso
Mar 1 2006, 03:45 AM
Ah, right you are. I also think I now understand the argument for not allowing Spoofing. It only allows spoofing on things that are autonomous.
I believe I found what I wanted. Page 224:
QUOTE |
Intercepted communications can be copied/recorded without any additional tests. If the hacker wishes to block some parts of the traffi c or add in his own, he must make a successful Computer + Edit Test (see Edit, p. 218). If the hacker wants to insert faked traffi c, so that it looks like it comes from one party or the other, he must beat the recipient in an Opposed Test between his Sniff er + Hacking and the target’s Firewall + System. |
That (basically) allows a man-in-the-middle attack.
Calypso
Backgammon
Mar 1 2006, 01:49 PM
Not saying the point is moot, but a smart setup will be using a skinlink between slave nodes and his commlink. That means the slaves aren't wifi enabled, making them immune to wireless hacking. You'd HAVE to go through the commlink to get to them.
calypso
Mar 1 2006, 03:46 PM
Indeed. And I also expect that high security networks will still be wired, with no connection to the Matrix.
But I suspect that the majority of people are too oblivious to how it all works to have a secure setup. Just like in real life.
Calypso
Rotbart van Dainig
Mar 1 2006, 04:17 PM
QUOTE (calypso) |
But I suspect that the majority of people are too oblivious to how it all works to have a secure setup. Just like in real life. |
Especially when it is much cheaper and faster than digging up walls.
BTW, let's see whether Unwired features power line LANs.
hobgoblin
Mar 2 2006, 12:02 AM
hmm, i wonder if MASER is still in fashion...
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please
click here.