Help - Search - Members - Calendar
Full Version: chained commlinks
Dumpshock Forums > Discussion > Shadowrun
sunnyside
It's pretty straightforward to get your commlinked hacked or hack someone elses. In fact given enough time it's almost impossible to stop.

Now I figure the reason corp systems don't get hacked by everyone with a decent stealth program and hacking 1 is because they have tiered systems. You can spend hours at the basic system(which may also have usefull stuff sometimes) but once you get inside and start on the next tier you run the risk of running into always active IC, Agents, or security deckers keeping an eye on the place.

I was wondering if something like that is possible with personal comlinks. You have one comlink with all your stuff on it. Than attach it to a second via fibre and use the second comlinks wireless. In the second comlink is just a very mean always active IC looking for people trying to access the primary comlink (give it periodic matrix perception tests or something against a hacker).


Does all that sound right? I'm just making the transition to SR4 now.
DireRadiant
So the commlink that is connected with a wire will trust everything that comes over a wire, and not any wireless transmissions?
RunnerPaul
QUOTE (DireRadiant)
So the commlink that is connected with a wire will trust everything that comes over a wire, and not any wireless transmissions?

You turn the wireless off on Commlink #1. Trust is not an issue if that path is not even made available in the first place.
Demerzel
QUOTE (SR4 FAQ)
What does subscribing/slaving a device mean, in terms of access/hacking? If a device is subscribed to someone else's commlink, can you hack/spoof that device directly, or do you need to hack the commlink first? If a group of devices were subscribed in a daisy-chain together, could you hack the last device directly, or would you need to hack them all in successive order?

[ . . . ]

This means that even if multiple nodes are daisy-chained together, each subscribed or slaved to the next, you don't need to hack/spoof them all in order to hack/spoof the last one -- you can go straight to the last node and attempt to hack/spoof it.


Does this apply?
Butterblume
Of course I chained my comlink - to my wrist, it would be bad if some pickpocket lifted it (The chain isn't thick enough to really hinder a determined assailant, since I prefer loosing the comlink to getting my hand cut of...)
wobble.gifspin.gif
RunnerPaul
QUOTE (Demerzel)
QUOTE (SR4 FAQ)
What does subscribing/slaving a device mean, in terms of access/hacking? If a device is subscribed to someone else's commlink, can you hack/spoof that device directly, or do you need to hack the commlink first? If a group of devices were subscribed in a daisy-chain together, could you hack the last device directly, or would you need to hack them all in successive order?

[ . . . ]

This means that even if multiple nodes are daisy-chained together, each subscribed or slaved to the next, you don't need to hack/spoof them all in order to hack/spoof the last one -- you can go straight to the last node and attempt to hack/spoof it.


Does this apply?

That FAQ question dealt with devices chained together by wireless connections. If only one device in the chain has wireless enabled, then, yes, you would have to go through that device if wireless hacking is your intent, even if your goal is the device with wireless disabled.
Demerzel
The FAQ topic does not even mention wireless connections. It's about subscribing/slaving. It starts with:

QUOTE (SR4 FAQ)
The act of subscribing is merely the act of creating and maintaining a connection between two nodes.


Linking via a wireless or wired connection is not in anyway implied.
cetiah

QUOTE

Now I figure the reason corp systems don't get hacked by everyone with a decent stealth program and hacking 1 is because they have tiered systems. You can spend hours at the basic system(which may also have usefull stuff sometimes) but once you get inside and start on the next tier you run the risk of running into always active IC, Agents, or security deckers keeping an eye on the place.



Actually, I'm really trying to emphasize to my players that "nodes" are not "hosts". The advantage of a node is that a hacking check is just a couple of rolls away. Also, nodes are, by definition, wirelessly exposed. That is, they can't really be tiered.

If I have a bunch of tiered hosts to try to reflect high security, then we have the same problem we had in previous editions of Shadowrun where we needed to spend an hour for the hacker to make his separate run.

No, the reason corp systems don't get hacked by everyone is that they have a huge freakin' Firewall rating, probably higher than 6. In fact, if you only one Node, not only does that have all kinds of wireless networking convenience (which is more important than privacy and security in 2070), but you can also easily (and cheaply) protect that node with a single high firewall rating, a single security hacker, and a bunch of IC agents. That's why corps don't get hacked.

It's not because they have a ridiculously complex networking setup of linked hosts; presumably the successful Hacking check for access means that if the player succeeds he successfully accesses the node he was trying to access. If there's a lot of junk to get there, that just means the Threshold for that access check is really high.

Nodes are not hosts. It's like a mantra in my games. And I think it makes it more fun for everyone.


Demerzel
QUOTE (cetiah)
Nodes are not hosts.

The problem is that hosts are nodes.
RunnerPaul
QUOTE (Demerzel)
The FAQ topic does not even mention wireless connections. It's about subscribing/slaving. It starts with:

QUOTE (SR4 FAQ)
The act of subscribing is merely the act of creating and maintaining a connection between two nodes.


Linking via a wireless or wired connection is not in anyway implied.

Regardless, to be able to hack something, your hacking programs must be able to access it. Otherwise, things like wireless blocking paint and corps that keep nodes offline from the matrix have absolutely no meaning.


If the only place you can access a node, is from another node, then you must first access that other node.
Butterblume
QUOTE (cetiah)
No, the reason corp systems don't get hacked by everyone is that they have a huge freakin' Firewall rating, probably higher than 6.  In fact, if you only one Node, not only does that have all kinds of wireless networking convenience (which is more important than privacy and security in 2070), but you can also easily (and cheaply) protect that node with a single high firewall rating, a single security hacker, and a bunch of IC agents.  That's why corps don't get hacked.

Even if the hacker boasts rating 6 everywhere, and hacks with probing the target, a node with a rating 6 firewall and analyze program has a chance of about 17% to detect the break in.

At that point, the corp will probably try to track the intruder and geek/arrest him...
Demerzel
QUOTE (RunnerPaul)
If the only place you can access a node, is from another node, then you must first access that other node.


Not true. All the nodes in the SR world are supposed to act as network switches/hubs/routers (Whatever you want to call them). Hence the concept of a mesh network, where devices have myriad connections, and allow network traffic to flow.

Wireless disrupting paint or pure wired networks are useful in that they can be completely disconnected from the Matrix. The only way to access them is to walk in (in the case of a network isolated by wireless blocking material) or plug in (in the case of purely wired networks).

Consider if I want to place a call from my commlink in Seattle to my old bartender contact in Shanghai I do not have to do anything special to access that huge array of nodes in between the two of you.
Trigger
But if a node has its wireless connectivity shut down, running only within the boundaries of itself, sort of like it being a wired system and not part of the Matrix. If that wourld were connected to another node through optic cables and that other node was wireless capable then you can access the first non-wireless node only through that second wireless node. Or by actually being in the first node.

This also can translate to commlinks, as originally asked. If 'link A has its wireless shut off but is connected to commlink B by an optic cable, and commlink B has its wireless on, then you can only wirelessly access commlink A by first going through commlink B. The only other way to get at commlink A is if you get the actual commlink and directly hack into it.
Demerzel
QUOTE (Trigger)
you can only wirelessly access commlink A by first going through commlink B

Yes, but you don't gave to Hack into or log into Commlink/node B to get to Node A, you just get there, as per the FAQ.
Serbitar
Which basically kills the concept of chocke points. As per the FAQ, you will never ever have to hack anything except the node you want to break in, even if it is behind 5 nodes of high security chokepoints. And as you can always probe a target to gain admin access, you have a 83% to hack into every node there is with any access to the matrix without being noticed, as admin that has, also per FAQ (which I think is OK), no restrictions.

Good bye security.

You can also directly hack into any cyberware, bypassing the comlink.

That is not what I want. Thats why Im writing SGMs.
LynGrey
What you do... is put all your important stuff on one commlink... and put it in Hidden mode.... and have another link.. thats completely out in the open with a little bit of normal stuff... first off a normal scan will pop up your 'link... finding the hidden 'link tho.. is just ridciulously hard to find given the fact that they have no idea what to look for.. besides "hidden nodes" then in all that they have to search for what ever yours might be.... Cuts back on the wiz kid tring to hack into everything.

And whos gunna keep hacking away when they find your node anways.. and notice that its pretty basic?
Serbitar
People who are not stupid.
Demerzel
QUOTE (Serbitar)
People who are not stupid.

They exist?
Butterblume
QUOTE (Serbitar)
Which basically kills the concept of chocke points. As per the FAQ, you will never ever have to hack anything except the node you want to break in, even if it is behind 5 nodes of high security chokepoints.  And as you can always probe  a target to gain admin access, you have a 83% to hack into every node there is with any access to the matrix without being noticed, as admin that has, also per FAQ (which I think is OK), no restrictions.

I'm not that satisfied with the FAQ ruling. Sure, on the one hand having tiered Nodes kills the spirit of the SR4 rules (being easy and fast). On the other hand, it's kind of wierd getting everywhere without encountering real problems.

I can accept this for now, but I really hope they can come up with something more reasonable in unwired.
RunnerPaul
QUOTE (Demerzel)
Not true. All the nodes in the SR world are supposed to act as network switches/hubs/routers (Whatever you want to call them). Hence the concept of a mesh network, where devices have myriad connections, and allow network traffic to flow.

Not true. The sidebar "Network Security" on p.223 explicitly states "Not all networks are configured as mesh networks—many corporate systems, in fact, retain a traditional tiered network structure."

I see no reason to deny someone who's got an extra commlink the same benefits that corporate sysadmins benefit from.
Demerzel
QUOTE (RunnerPaul)
I see no reason to deny someone [ . . . ]

You mean other than the developers writing a FAQ and explaining it?
2bit
QUOTE (Demerzel)
QUOTE (Trigger @ Jan 4 2007, 03:34 PM)
you can only wirelessly access commlink A by first going through commlink B

Yes, but you don't gave to Hack into or log into Commlink/node B to get to Node A, you just get there, as per the FAQ.

The FAQ question assumes wireless connectivity because that is the default mode for devices and commlinks. ohplease.gif ohplease.gif ohplease.gif They wouldn't make a huge statement like "you can hack devices wirelessly even if they can't receive wireless signals" in such a roundabout way. Wake up. You can't trick a commlink with wireless turned off into accepting your wireless signals. It's not listening!!!
Butterblume
The point is, the one wireless node in the chain acts as a router to the wired nodes.
So even if the node doesn't accept wireless signals, it still accepts the signals routed from the one wireless node...
Trigger
I have ruled that if a wired node is attached to a wireless node, then you must first go through the wireless node to reach the wired one. It is like the wired node is an external hard drive on your computer, the only way to access it is to go through your computer, and if your computer is part of a netwrok then others can go though your computer to access said hard drive. But if your computer has a security system in place to limit people from accessing the hard drive, then they first have to get through that security to reach the hard drive.
sunnyside
Ok I can kind of see bypassing the first node. After all trafic is passing through it to the second, which is how the whole of the internet/matrix works. So someone using stealth or whatever to pretend to be that traffic could interact with the second device.

However what's with all the netword security talk on p223 about then? Is it just FAQed away?

Ah well I suppose it makes for more interesting running when you have to get the decker their in person.

And since any system can be comprimised at the admin level by copying a stealth 5 program a few times and sending out some kids with hacking 1 it makes sense that anything remotly useful would be held in offline storage.


kerbarian
QUOTE (sunnyside)
And since any system can be comprimised at the admin level by copying a stealth 5 program a few times and sending out some kids with hacking 1 it makes sense that anything remotly useful would be held in offline storage.

The way the rules are set up, I think you have to look at Matrix security the same way you look at physical security -- it has to be an active defense. If you look only at passive physical defenses (sturdy walls, etc.), you could send some kids with sledgehammers and dynamite to just about any corp facility, and they could break in. The reason they can't pull it off in practice is because there are security guards, drones, etc. that will react to the break-in attempt. Likewise, you can send a kid with a good stealth program to hack into a corp network, and it's the security hackers, IC, etc. that need to react to the hack and stop it.
cetiah
I don't understand this strong desire for a tiered network with chokepoints. There really isn't much of a reason to have chokepoints at all if you have a sufficiently large node.

Without chokepoints:
The entire network for a large office building could be a single node with a firewall rating of 8. This basically becomes the threshold to do anything on that network, from modifying security feeds to opening doors to downloading files. The emphasis now becomes centered on rolling to accomplish something every time a point on the run comes up where you need to accomplish that task. A kid with stealth-6 can't hack the network without physically being in the building (or some other creative equivalent). Also, in the case of 0 signal items such as cameras and maglocks, you may have to be physically right next to the damn thing to establish a good connection.

With chokepoints:
The entire network for a large office building goes through a single node, located somewhere in the building. The hacker must still be in the building, although now its a little harder to explain why he needs to be right next to a maglock or camera instead of somewhere in the lobby. After all, if the camera is conncted to the chokepoint, and the hacker is connected to the chokepoint, all of the hacker's actions can be taken from a janitor's closet for all anyone cares. The kid with stealth 6 is still not an issue, because he needs to be in the building. To hack in, a hacker needs to access the high firewall node ( firewall 8 ), then access another host, and then do his thing. But why stop there? Let's have 5, 10, 20, 50, 5,000 chokepoint hosts with firewall 8s. I'm sure the player won't mind - he loves rolling d6s, right? Let's just have a little game with him for the next hour or so, while the other players wait patiently.
cetiah
By the way, I meant for that to read as ( firewall 8 ), not (firewall cool.gif. I don't smile often... smile.gif
RunnerPaul
QUOTE (Demerzel)
QUOTE (RunnerPaul @ Jan 4 2007, 04:09 PM)
I see no reason to deny someone [ . . . ]

You mean other than the developers writing a FAQ and explaining it?

Wouldn't be the first time I've had to disregard a FAQ answer as being bad for the integrity of the game setting. Besides, if the Developer felt that strongly that tiered networks shouldn't exist, the book would have been Errata'ed to say so.
Demerzel
I think you should be clear then that you're talking about house rules and modifying the game from how it is when you're discussing something like that then. There's a risk you will be giving someone a false impression if you don't indicate that you are suggesting a house rule.
RunnerPaul
Alright, just so it's clear: My stance that the owner of a PAN can turn "mesh networking" on and off for devices on their PAN when they turn off wireless connectivity for that device, based on such concepts as "Rather than allowing any stranger access to all of your electronics, anyone that wants to interact with your PAN must connect to your commlink first," and "Not all networks are configured as mesh networks" which may be found respectively on p.212 and p.223 of the rulebook that we all paid good money for must certainly be houserules, because they apparently contridict an answer given in a FAQ that any given Shadowrun player may or may not even see depending on how net-savvy their gaming group is.

A answer, by the way, to a question phrased in the terms of subscription lists, and not terms of Mesh Network vs. Tiered Network, so there's the distinct possibility that the Line Developer may not have realized that that's what the question was really about.

Happy now?
Trigger
Very! biggrin.gif
Serbitar
/signed.
The Jopp
There is one little interesting tidbit though. Pilots and Agents technically have their own persona since they have their own Hardware, Software, System, Signal and Response making up their OWN persona.

So, if hacker A has no subscription to Drone A then Drone A could still have a subscription to Hacker A.

This would of course mean that in order for a two-way communication BOTH devices would have to have a subscription.

This poses a few problems since nodes are also devices and must have their own subscription lists in order to have any kind of two-way communication (send / receive data). This would in that case limit any matrix connection to System X2 users at once which is completely unrealistic.

So, do you really need a subscription list in order to just browse the net? Well, according to the FAQ you DO.

QUOTE

The act of subscribing is merely the act of creating and maintaining a connection between two nodes. Subscribing does not automatically grant access to a node (unless it happens to be a public all-access node) -- that is the purview of accounts. Subscribing is essentially the "handshake" that occurs between two nodes, a protocol check and very basic form of authentication so that each node knows it's connecting with the right other node.


So in order to do ANYTHING you have to use a subscription “slot� of your persona just to log on to the matrix.

The good part is that we can have a one-way subscription to just monitor data from a node/agent/drone the bad side is that it makes the matrix even slower.

My take on this is that Subscription is only needed if you want a two-way communication between two devices – it is not needed for matrix use in general.

It also seems that we need either better rules for Accounts & Access levels (viewer/user/security/admin) that people can use to make Matrix security any kind of useful.

Then we have the fun part of controlling persona of drones and access levels. Each commlink plus their programs and hardware have a unique persona. Use 1 commlink for setting up a User Access level for a secondary commlink. The secondary commlink gains the following User access:

QUOTE

Allowed
Drone Rigger Actions

Not Allowed
Shut Down, Reset, Change Subscription level/list


This way anyone checking out the controlling persona will be unable to change subscriptions in order to take over the drone, spoofing regular commands would still work.

On another note: How would you analyze someones persona running in hidden mode with active stealth program – got to find him/her first.

Am i completely off in those thoughts?
Serbitar
Well, at least for my part, I got most of this covered in my sgm 1.0. As for RAW, I have no idea.
RunnerPaul
I know this was a dead thread, but I just noticed something today that I feel adds to the discussion.

QUOTE (Demerzel)
QUOTE (RunnerPaul @ Jan 4 2007, 04:09 PM)
I see no reason to deny someone [ . . . ]

You mean other than the developers writing a FAQ and explaining it?


That'd be the same FAQ that includes the following line under requirement #3 for hacking cyberware (or other device), correct?

"Alternately, the hacker must be able to access another device the cyberware/device is linked to -- such as the character's commlink for example -- and then hack that device first."

If mesh networking is the only mode of operation for personal electonic devices, then there would be no need to "hack that device first." But that's exactly what one part of the FAQ has to say on the matter.
ornot
The thing I don't get about this whole daisychaining of commlinks business is why you need to hack the second (hard-wired) commlink. The first (wireless) commlink is a trusted subscriber to the second commlink. So surely if you've hacked the first commlink - which is communicating with the second commlink - you can just send data or commands to the second commlink with impunity? You don't need to penetrate the second firewall as data from the first commlink must be allowed to access the second commlink.

With 'ware however, you need to hack the commlink first as 'ware has a puny signal, and you need to hack the 'ware seperately as you're trying to interact with it in a non-normal manner and effectievly break it.

But then I was never into hacking in the older SRs as it generally got glossed over with a few dicerolls by the GM. And I also have fairly limited understanding of modern day computer security protocols.

I imagine one of the reasons why more corps aren't hacked is because their active security crashes anyone they catch. I'm inclined to beleive that high ranking hacking programs are usually pretty rare, as if they were common corps would develop a means to defeat them and they wouldn't be high ranking anymore. If you equip a bunch of kids with a state of the art hacking utility you may gain access, but you are unlikely to find anything valuable before being spotted and booted and the corp in questio will fix whatever needs fixing in their firewall so your hacking utility ain't so useful anymore.
RunnerPaul
QUOTE (ornot)
The thing I don't get about this whole daisychaining of commlinks business is why you need to hack the second (hard-wired) commlink. The first (wireless) commlink is a trusted subscriber to the second commlink. So surely if you've hacked the first commlink - which is communicating with the second commlink - you can just send data or commands to the second commlink with impunity? You don't need to penetrate the second firewall as data from the first commlink must be allowed to access the second commlink.
Just because the second commlink trusts data from the first, doesn't mean it trusts the same set of user accounts as the first.

QUOTE
With 'ware however, you need to hack the commlink first as 'ware has a puny signal, and you need to hack the 'ware seperately as you're trying to interact with it in a non-normal manner and effectievly break it.
The stance you take in this paragraph contradicts what you said above. If a second commlink's status as a trusted subscriber means you can send commands to it once you've hacked the first commlink, why wouldn't implants, who also are presumably trusted subscribers, also be vulnerable to the exact same method?
Serbitar
QUOTE (ornot @ Jan 10 2007, 05:24 PM)
The thing I don't get about this whole daisychaining of commlinks business is why you need to hack the second (hard-wired) commlink. The first (wireless) commlink is a trusted subscriber to the second commlink. So surely if you've hacked the first commlink - which is communicating with the second commlink - you can just send data or commands to the second commlink with impunity? You don't need to penetrate the second firewall as data from the first commlink must be allowed to access the second commlink.


There is a difference between subscription rights and acess rights. You are allowed to send to the node, but not access it. Thats a difference.

Just like node may choose to relay your traffic, but not let you access it.

QUOTE

I'm inclined to beleive that high ranking hacking programs are usually pretty rare,


They arent, look at availability. At least in terms of shadowrunners.
RunnerPaul
Also, if you're trying to base your view on the fact that the part of the FAQ that said "Hack the commlink first" was talking about hacking cyberware, and the part of the FAQ that said "you can skip to the last device" was talking about chained commlinks, I would just like to point out that the section for hacking cyberware provides guidelines for "hacking cyberware (or any device, really)" (emphasis added). Last time, I looked, a commlink was a device.

The only way that I can see to resolve the conflicting answers is to consider the question about chained commlinks to be an explanation of how mesh networking works, but that mesh networking is not the only option available, as mentioned in the section of the book that points out the possiblity of tiered networks and reinforced by the section of the FAQ that describes the requirements for hacking cyberware and/or a device.
ornot
My point about having to hack 'ware twice was based more along the lines that in many circumstances you're trying to make the 'ware do stuff it won't normally do, for example freeze up in the case of an arm or go solidly black for extended periods in the case of cyber eyes.

What I didn't understand was how having a second commlink protected your first one. I think I get that you have the first one able to access the second and send data through it, but have the second only able to accept data and route it back to the first, without being able to access any of the files on it. This does seem to leave a hacker that has appropriated admin control over the second commlink able to send normal commands to the first, analyse the data that is being transmitted through the second, and spoof data from the second, although it does safeguard any data on the first commlink and prevents the hacker from accessing 'ware which is only lnked to the first commlink. Of course, like I said before, I'm not a computer software/security person and may be misunderstanding how all these things work.

Regarding the rarity of programs: It's true that high level hacking programs don't have a very high availability, which, if anything is rather misleading. Surely if a high level hacking prorgam was that easy to get hold of, surely the 2070 equivalent of Norton or whatever would get it, analyse it and send out a fix for all their subscribers? Consequently a hacker would have to experiment with any software they wanted to hack to find new weak points all the time, or buy new hacking programs frequently, as fixes were implemented and their old software became obselete.
Demerzel
I still have to object on grounds of game play that having a benefit for wearing a belt full of commlinks tiered if useful would hurt the game. Serbitar's concept that the rules should acount for all varieties of trickery by including that trickery in ratings rather than forcing the players to be tricksters in a field they are less compitant in than either their players or their player's software designers.
RunnerPaul
QUOTE (ornot @ Jan 10 2007, 12:48 PM)
My point about having to hack 'ware twice was based more along the lines that in many circumstances you're trying to make the 'ware do stuff it won't normally do
And letting some unknown party have access to the files stored on it is not something I'd expect a commlink to "normally do". When you get right down to it, ALL SR4 hacking is about making a computer system do something it wouldn't normally do, in some way or another.


QUOTE (Demerzel)
I still have to object on grounds of game play that having a benefit for wearing a belt full of commlinks tiered if useful would hurt the game.
And I feel that forcing cyberware to leave its logon protocol open to the world and any joker with a exploit utility merely because that cyberware happens to be connected to a commlink that automatically mesh-networks because it has no other options hurts the game more.
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012