Help - Search - Members - Calendar
Full Version: Why do people think that Technomancers suck?
Dumpshock Forums > Discussion > Shadowrun
Pages: 1, 2, 3, 4, 5
Cthulhudreams
QUOTE (Aaron @ Jun 19 2008, 10:24 AM) *
Okay, I'm more awake, but I'm still confused, here. Let's look at some things.

Agent Smith attacks, I think we all agree, are going to fugger up whatever you point them at no matter what the opposing topology looks like. This is assuming your GM allows Agent Smith attacks, which means she's likely going to use them against you too, so it's a double-edged sword (not to mention a topic from another thread).

Wireless mesh topology. "Wireless" is the medium used to pass data between devices, "mesh" means every device is connected to every other device. Basically, it means there's a cloud of wireless devices all capable of interacting with one another.

It's not impossible for Frank and Rob to both be right about what Frank is calling a "linked system" or "tiered system" and what is more properly called a hierarchical network. It's the choice of media that makes the difference. You want a hack-proof hierarchical network under SR4? Use fiber optic cable (or a skinlink for your eyeballs) and turn off the wireless on the devices that you want to protect. See, now it's a floor wax and a dessert topping. Incidentally, this point is made in the FAQ, but it doesn't explicitly put the concepts together.

Hacking a "DNI" seems kind of silly to me. First off, I'm fairly certain that there is no "DNI" device, just a number of other devices that use DNI to interface with the brain. If you're talking about a sim module, then yes, that could be hacked, but it could be made safer by deactivating its wireless capability and directly connecting it to your commlink; thus, an attacker must first access your commlink. Ditto the eyes; just use a skinlink.

Frank was sort of right. Had his argument included the bit about turning off the wireless on protected devices, I would have concurred.

Yes, I contributed to Unwired. However, that doesn't magically make me right. I welcome debate. I've been convinced that I was wrong on several occasions, at least one on Dumpshock: I used to believe that you had to do the sniffing and spoofing, but then I was convinced that hacking gets past these defenses.

On the topic of changing my mind on the sniffing and spoofing angle, I actually welcomed it. It makes Matrix specialists like technomancers that much more efficacious.


A few things. Does that just make frank correct? You can build tiered systems that are even better that was frank proposed by just including (free) fibre optic cable? How can you hack anything ever when people just make 1/1/0/6 nodes that run a million useless programs and have response -700 and glue them in front of what ever else it is they do.

Why isn;t ever system a tiered system. Doesn't this just result in 'agent smith' but its really 'matrix smith' in which there are a billion nodes 'glued on' the front of anything with 1/1/1/1 attributes, a fibre cable and an agent running analyze in them?

Also, does a response 0 system instantly crash (say I;'m running to many programs)
Dr Funfrock
Reading the last few pages of this thread, it is becoming increasingly obvious to me that crizh is someone who actually comprehends how network technology works, and that everyone else (edit: ok, I'll be fair here, "just about" everyone, and I include myself in that) appears to be struggling to even keep up.

As to Cthulhudream's raising the old idea of the "crash commlink" shield, where does it indicate in the rules that the exploit program is running on the target system, not the hacker's own system? I'm not attempting to be beligerant, I'd just really like to see some kind of reference for that, because it basically changes how the entirety of the hacking rules work.

--EDIT--
In the time it took me to write this post Cthulhudreams appears to have removed the part of his post referenced in my second paragraph there. It referred to an argument that has been raised a few times regarding slaving your entire PAN to a Rating 1/1/1/1 commlink that acts as a gateway. The theory is that as soon as a hacker gets in to the rating 1 'link it crashes when they try to run a program, stopping further access to the PAN. I'd appreciate if anyone could point to the rule that indicates that hackers running programs when accessing a system works in this way.
Cthulhudreams
Its not the exploit program, I agree, that runs on the nod orginating the attack. Its just that in Aarons view of the world, you can set a 'node' not to route infomation between either interface, as long as both sides of the 'node' are different mediums.

So on one side, I have fibre and on the other I have wireless, so that node must be compromised and have its orders changed before you can 'get past it'

So once you've exploited in you need to use 'edit' or 'command' to change the operating parameters of the node.

which makes the response of the node 0, which presumably (although that is never stated) instantly crashes it.
Ryu
Hold on there for a moment. Any programs run on your own comlink, no response degrading for foreign nodes unless you intentionally upload programs to do that. "Using on a node" and "running on a node" are different things.
Cthulhudreams
Don't all programs being used by your icon - which has to be in a node - contribute to the response load of that node? Hrm, apparntly not. Anyway, my uncertains about it is why I edited it out.

None of this also addresses the stupid tiered system only if you change the transmission medium mechanic either. So can I can just put in a dedicated wireless link and get functionally the same result? What about if I call it 'RF' instead of matrix.

Doesn't that actually also remove the need for commlinks for communications or data transmissions of any sort? Why don't I just send directional 'broadcasts' to IFF beacons? And use a radio?

Argh.

Vilkas
Crizh, since you do seem to know something of networking, what would an exploit program actually do? If it can't hack into a node and exploit holes in a firewall, it seems absolutely useless.
JoelHalpern
QUOTE (Dr Funfrock @ Jun 21 2008, 05:10 AM) *
Reading the last few pages of this thread, it is becoming increasingly obvious to me that crizh is someone who actually comprehends how network technology works, and that everyone else (edit: ok, I'll be fair here, "just about" everyone, and I include myself in that) appears to be struggling to even keep up.
...


Let's be clear. I know WAY too much about about how networks really work. (Use Google. I am not an anthropologist.)
This is almost completely useless in deciding how a fictional 2070 network with a large number of internal assumptions really works.

As I read things, wiith regard to Spoof, part of my reason for being comfortable with Aaron's assumption is that Spoof has a very narrow definition.
Firstly, it is seems (from page 224 in the BBB) to be specifically for Spoofing commands and datatrails.
Secondly, for spoof an ID (for command purposes, presumably the same function as would be required if Spoof were needed for Exploit) you MUST apply matrix perception to the persona you wish to impersonate.
If I am going to try to generalize from current networks (a weak starting point, but what we have) then what I would need to do is observe and decrypt the traffic in and out of the node. (So there is an argument for Sniffer, if you want to go down this path.) That would easily give me all the IDs I need. (Or, if I believe in real crypto, it won't give me enough IDs, but I can't decrypt the stream and Matrix Perception of the correspondent won't help either.)

Yours,
Joel M. Halpern
JoelHalpern
QUOTE (Vilkas @ Jun 21 2008, 10:59 AM) *
Crizh, since you do seem to know something of networking, what would an exploit program actually do? If it can't hack into a node and exploit holes in a firewall, it seems absolutely useless.


I think it is reasonable to assume (as many professionals do) that the game of whack-a-mole between security flaws, hackers finding flaws, and maintainers repairing flaws,will continue. It seems reasonable to assume that the delays in patch application and problems with application will all continue.

Thus, Exploit is presumably trying a library of (dynamically generated?) techniques to break through the firewall and the internal user security mechanisms. Presumably, it is a lot harder than just a buffer over-run attack.
Presumably, the difference in rating of Exploit programs (and Firewalls) is some combination of the number of tools / blocks and the degree to which it somehow has current information (maybe an Exploit 6 goes out an adds components to itself on the fly.)

Yes, there are lots of weaknesses in this analysis. On the other hand, we need something or the matrix end of the game comes to a complete halt.

Joel
FrankTrollman
QUOTE
what would an exploit program actually do?


Well it might do what it says that it does: log onto a system without authorization.

What it doesn't do is bypass any other requirements of logging in, such as being in signal range (Signal) or being a valid network location to have packets sent to you in the first place (Spoof).

-Frank
JoelHalpern
QUOTE (FrankTrollman @ Jun 21 2008, 11:17 AM) *
Well it might do what it says that it does: log onto a system without authorization.

What it doesn't do is bypass any other requirements of logging in, such as being in signal range (Signal) or being a valid network location to have packets sent to you in the first place (Spoof).

-Frank


While conceptually that makes sense, you are making just as much of an assumption when you assert that I have to find and applyt Matrix Perception to a correspondent in order to pretend to be that person. Most man-in-the-middle attacks require knowing where the target is, and being able to intercept traffic to a correspondent. But I have no need to actually find the correspondent at all.
Given that Spoofing an ID is defined by RAW as requiring such a perception test, I think asserting that Spoof MUST be needed for Exploit is an interpretation, not a statement of what the rules or logic require. Requiring Sniffer/Decrypt makes rather more sense.

Joel
FrankTrollman
QUOTE (Joel)
While conceptually that makes sense, you are making just as much of an assumption when you assert that I have to find and applyt Matrix Perception to a correspondent in order to pretend to be that person. Most man-in-the-middle attacks require knowing where the target is, and being able to intercept traffic to a correspondent. But I have no need to actually find the correspondent at all.


Not really sure where you're going with that. In the Spoofing the Datatrail segment it says quite explicitly:
QUOTE (BBB @ p. 224)
Note that liminating the access ID entirely is not an option, as most nodes will refuse access to unidentified devices; access ID must be spoofed instead.


So the rules are pretty clear that if you don't have the right kind of access ID a node can simply be set up so that you automatically fail. But "fortunately" there is a Spoof command to handle that. Where it gets icky is the fact that the rules also say that you need to perform a Matrix Perception test to find out what access ID you are copying (p. 224).

You can make a valid claim that using a Sniffer program could tell you where these things are going to/from and would bypass the need to get Matrix LOS on the slave nodes. Unfortunately, on page 225 it does say unequivocally that you have to Decrypt a signal before you can Sniffer, so that's probably a bad way to go.

---

In any case, after careful reading I do somewhat alter my previous stance. You don't need to Sniffer and then Spoof, you can Matrix Perception and then Spoof. That would seem to be the preferred method of doing it. And yeah, kicking people out automatically if they don't have the right Spoof results is an automatic function that "most devices" are equipped with. So anyone who doesn't have a Spoof (such as many Techomancers and almost all Sprites) can't hack at all.

-Frank
Aaron
QUOTE (crizh @ Jun 20 2008, 11:39 PM) *
You got me, I'm no network engineer and I've no idea how you would go about overcoming this without spoofing the IP and MAC address.

Sorry. You were making some good technical arguments, so I kind of assumed you had a certain degree of network-fu. Sorry about that.

Note: this post is based in modern networking. There are applications to SR4 networking, but the correlation is not necessarily one-to-one.

The attack I was thinking of is a sequential (or semi-sequential, if you pick your IPs right) brute-force attack. You drop packets that don't have the right source, right? If I just send pings until I get a response, I can find out what IPs you like.

As far as the "lots of IP addresses to try" problem, it's not as big a deal as it first may seem. Sure, IPv4 uses over four billion addresses, but those addresses are separated into categories with different features. For example, I can guess that your home network IP addresses are all 192.168.*.*, because the 192.168.0.0 domain is reserved for local networks. So is the 10.0.0.0 for larger networks. Given that, I can guess that your home router's address is 192.168.0.1. You can change it (to say 64.233.167.99), but you run the risk of eclipsing the part of the Internet that has been assigned that IP address (in this case, one of the google.com servers).1

IP assignment is another part of what makes life easier for the attacker. I know you're not going to have a google.com address. I also know you're not going to have dumpshock.com, pavao.org, etc. So I can remove all of those IP addresses from my attack list.

With MAC addresses, it's even easier to remove addresses from my try-it list. The first half of a MAC address is determined by the manufacturer, and a finite number of MAC addresses have been assigned to router manufacturers (I don't, for example, need to try anything from Palm or Motorola). If I know the manufacturer of your equipment, I can cut the number of addresses I need to try almost in half.

There was more I wanted to address, but I forget what it was, so I'll post this and go back to read more stuff.

1This is just an example, as I would only be trying to ping you at 192.168.0.1 if I was already inside your network. It's just illustrative of the IP assignment process.
Vilkas
Again I have to disagree. The purpose of the Exploit program in the game world is to make access, not copy it or mimic it. Read the description on page 227. It gives you unauthorized access. You break in.

If I went to a house that wasn't mine with the commlink of the guy who owned it and transmitted the necessary auth to get in, I've effectively spoofed admin access to the house. If open a window and hop inside, I've exploited. The windows may be locked, but that didn't prevent me from breaking them then. Its not a perfect analogy and I do understand that networking might no physical equivalent of a glass window, but the essence of the analogy is the case in the game world. Exploit breaks in. Its Firewall vs Exploit and the firewall will always lose because its an extended test.

Offense trumps Defense in 2070.

If you need to rationalize it with regards to our own networking capabilities, tell yourself that the architecture of the matrix hardware underwent a necessary restructuring to be able to perform as it does and this opened up large gaps in security that have never been perfectly resolved - and never will. The complexity has increased too much.
Aaron
QUOTE (Cthulhudreams @ Jun 21 2008, 03:01 AM) *
A few things. Does that just make frank correct? You can build tiered systems that are even better that was frank proposed by just including (free) fibre optic cable? How can you hack anything ever when people just make 1/1/0/6 nodes that run a million useless programs and have response -700 and glue them in front of what ever else it is they do.

Well, for one thing, if I'm running my programs on my persona on my commlink, it's my Matrix attributes that count and not those of the node I'm playing with. So really my target would just be shooting themselves in the foot that way.

QUOTE
Why isn;t ever system a tiered system. Doesn't this just result in 'agent smith' but its really 'matrix smith' in which there are a billion nodes 'glued on' the front of anything with 1/1/1/1 attributes, a fibre cable and an agent running analyze in them?

One of the things about networks is that their primary purpose is not security. Let me try a metaphor. The door to your home would be a lot safer if it was made of solid metal and was welded to the frame. However, then you wouldn't be able to use it as a door. You could make it so that it had thirty dead-bolts and six full-length bars; you could use it, but it would be a pain in the ass to do so, and you might find yourself using a window because it would be easier. Same deal with networks: they're designed to move data first, and be secure second.

QUOTE
Also, does a response 0 system instantly crash (say I;'m running to many programs)

Dunno. There might be something in your hymnal about it (don't feel like looking it up just now, sorry), but if I was behind the Big Black Screen I'd say your system freezes.
Aaron
QUOTE (crizh @ Jun 20 2008, 11:39 PM) *
If the data never gets stored in any register anywhere in the target system how, exactly, is it supposed to circumvent the 'MAC' filter?

Here's the thing. Whenever you seek data on the Internet, your network card opens a port to the world. If it didn't, you wouldn't get information back from the Internet. For example, when your Web browser loaded this page, it opened a port on your machine that listened for incoming traffic. That's a vulnerability, although it probably only lasted for the amount of time you spent loading the page (although at a Complex Action or more per second, that can be a long time). Now, there are firewall-y things that keep that relatively safe, but like I said, networks are designed for use, not security.
Aaron
QUOTE (FrankTrollman @ Jun 19 2008, 03:04 PM) *
Not being confrontational, just honestly have no idea what this particular complaint entails. What makes a rule set "high resolution?"

It's a fair question. I mean that it goes into greater detail than, say, the rules in the hymnal. As an example, the combat rules for D&D4e are at a "higher resolution" than those of Amber Diceless. The rules for FATAL are a higher resolution than any other game ever. My games include but don't emphasize the Matrix (even though almost all of the players and the GM are computer geeks of some stripe or another), so the rules as they stand are fine.
FrankTrollman
QUOTE (Aaron @ Jun 21 2008, 11:19 AM) *
It's a fair question. I mean that it goes into greater detail than, say, the rules in the hymnal. As an example, the combat rules for D&D4e are at a "higher resolution" than those of Amber Diceless. The rules for FATAL are a higher resolution than any other game ever. My games include but don't emphasize the Matrix (even though almost all of the players and the GM are computer geeks of some stripe or another), so the rules as they stand are fine.


OK. I still don't understand. Those rules (which I should have made a catchy name for rather than just calling them "alternate matrix rules") involve many less die rolls than the basic rules. Individual IC copies all get abstracted out, all networks are treated as monolithic entities rather than worrying about individual devices within networks, all defenses are treated abstractly as "Firewalls" rather than having a concern about what access ID you have or encrypted vs. unencrypted nodes and so on and so forth.

It rather explicitly increases the level of abstraction vs. the basic book. That was one of the founding concepts behind the whole deal. So I really have no idea what you mean. Last I checked keeping track of less different entities and interacting with them in less different ways was a lower level of detail. It's actually one of the complaints that I get most (after brainhacking !!11!!!) is that I don't keep track of individual IC or devices. It's a set of house rules for less die rolls, not more.

-Frank
crizh
QUOTE (Aaron @ Jun 21 2008, 04:52 PM) *
The attack I was thinking of is a sequential (or semi-sequential, if you pick your IPs right) brute-force attack. You drop packets that don't have the right source, right? If I just send pings until I get a response, I can find out what IPs you like.


Assuming I respond to Pings at all. This is one of the areas where my network-fu is weak. My shorewall.cfg is locked down so hard by default that I've never been able to get it to permit Ping to function in or out of the LAN.



QUOTE (Aaron @ Jun 21 2008, 04:52 PM) *
As far as the "lots of IP addresses to try" problem, it's not as big a deal as it first may seem. Sure, IPv4 uses over four billion addresses, but those addresses are separated into categories with different features. For example, I can guess that your home network IP addresses are all 192.168.*.*, because the 192.168.0.0 domain is reserved for local networks. So is the 10.0.0.0 for larger networks. Given that, I can guess that your home router's address is 192.168.0.1. You can change it (to say 64.233.167.99), but you run the risk of eclipsing the part of the Internet that has been assigned that IP address (in this case, one of the google.com servers).1

IP assignment is another part of what makes life easier for the attacker. I know you're not going to have a google.com address. I also know you're not going to have dumpshock.com, pavao.org, etc. So I can remove all of those IP addresses from my attack list.

With MAC addresses, it's even easier to remove addresses from my try-it list. The first half of a MAC address is determined by the manufacturer, and a finite number of MAC addresses have been assigned to router manufacturers (I don't, for example, need to try anything from Palm or Motorola). If I know the manufacturer of your equipment, I can cut the number of addresses I need to try almost in half.

There was more I wanted to address, but I forget what it was, so I'll post this and go back to read more stuff.

1This is just an example, as I would only be trying to ping you at 192.168.0.1 if I was already inside your network. It's just illustrative of the IP assignment process.



Did you read my subsequent posts? The address space of ipv6 is so ridiculously big [insert HHGTTH reference here, lol] that you're easier to go through all the addresses that have been assigned than all the ones that are possible. Presumably with the 2070 mesh network there's not really any difference between WAN and LAN anymore, all IP addresses are unique. Even if you eliminate everything that isn't a personal comm-code you still have millions of IP's to try. (Which is just Exploit calling the Spoof library in your example btw, which seems somewhat redundant.)

Regardless, more than half a dozen unsolicited connection attempts to a hidden node from unauthorized IP's is going to trigger an alert and a counterattack.

Brute forcing active defences is made of fail. Always has been, always will be.

Exploit is about backdoors, buffer overflows and social engineering.

Like Frank said you don't get to use Exploit if you ain't in Signal range.

Similarly, you don't get to use Exploit if you ain't spoofing a valid source address.
JoelHalpern
QUOTE (crizh @ Jun 21 2008, 12:39 PM) *
...
Exploit is about backdoors, buffer overflows and social engineering.

Like Frank said you don't get to use Exploit if you ain't in Signal range.

Similarly, you don't get to use Exploit if you ain't spoofing a valid source address.


Actually, in current tech there are LOTS of ways to get a message into a system without having a "valid" source address.
Most systems are NOT locked down hard to a small set of addresses. They need to accept incoming voice (and other things). (think Peer-2-peer VoIP. Heck, thing P2P in general.)
In part, what is reasonable depends upon what you assume about topology. But if you assume that the home is networked, and is willing to accept commands and requests from the user outside, then the packets it is prepared to accept can come from almost anywhere. (While current IP conflates identity and network location, there is no reason to think that a fictional, better, system makes that mistake.)


This debate leads me to two disparate conclusions:
1) If I wanted a more realistic and difficult hacking environment, I would require sniffing, decrypt, and encrypt. (For game purposes I would still have to assume that decrypt / encrypt works)
2) If I am willing to accept major changes from the book, I would probably go with Frank's rules (probably complete with brainhacking).

As far as RAW, I while there are arguments for lots of things being reasonable, as a GM I would probably have to rule on what is required to use Exploit, and if I play anyone doing hacking, I better ask the GM how he or she has chosen to understand the rules.

We can argue practicallities of hacking all day. It is not at all clear they have anything to do with Shadowrun.

Joel
FrankTrollman
QUOTE (Joel)
Actually, in current tech there are LOTS of ways to get a message into a system without having a "valid" source address.


Sure, but in 2070s tech:

QUOTE
Note that eliminating the access ID entirely is not an option, as most nodes will refuse access to unidentified devices; access ID must be spoofed instead.


-Frank
crizh
QUOTE (Aaron @ Jun 21 2008, 05:13 PM) *
Here's the thing. Whenever you seek data on the Internet, your network card opens a port to the world. If it didn't, you wouldn't get information back from the Internet. For example, when your Web browser loaded this page, it opened a port on your machine that listened for incoming traffic. That's a vulnerability, although it probably only lasted for the amount of time you spent loading the page (although at a Complex Action or more per second, that can be a long time). Now, there are firewall-y things that keep that relatively safe, but like I said, networks are designed for use, not security.


ninja'd, dang you post almost as often as me, get a life dude....

First off we're talking about closed hidden networks here. No connections to the intertubes at all.

Second, those firewall-y things are exactly what I'm talking about.

Imagine a conveyor belt that carries all the wireless traffic on the local matrix. Each packet is represented by a single block with a different cross-section depending on it's header data. They pass one at a time in single file over a series of holes in the conveyor. Only blocks that fit the holes fall through (the shapes are sufficiently complex that an exact match is necessary) and the rest are discarded without even getting through the door so to speak.

A FIFO hardware register that is exactly the length of a packet header is created in a FPGA. The incoming datastream is fed into this register one bit at a time. If, and only if, an exact match with a preordained header is found this header and a fixed number of subsequent bytes are permitted to be sent on to the rest of the Firewall where all sorts of cunning packet inspection is carried out. Otherwise the data is flushed one bit at a time as each subsequent bit is received until a valid header accumulates in the register.

One of these is created in hardware for each valid source address and no data ever passes this hardware filter that does not conform to the required specifications. You could potentially create a few generic ones as well that wouldn't pass any data through but that would identify attempts to brute force the system with partially valid headers.

Like I said before, this is the most basic simple and well tested level of security I don't see any reason why it should not have been honed to absolute perfection by 2070. It certainly should not be leakier than it is now.
JoelHalpern
QUOTE (FrankTrollman @ Jun 21 2008, 12:56 PM) *
Sure, but in 2070s tech:

... quote about the use of Spoof ...
-Frank


There seem to be two different notions mixed up in this discussion.
There is Spoofing a specific identity. That is clearly relevant to those arguing that systems are hard-locked. It requires finding something to pretend to be.
There is spoofing an arbitrary identity. That simply provides you with an identity which is not trackable to you.

There is an argument (strongly supported by the quote Frank cited) that to do ANYTHING on the Matrix you need an ID. And it better be a spoofed ID. But there is no particular target for this.
This spoofing seems to be much broader than for use in Exploit.
Frank, feel free to correct me, but I think your point is that by Raw one could probably perform Scan and Sniffer without an ID, but after taht one would need an ID (Spoofed) before performing any operation, including Exploit.

Other folks seem to be asserting that in order to Exploit a node, one needs a Spoofed identity that is specifically acceptable to the targetted node, before you can even attempt an Exploit.

These are two different assertions. With very different implications.

Joel

PS: What ID does a TM have, when he chooses not to use a Commlink with a stored ID?
crizh
QUOTE (JoelHalpern @ Jun 21 2008, 06:03 PM) *
There seem to be two different notions mixed up in this discussion.
There is Spoofing a specific identity. That is clearly relevant to those arguing that systems are hard-locked. It requires finding something to pretend to be.
There is spoofing an arbitrary identity. That simply provides you with an identity which is not trackable to you.

There is an argument (strongly supported by the quote Frank cited) that to do ANYTHING on the Matrix you need an ID. And it better be a spoofed ID. But there is no particular target for this.


Is this not to protect you from Trace. ID is required, preferably spoofed to avoid brain burn and cops coming over and shooting you. Any ID will do so long as it ain't yours.

QUOTE (JoelHalpern @ Jun 21 2008, 06:03 PM) *
This spoofing seems to be much broader than for use in Exploit.
Frank, feel free to correct me, but I think your point is that by Raw one could probably perform Scan and Sniffer without an ID, but after taht one would need an ID (Spoofed) before performing any operation, including Exploit.

Other folks seem to be asserting that in order to Exploit a node, one needs a Spoofed identity that is specifically acceptable to the targetted node, before you can even attempt an Exploit.

These are two different assertions. With very different implications.

Joel

PS: What ID does a TM have, when he chooses not to use a Commlink with a stored ID?


As far as I can tell Frank is making both of the above assertions.
Aaron
QUOTE (crizh @ Jun 21 2008, 10:39 AM) *
Assuming I respond to Pings at all. This is one of the areas where my network-fu is weak. My shorewall.cfg is locked down so hard by default that I've never been able to get it to permit Ping to function in or out of the LAN.

It doesn't have to be a ping; there are other options.

QUOTE
Did you read my subsequent posts? The address space of ipv6 is so ridiculously big [insert HHGTTH reference here, lol] that you're easier to go through all the addresses that have been assigned than all the ones that are possible. Presumably with the 2070 mesh network there's not really any difference between WAN and LAN anymore, all IP addresses are unique. Even if you eliminate everything that isn't a personal comm-code you still have millions of IP's to try. (Which is just Exploit calling the Spoof library in your example btw, which seems somewhat redundant.)

Did you read my earlier post? The one that already addresses this conclusion?

QUOTE
Regardless, more than half a dozen unsolicited connection attempts to a hidden node from unauthorized IP's is going to trigger an alert and a counterattack.
Brute forcing active defences is made of fail. Always has been, always will be.

I made that point, too. Although, I wouldn't say "always will be."

QUOTE
Exploit is about backdoors, buffer overflows and social engineering.

That is an accurate list, but not an exhaustive one, I think.

QUOTE
Similarly, you don't get to use Exploit if you ain't spoofing a valid source address.

Depends on your definition of "valid." It has to be a source address that could exist, yes, but it doesn't necessarily have to be on a short list for reasons I've already offered.
crizh
QUOTE (Aaron @ Jun 21 2008, 07:58 PM) *
for reasons I've already offered.


No you haven't. Unless I'm being really stupid.

Perhaps you could refresh my memory.

How do packets that get shit-canned, without ever being opened, for not being from a source on the short-list circumvent the IP filter?
Ryu
QUOTE (JoelHalpern @ Jun 21 2008, 07:03 PM) *
There seem to be two different notions mixed up in this discussion.
There is Spoofing a specific identity. That is clearly relevant to those arguing that systems are hard-locked. It requires finding something to pretend to be.
There is spoofing an arbitrary identity. That simply provides you with an identity which is not trackable to you.

There is an argument (strongly supported by the quote Frank cited) that to do ANYTHING on the Matrix you need an ID. And it better be a spoofed ID. But there is no particular target for this.
This spoofing seems to be much broader than for use in Exploit.
Frank, feel free to correct me, but I think your point is that by Raw one could probably perform Scan and Sniffer without an ID, but after taht one would need an ID (Spoofed) before performing any operation, including Exploit.

Other folks seem to be asserting that in order to Exploit a node, one needs a Spoofed identity that is specifically acceptable to the targetted node, before you can even attempt an Exploit.

These are two different assertions. With very different implications.

Joel

PS: What ID does a TM have, when he chooses not to use a Commlink with a stored ID?


If the node you want to talk to provides public functions, you do not need Spoof. The smallest part of allowed communication opens the door for Exploit.

If the node is limited to specific users, you need an acceptable ID. Legwork, Sniffing, other matrix runs, you need to spoof a specific address. A short visit to the human ressources offices is often worth the time.
crizh
QUOTE (Ryu @ Jun 21 2008, 10:52 PM) *
If the node you want to talk to provides public functions, you do not need Spoof. The smallest part of allowed communication opens the door for Exploit.

If the node is limited to specific users, you need an acceptable ID. Legwork, Sniffing, other matrix runs, you need to spoof a specific address. A short visit to the human ressources offices is often worth the time.



Exactly, I agree with that in every detail.
WeaverMount
QUOTE (FrankTrollman @ Jun 21 2008, 11:33 AM) *
OK. I still don't understand. Those rules (which I should have made a catchy name for rather than just calling them "alternate matrix rules") involve many less die rolls than the basic rules. Individual IC copies all get abstracted out, all networks are treated as monolithic entities rather than worrying about individual devices within networks, all defenses are treated abstractly as "Firewalls" rather than having a concern about what access ID you have or encrypted vs. unencrypted nodes and so on and so forth.

It rather explicitly increases the level of abstraction vs. the basic book. That was one of the founding concepts behind the whole deal. So I really have no idea what you mean. Last I checked keeping track of less different entities and interacting with them in less different ways was a lower level of detail. It's actually one of the complaints that I get most (after brainhacking !!11!!!) is that I don't keep track of individual IC or devices. It's a set of house rules for less die rolls, not more.

-Frank



If I may, In my circles "resolution" as a game design term refers to the level detail of a game world; the number of "significant digits" the mechanics use. Your rules model the wireless world much more explicity then the BBB, regardless of computational overhead of running those rules. You have hi-res fluff, and light mechanics. I think Aaron is focusing on the level of detail you bring write-up, and assuming it would be intensive. This is a reasonable assumption given the general state of SR4 rules. Judging from my limited solo play testing I would have to disagree with him.

-ps I know I'm heavly speculating about Aaron's thoughts, it's just that they mirrored my initial reactions. Free free to tell me I'm flat wrong
Zaranthan
QUOTE (Vilkas @ Jun 21 2008, 01:57 AM) *
Well, I'm no expert, but if a Decrypt program can, in seconds, defeat the best encryption available in the game world shouldn't an Exploit program be able to find the open ports in your firewall and break its way in within the same time frame?

In 2070, offense trumps defense, for whatever reason.

The reason is pretty obvious: if defense wins, the players always lose. Shadowrunners are not monolithic entities; not AAA megacorps with zillions of nuyen worth of proprietary security; not even Joe Blow's Pizzeria, Est. 2065. They're half a notch above purse snatchers and they're fighting for the privilege of eating tomorrow. If indomitable security measures can be created, then we don't have a game to play.

QUOTE (Ryu @ Jun 21 2008, 05:52 PM) *
If the node you want to talk to provides public functions, you do not need Spoof. The smallest part of allowed communication opens the door for Exploit.

If the node is limited to specific users, you need an acceptable ID. Legwork, Sniffing, other matrix runs, you need to spoof a specific address. A short visit to the human ressources offices is often worth the time.

This pretty much clinches it. The vast majority of systems the players are going to be interested in are not built on white-list access. If your personal computer has a wonderful little MAC filter that blocks absolutely everything from getting through, then when I roll Hacking+Exploit against your system, I'm not hacking your PC directly, I'm hacking your router. Worrying about the details between the router and the PC is like asking your sammie to go into explicit detail about how he cleaned his assault rifle this morning and giving him a DP penalty for not cleaning the clip release button. It's just not relevant to the game.

Microdetailing the packet exchange over your six foot ethernet cables is beyond boring. Your sammie and mage are playing Halo while you're lecturing the technomancer about information protocols that he doesn't give a flying frag about. He just wants to turn off the motion sensors. That shouldn't take an hour of real time unless they're the only obstacle on the run (or you have fifteen hour sessions, in which case all bets are off).
Sweaty Hippo
Whoah, who knows a topic that I started would cause so much discussion?

Something's up with Technomancers to cause this much debate over the rules.
crizh
QUOTE (Zaranthan @ Jun 22 2008, 12:44 AM) *
MAC filter that blocks absolutely everything from getting through, then when I roll Hacking+Exploit against your system, I'm not hacking your PC directly, I'm hacking your router.


You ain't hacking anything.

MAC filter.

blocks absolutely everything from getting through.

Why is this so hard to understand?

I'm not proposing an invulnerable system here.

Just requesting that people use the appropriate tool.

Which is Spoof if you've not been paying attention.
Aaron
QUOTE (crizh @ Jun 21 2008, 01:02 PM) *
No you haven't. Unless I'm being really stupid.
Perhaps you could refresh my memory.

No problem.

QUOTE
How do packets that get shit-canned, without ever being opened, for not being from a source on the short-list circumvent the IP filter?

They don't, or rather they're important because they decrease the addresses on the attack list. Please go back and read my post again, and if you still have questions, let me know and I'll try another way to explain it.
Aaron
QUOTE (crizh @ Jun 21 2008, 06:59 PM) *
MAC filter.
blocks absolutely everything from getting through.

That's the problem; it doesn't. If it did, you wouldn't be reading this, because the information from dumpshock.com wouldn't have gotten through.

Look, I've already described a modern method to defeat your IP filter and MAC filter without sniffing traffic. If you're going to ignore it, then just say you're going to ignore it. If you want to dispute it, please do, but use arguments that address the material in the method described, rather than simply insisting on the impenetrability of your MAC filter. If you're going to continue insisting, then please let me know where you live, so I can use your wireless if I'm ever in your neighborhood. =i)
crizh
QUOTE (Aaron @ Jun 22 2008, 04:34 AM) *


Dude, that's a link to the post where you gave no answers but instead insisted that I think them up myself.

QUOTE (Aaron @ Jun 22 2008, 04:34 AM) *
They don't, or rather they're important because they decrease the addresses on the attack list. Please go back and read my post again, and if you still have questions, let me know and I'll try another way to explain it.


Yes I do have another question.

Who gets your stuff?

You have spammed my hidden network with a number of unsolicited packets from a variety of unauthorized sources.

Suspecting that the source of this traffic is a hacker within signal range stupidly trying to brute force my defenses I have used the appropriate tool, Sniffer, to track your ass down.

Then I, a couple of Registered Fault Sprites, a brand new Rating 8 Fault Sprite I've just compiled specially and a whole bunch of Agents with Black Hammer come to BURN YOUR BRAIN OUT.

For added lulz it might be nice to have the Sammy double tap you in the back of the head while your distracted fighting off said cyber-attack.

Srsly dude. You can't brute force active defenses.

Yes, you can brute force encryption on data given sufficient time. Data has no processing power to spot you doing so and call the cops.

Hacker: It's Password protected.

Non-tech-savvy character: Dang!

Hacker: No problem. (tappity, tappity, tappity.)

[app opens on computer screen, percent bar starts to fill, asterisks start to appear one by one in password field]

Hacker: Almost done, almost done

nts character: Quick, time's running out...

Hacker: Got it!

Cheering, relief, disaster averted!!!

Not.

You know as well as I that nobody brute forces passwords on security sensitive stuff. My banks online facility gives you two attempts.

Two!

After that it takes a week to snail mail you a new activation code.

Either you already know the password or you know a backdoor or a portscan has revealed open ports that might have something vulnerable to a buffer overflow behind them.

Period.
crizh
QUOTE (Aaron @ Jun 22 2008, 04:40 AM) *
That's the problem; it doesn't. If it did, you wouldn't be reading this, because the information from dumpshock.com wouldn't have gotten through.


Closed, hidden system.

NO CONNECTIONS TO ANYTHING NOT ON THE LIST.

NO INTERTUBES, NO PRON, NO 'F' ALL.

QUOTE (Aaron @ Jun 22 2008, 04:40 AM) *
Look, I've already described a modern method to defeat your IP filter and MAC filter without sniffing traffic. If you're going to ignore it, then just say you're going to ignore it. If you want to dispute it, please do, but use arguments that address the material in the method described,


Where, when?

I asked you this already and you linked me to a post where you told me I was wrong but I should think up your answer for you.
Cthulhudreams
QUOTE (Aaron @ Jun 21 2008, 12:01 PM) *
One of the things about networks is that their primary purpose is not security. Let me try a metaphor. The door to your home would be a lot safer if it was made of solid metal and was welded to the frame. However, then you wouldn't be able to use it as a door. You could make it so that it had thirty dead-bolts and six full-length bars; you could use it, but it would be a pain in the ass to do so, and you might find yourself using a window because it would be easier. Same deal with networks: they're designed to move data first, and be secure second.


Wrong. Can I point you at swiftnet? The leader designers were security architects.

Booyah.

Anyway, thats probably true for your home PC, some stupid network in the stuffer shack, but thats not where players (and hackers!) go.

Hackers break into highly secure systems which is actively impossible in a layered cake model unless you hack on the fly, and then you will trip an alert. While people are unwilling to countenance serious delays on a 'vanilla' system, can I point at Swiftnet again. As a major peice of finance infrastructre with billions of dollars passing through a day and billion dollar transaction liabilities, you are removed from ever being able to access the system ever if you leave a logged in terminal unattended once. Serious systems have serious security.

Also, the layer cake system is not actually any 'harder' to long in. As far as I can tell if I'm authorized I can just log directly onto the end point.

So why doesn't ever important system have low cost bulletproof security?

Aaron
QUOTE (crizh @ Jun 21 2008, 10:15 PM) *
Dude, that's a link to the post where you gave no answers but instead insisted that I think them up myself.

And then there was the next post, where I filled in the answers. Then you gave the response predicted in the post I linked, which happens to have the response to ... you know what? Never mind.

QUOTE
Yes I do have another question.
Who gets your stuff?

If by "who gets your stuff" you mean "who understands what I try to explain," then the answer is "people aged 18 to (usually) forty-something who take my networking classes." If by "who gets your stuff" you mean "where do your packets go," you already said yourself: the bit bucket.

QUOTE
You have spammed my hidden network with a number of unsolicited packets from a variety of unauthorized sources.
Suspecting that the source of this traffic is a hacker within signal range stupidly trying to brute force my defenses I have used the appropriate tool, Sniffer, to track your ass down.
Then I, a couple of Registered Fault Sprites, a brand new Rating 8 Fault Sprite I've just compiled specially and a whole bunch of Agents with Black Hammer come to BURN YOUR BRAIN OUT.
For added lulz it might be nice to have the Sammy double tap you in the back of the head while your distracted fighting off said cyber-attack.
Srsly dude. You can't brute force active defenses.
Yes, you can brute force encryption on data given sufficient time. Data has no processing power to spot you doing so and call the cops.
[...]
You know as well as I that nobody brute forces passwords on security sensitive stuff. My banks online facility gives you two attempts.
Two!
After that it takes a week to snail mail you a new activation code.
Either you already know the password or you know a backdoor or a portscan has revealed open ports that might have something vulnerable to a buffer overflow behind them.
Period.

I ... I'm at a loss, here. I will say that there is a rather large difference between an attack on a router and an attempt to brute-force a password on a secure site running Java.

I'm not sure we can have this debate. I don't know how much you know about network security, so I'm coming from a position of ignorance, here, but either you're still learning about it, or you're making fun of me. Either way, I'm not sure we can debate this further.
Aaron
QUOTE (Cthulhudreams @ Jun 21 2008, 10:51 PM) *
Wrong. Can I point you at swiftnet? The leader designers were security architects.
Booyah.

I have no words.

Are you talking about SWIFTNet, the Society for Worldwide Interbank Financial Telecommunication? If so, can I point you at the Wikipedia page for that? That's a messaging system primarily, and it's not even for monetary transfers. It's got some security features, but it's not a routing protocol. The monetary transfers use a store-and-forward client-server routing scheme, which doesn't magically make it any less vulnerable to attack.

QUOTE
Hackers break into highly secure systems which is actively impossible in a layered cake model unless you hack on the fly, and then you will trip an alert. While people are unwilling to countenance serious delays on a 'vanilla' system, can I point at Swiftnet again. As a major peice of finance infrastructre with billions of dollars passing through a day and billion dollar transaction liabilities, you are removed from ever being able to access the system ever if you leave a logged in terminal unattended once. Serious systems have serious security.

True, but serious systems are designed primarily for serious use. Also, while you're pointing me at SWIFT, take a little time to read about it. It secures data, not networks.

You know what? You or crizh or anybody else feel free to catch me at a convention (I'll be at Origins and Gen Con Indy this year), and I'll be happy to sit down over lunch or something and talk about networking and security and draw things on napkins. Until then, y'all just keep doing your thing.
crizh
QUOTE (Aaron @ Jun 22 2008, 06:29 AM) *
And then there was the next post, where I filled in the answers. Then you gave the response predicted in the post I linked, which happens to have the response to ... you know what? Never mind.


So I ask you to repeat yourself and you post a link to a post you make thirty odd posts and a whole page in the thread before you say:

QUOTE (Aaron @ Jun 22 2008, 06:29 AM) *
The attack I was thinking of is a sequential (or semi-sequential, if you pick your IPs right) brute-force attack


Which as far as I can tell is the only attack you have suggested. A brute force flood of Spoof attempts!!

You have completely ignored my repeated assertion that this will get you killed. Brute force attacks on systems with active security will immediately raise an Alert which will almost certainly result in hostile actions being taken against your theoretical hacker.

QUOTE (Aaron @ Jun 22 2008, 06:29 AM) *
If by "who gets your stuff" you mean "who understands what I try to explain," then the answer is "people aged 18 to (usually) forty-something who take my networking classes." If by "who gets your stuff" you mean "where do your packets go," you already said yourself: the bit bucket.


No I mean who gets your theoretical hackers gear once he's dead.

QUOTE (Aaron @ Jun 22 2008, 06:29 AM) *
I ... I'm at a loss, here. I will say that there is a rather large difference between an attack on a router and an attempt to brute-force a password on a secure site running Java.


I've narrowed this down to it's logical idiocy in a least one post.

You have stated that no system can be configured to require that a hacker must first Spoof an IP gleaned from a Sniffer program.

You have stated that Exploit is good enough to break into any system without first acquiring and using a valid source IP address.

I have stated that a sufficiently secure system cannot be hacked without using Scan/Sniffer/Spoof.

I have given you a theoretical system that has no ports that are open to any packet that does not appear to come from one of the pre-approved sources that is not transmitting it's SSID equivalent and can therefore assume that all unsolicited traffic is in some way hostile. I have specified that the system is being actively monitored for exactly this sort of brute force attack and aggressively pursues any such attack it detects.

You have failed to provide a single example of any attack on such a system that is not a brute force attack that is destined to fail or failing that any reason why such a brute force attack would not result in death or imprisonment given my reasoning.

QUOTE (Aaron @ Jun 22 2008, 06:29 AM) *
you're making fun of me.


Funny I was beginning to wonder the same thing. I thought perhaps you had been put up to it by certain other dev's I was suggesting might want to justify an opinion that on the surface appeared to be rubbish on the amazing disappearing thread.

spin.gif

rotfl.gif
Zaranthan
Okay, I see where you're going now. You've got a tiered system. That's fine. It's even described in a nice little sidebar on BBB p223. This means that you're right, I cannot simply walk up to your sacred terminal in the matrix and break in. I have to either Sniff & Spoof to make myself look like one of your friends, or hack one of your friends. If I've got control of the machine at an address you trust, I don't need to Sniff & Spoof. I can simply route my Exploit attempts through your buddy and I'm already on the white list.

IIRC, this has been classic Decking since '89. I wonder why none of us thought of it sooner. Maybe new editions DO give you cancer. wink.gif
FrankTrollman
QUOTE (Zaranthan @ Jun 22 2008, 07:00 AM) *
Okay, I see where you're going now. You've got a tiered system. That's fine. It's even described in a nice little sidebar on BBB p223. This means that you're right, I cannot simply walk up to your sacred terminal in the matrix and break in. I have to either Sniff & Spoof to make myself look like one of your friends, or hack one of your friends. If I've got control of the machine at an address you trust, I don't need to Sniff & Spoof. I can simply route my Exploit attempts through your buddy and I'm already on the white list.

IIRC, this has been classic Decking since '89. I wonder why none of us thought of it sooner. Maybe new editions DO give you cancer. wink.gif


Right. That is how it appears to work in the BBB. Hence my inclusion of that step in the list of operations potentially required for sprite hacking. The caveat I will concede is that the rules allow you to substitute a Matrix Perception Test for the Sniffer test.

-Frank
Aaron
QUOTE (crizh @ Jun 22 2008, 12:56 AM) *
So I ask you to repeat yourself and you post a link to a post you make thirty odd posts and a whole page in the thread before you say:

Yep. I only did that because I was trying to help. This is a forum; it's more polite to go back and read the previous posts than to ask someone to post the same information a second time.

QUOTE
Funny I was beginning to wonder the same thing. I thought perhaps you had been put up to it by certain other dev's

I'm not a developer; regardless of what I may have written, I do not have any magical say over rules interpretations. This is all just me taking what I know about the rules and about network engineering and security and presenting it.

QUOTE
I've narrowed this down to it's logical idiocy in a least one post.
You have stated that no system can be configured to require that a hacker must first Spoof an IP gleaned from a Sniffer program.

I think this has been the disconnect between us, here. First off, that's not my position, and I'm not repeating myself this time.

Secondly, I was asked to present an example of a modern (not Shadowrun) method of attacking a system without sniffing packets. Are there better methods? Yep. Could it work? You betcha, as long as the attack doesn't look like a ping flood or other DOS attack that the target router or software firewall might pick up on. Is it analogous to something Shadowrunny? Let's see:

In the following two paragraphs, I intend to show that this sort of attack, weak though it may be, parallels the SR4 hacking rules. I will make a statement about the modern method described, followed by a statement about the SR4 rules. There will be sections highlighted in each paragraph; these will be words and phrases that are exchanged for one another in the paragraphs, and all other words will be identical.

If you use this method slowly over several hours, you've actually got a good chance of succeeding, although it takes time. You could use the method in a short amount of time, but your chances of being detected and countered are much higher.

If you probe the target slowly over several hours, you've actually got a good chance of succeeding, although it takes time. You could hack on the fly in a short amount of time, but your chances of being detected and countered are much higher.


Before you say "why didn't you say so before?" I did say so before. That one you'll have to look up yourself, too.
Cthulhudreams
QUOTE (Aaron @ Jun 22 2008, 12:45 AM) *
I have no words.

Are you talking about SWIFTNet, the Society for Worldwide Interbank Financial Telecommunication? If so, can I point you at the Wikipedia page for that? That's a messaging system primarily, and it's not even for monetary transfers. It's got some security features, but it's not a routing protocol. The monetary transfers use a store-and-forward client-server routing scheme, which doesn't magically make it any less vulnerable to attack.

True, but serious systems are designed primarily for serious use. Also, while you're pointing me at SWIFT, take a little time to read about it. It secures data, not networks.


Yeah, this is the problem with taking wikipedia as gospel. For example.

QUOTE
BankServ announced today a collaboration with SWIFT to develop a new way of sending wire transfers and Automated Clearing House (ACH) items directly over SWIFT allowing international payments to be carried out in a single step, instead of the two or more currently required.


or

http://www.swift.com/index.cfm?item_id=59575

Before telling me to read something about a particular network, maybe you should take enough time to determine I am actually incorrect. It is used for monetary transfers.

Due to the financial sensitivity of matters it has a serious security protocol, and there are serious liabilities on swift for non delivery. It has been designed at every stage to deliver security and integrity.

Anyway, this is all about your remark that "Same deal with networks: they're designed to move data first, and be secure second."

Swiftnet has been designed with security and intergrity of transmissions at 'front of mind' at all times.

But unwireds out now, so lets see how that changes the world!
crizh
QUOTE (Aaron @ Jun 22 2008, 03:46 PM) *
I think this has been the disconnect between us, here. First off, that's not my position, and I'm not repeating myself this time.


QUOTE (Aaron @ Jun 17 2008, 05:59 PM) *
Again, I used to think that, too, but after a number of messages back and forth with the devs, I was told that a device can be hacked even if it's not supposed to be taking other traffic. So no, you don't need to sniff or spoof if you're doing a direct hack.


Yes it is your position.

Even if a device is not supposed to be accepting ANY traffic from an unauthorized source on ANY port you can use Exploit and not even possess the sniff or spoof libraries.

Now you will agree that might be your position but that on some generic, poorly designed and unmonitored system that bears no relation to the sample system I have described, it will be possible to slowly brute force it over several thousand years.

QUOTE (Aaron @ Jun 22 2008, 03:46 PM) *
Could it work? You betcha, as long as the attack doesn't look like a ping flood or other DOS attack that the target router or software firewall might pick up on.



Like that.

The target system is hidden. It should not be receiving any traffic from any system not on the list.

If it does receive any traffic, even one packet, not from an authorized source it knows it has been discovered and is very likely under attack.

At which point your proposed attack has failed because the target is on alert and is taking active and potentially fatal counter-measures.

For your argument to stand up here you need to propose an attack other than this one.

Might I recommend that you propose one that does not require your Exploit program to forge packet headers?

Saying that you don't need to use spoof and then magically giving exploit the abilities of spoof to prove your point is made of fail.
JoelHalpern
QUOTE (crizh @ Jun 22 2008, 09:58 PM) *
...

Like that.

The target system is hidden. It should not be receiving any traffic from any system not on the list.

...


One of the interesting questions is how well hidden is "hidden."
I have had to deal with sites where the entire net-block was not supposed to receive any unsolicited traffic. they were still be pounded regularly by hackers.
So, depending upon ones model of the 2070 SR Matrix environment, it is not unreasoanble to expect that so many things are subverted, and so many people are always looking for holes, that one can not use the presence of traffic as an attack indicator.

Now, for me, this leads to a different model. A hidden, private, comlink network that has just changed its ID might well be able to use the mere presence of outside traffic as such a signal.
A coporate facility, no matter how secure, probably has to expect that any device with a radio is getting traffic (whether it wants to or not) pretty regularly.
And certainly any gateway devices, used to mediate external communication, are getting lots of traffic, from lots of places, even if the Corp wants to keep it simple and local. (Heck, even Military systems get bombarded heavily today.)

the question then becomes, if I get into that gateway system, do I have to spoof my way into the enxt system, do I have to just explit my way into it, or do I just walk on in. this depends very much on how you think they view security. It is worth noting in this context that no matter how often smart experts tell folks taht security perimeters (egg shell security) are a bad idea, most systems still get built that way. So it seems to be a GM call (unless Unwired has definitely stated something different) as to what security model even the highly secured sites use. (Yes, today, many highly secured sites put the security only at the edges. I do know of some sites that do a much better job. And if you have not seen them, you would be amazed at the baroque contraptions folks use that pretend to improve the situation.)

Yours,
Joel
crizh
QUOTE (JoelHalpern @ Jun 23 2008, 03:33 AM) *
A hidden, private, comlink network that has just changed its ID might well be able to use the mere presence of outside traffic as such a signal.


This is my point exactly, thank you.

Aaron has made a blanket statement that all nodes can be hacked with exploit without even possessing scan, sniff, or spoof.

If I can demonstrate even a single example where this is not true then his hypothesis has been falsified.

I am more than willing to concede that in many cases spoof will not be necessary however under no circumstances am I going to accept that no system can ever be designed to require spoof to be used before exploit in a crack attempt.

It is probably moot as what I am talking about is likely to turn out to be 'slaving' when I manage to get hold of Unwired.
Aaron
QUOTE (Cthulhudreams @ Jun 22 2008, 06:58 PM) *
http://www.swift.com/index.cfm?item_id=59575
Before telling me to read something about a particular network, maybe you should take enough time to determine I am actually incorrect. It is used for monetary transfers.

Read it yourself. The part you were referring to isn't used for monetary transfers, it's used for secure message delivery. Monetary transfers use a different system.
Aaron
QUOTE (crizh @ Jun 22 2008, 07:58 PM) *
Yes it is your position.
Even if a device is not supposed to be accepting ANY traffic from an unauthorized source on ANY port you can use Exploit and not even possess the sniff or spoof libraries.

Go back and read the thread. You'll find me describing a scenario that you claim that I maintain is impossible.

QUOTE
Now you will agree that might be your position but that on some generic, poorly designed and unmonitored system that bears no relation to the sample system I have described, it will be possible to slowly brute force it over several thousand years.
Like that.

I addressed that, too.

QUOTE
The target system is hidden. It should not be receiving any traffic from any system not on the list.

I believe that "Hidden" is equivalent to "SSID turned off." That wouldn't jive with what you're describing.

QUOTE
If it does receive any traffic, even one packet, not from an authorized source it knows it has been discovered and is very likely under attack.
At which point your proposed attack has failed because the target is on alert and is taking active and potentially fatal counter-measures.
For your argument to stand up here you need to propose an attack other than this one.

You're not even reading my posts, are you?

QUOTE
It is probably moot as what I am talking about is likely to turn out to be 'slaving' when I manage to get hold of Unwired.

You're going to be disappointed.
Cthulhudreams
QUOTE (Aaron @ Jun 23 2008, 05:33 AM) *
Read it yourself. The part you were referring to isn't used for monetary transfers, it's used for secure message delivery. Monetary transfers use a different system.


AFAIK they are services built on common infrastructure layer.
DireRadiant
In the game, there will always be a way to compromise the network/data. We will roll some dice. There will be success or failure. We will have fun. It matters not whether it was hacking, snooping, sniffing, exploiting, or simply observing someone writing down their password and sticking it on their monitor. You can spend weeks discussing how it all works, but in the end it comes down to that dice roll, and on we go.

In life, if the network exists and communication occurs, it can be cracked. It might be impractical, pointless, and take almost the lifetime of the universe, but because the communication exists, it can be compromised.

And if you do come up with a scheme for total secure communications, it will be compromising it if you tell me about it. smile.gif Even if you use it to tell me about it. smile.gif
This is a "lo-fi" version of our main content. To view the full version with more information, formatting and images, please click here.
Dumpshock Forums © 2001-2012