Backdoor: Difference between revisions

From Perplex City Wiki
Jump to navigationJump to search
Line 610: Line 610:
[[Image:Backdoor_message19.JPG]]
[[Image:Backdoor_message19.JPG]]


====Config 19: Nelis Nuclear Battery====
====Config 20: Nelis Nuclear Battery====


'''Configuration:''' Z M - - -/ - S Z - C/ - - S - R/- - - S R/- - - R S/
'''Configuration:''' Z M - - -/ - S Z - C/ - - S - R/- - - S R/- - - R S/

Revision as of 08:46, 4 July 2006

Summary

After discovering that V called someone at the Academy's Crypto Department, Caine heads over to Crypto to investigate. He runs into his friend Neville Clark, who is talkative, if obfuscating. The Cube Hunters entice Nev into sharing more information by giving him a puzzle, designed by jbd, to solve. Nev takes the bait, and gives us a backdoor that leads to a gridded file system.

Dragging the commands onto the grid to create various configurations yields a series of log snippets. Some of the logs resemble the Perplex City Errorlogs that were found before the puzzle cards were released.

The interface can be accessed at the following URL:

http://events.perplexcity.com/gateway/commandinterface/index.html

As of 17:08, 3 July 2006 (PDT), the puzzle is still being worked on. Join us in #syzygy, or see the discussion on the Talk page or at Unforums.

Commands

Through the combined work of jalapenodude, pelrun, and jbd, #syzygy has determined that the commands appear to work as follows.

The program pointer starts in upper left corner. It moves through the grid one space at a time, as determined by the command in that space.

Generally, the pointer moves in the following directions when it encounters each command. Some exceptions may occur.

popen - east
pread - west
mount - se
pwrite - e
switch - se (Are you sure, goes NE on config 5 below?)
copy - s
flush - s

All of these can go funny in certain circumstances, especially when next to an edge where the next command would normally jump off the grid.

rotate does something different depending on where it is executed, but also (sometimes?) where it comes from. Here are some directions that occur:

 e  e  e  e  s
 s ne  n  n  s
 e  n ne  n  s
ne  n ne  n  s
ne  n ne  n  n

However, it is possible for r3c5 to go north if entered from the west, for example.

The same goes for zone:

e e e w s
s w w n n
e e e n w
n w w n n
n w w n n

End ends execution whenever it gets hit on a specific error message. It is very good for testing where the code is going. Cache seems to only work as an end point. Run can go anywhere that the program pointer isn't reaching.

A configuration is a set of commands placed on the grid so that the grid is valid and a log file is retrieved. The command path is the actual path that the pointer takes through the grid configuration. Different configurations may break down into the same command path.

Configurations and command paths start with ZO-MO, and usually end with either CACHE or FLUSH.

Full Command Path List

The first two numbers are the resulting configuration, the letter after is the variation, and the string is the command path, with each instruction cut to two letters in length. The list is alphabetized based on operation name, as a reference service. Please be sure to also place them above with their respective results, and to sort them in properly when added.

08B ZO-MO-CO-PR-RO-RO-SW-SW-RO-CA
06A ZO-MO-CO-PW-RO-SW-RO-FL
01B ZO-MO-CO-RO-RO-RO-RO-RO-ZO-CA
03C ZO-MO-MO-SW-RO-CA
02B ZO-MO-PO-RO-PW-CA
02A ZO-MO-PO-RO-RO-RO-CA
03A ZO-MO-PO-RO-SW-CA
01A ZO-MO-PO-ZO-RO-RO-CA
13A ZO-MO-PR-PR-CO-CO-PW-RO-SW-SW-RO-CA
11A ZO-MO-PR-PR-SW-SW-SW-RO-SW-RO-CA
08A ZO-MO-PR-SW-SW-RO-CA
09A ZO-MO-PR-SW-SW-SW-RO-CA
10A ZO-MO-PR-SW-SW-SW-RO-RO-CA
07A ZO-MO-PW-RO-SW-FL-ZO-CA
06B ZO-MO-PW-RO-SW-RO-FL
02C ZO-MO-RO-CA
03B ZO-MO-SW-RO-CA
18A ZO-MO-SW-SW-ZO-ZO-ZO-PR-CA
12A ZO-MO-ZO-CO-PW-SW-RO-RO-SW-CA
04A ZO-MO-ZO-ZO-CO-CO-CO-RO-RO-PW-RO-CA
05A ZO-MO-ZO-ZO-CO-CO-CO-SW-RO-PW-RO-CA
16A ZO-MO-ZO-ZO-PW-RO-SW-PR-CA
15A ZO-MO-ZO-ZO-SW-SW-SW-RO-CA
14A ZO-MO-ZO-ZO-SW-SW-SW-RO-SW-RO-CA
17A ZO-MO-ZO-ZO-ZO-PW-RO-SW-CA

Command/File Mapping

The number of times the zone, switch, and rotate commands appears in a command path determines which file is displayed.

Configurations with only the starting zone command
switch
0 1 2 3 4
rotate
1 master TNI Suspic. Header Ioniser
2 unread TNI Yorke NanoImg Ioniser
3 master TNI Suspic. Header Ioniser
4 unread TNI Yorke NanoImg Ioniser



Configurations with one zone (plus the starting zone)
switch
0 1 2 3 4
rotate
1 Camera Coffee Noise Control NanoImg unread
2 Camera Coffee Noise Control NanoImg Tajison
3 Camera Coffee Noise Control NanoImg Battery
4 Camera Coffee Noise Control NanoImg



Configurations with three zones (plus the starting zone)
switch
0 1 2 3 4
rotate
1 unread RNG WHISK
2 unread RNG WHISK
3
4

Configurations

Here are the various configurations and logs that have been discovered.

Config 1: Smart Dust Cameras

Configuration: zone, mount, run, rotate, rotate/ - - popen, zone, cache

Command path: zone, mount, popen, zone, rotate, rotate, cache

Alternate Configuration: zone mount - rotate rotate / run - copy rotate rotate / - - rotate cache zone

Command Path: zone, mount, copy, rotate, rotate, rotate, rotate, rotate, zone, cache

Text:

CRYPTO PARTS REF: 72690B-0F

EXTERNAL REF: 43914D

DESCRIPTION: Engineering/Smart Dust Cameras; corrected auto-power off firmware bugs, increased bandwidth.

Image:

Backdoor message.jpg

Config 2: Approaching the Master

Configuration: zone mount run rotate rotate/ - - popen rotate cache/ - - - - -

Command Path: zone, mount, popen, rotate, rotate, rotate, cache

Alternate Configuration: zone mount run pwrite cache/ - - popen rotate -

Command Path: zone, mount, popen, rotate, pwrite, cache

Alternate Configuration: zone mount run cache -/ - - rotate - -

Command Path: zone, mount, rotate, cache

Text:

Approached the Master today about begining on an updated and revised edition. V. pleased to discover he considers the idea warmly. He actually said, 'My ideas are in good hands with you, and you will of course receive full credit for the work.' Somehow I expected more of a struggle. V. gracious indeed. He's not quite the glory-hog SOME people have made him out to be, I guess.

Image:

Backdoor message2.jpg

Config 3: Neuro Scanner

Configuration: zone mount run switch -/ - - popen rotate cache / - - - - -

Command Path: zone, mount, popen, rotate, switch, cache

Alternate Configuration: zone mount run - -/ - - switch cache -/ - - - rotate -

Command Path: zone, mount, switch, rotate, cache

Alternate Configuration: zone mount run - -/ - - mount - -/ - - - switch cache / - - - - rotate

Command Path: zone, mount, mount, switch, rotate, cache

Text:

CRYPTO PARTS REF: 6032VQ-0J


EXTERNAL REF: 10086W

DESCRIPTION: Neuro/Experimental remote TNI scanner; security and identification firmware updated for new Cognivia prototype.

Image:

Backdoor message3.jpg

Config 4: Laser

Configuration: zone mount run -- –/copy zone zone cache --/copy pwrite rotate -- --/copy rotate -- -- --/rotate -- -- -- --

Command Path: zone, mount, zone, zone, copy, copy, copy, rotate, rotate, pwrite, rotate, cache

Text:

CRYPTO PARTS REF: 384621-5A


EXTERNAL REF: 9CE42T

DESCRIPTION: Optics/High Power phase-conjugate laser; calibration and adjustment for high spaciotemporal accuracy.

Image:

Backdoor message4.png

Config 5: Sphere

Configuration: zone mount run -- / copy zone zone cache - / copy pwrite rotate -- / copy rotate --- / switch ----

Command Path: zone mount, zone, zone, copy, copy, copy, switch, rotate, pwrite, rotate, cache

Text:

CRYPTO PARTS REF: 3141PU-1M

EXTERNAL REF: OUF12M

DESCRIPTION: Physics/Baker Spherical Magnetic Containment field; interfaced with dedicated fibre network. Tested at 120% maximum tesla strength to ensure no field leakage.

Image:

Backdoor message5.JPG

Config 6: Gatehouse 24

Configuration:' Zone Mount Run -- -- / -- -- Copy Switch Flush / -- -- Pwrite Rotate Rotate

Command Path: zone, mount, copy, pwrite, rotate, switch, rotate, flush

Alternate: zone mount run switch flush / ---- ---- pwrite rotate rotate

Command Path: zone, mount, pwrite, rotate, switch, rotate, flush

When this configuration is run, a message Operation in progress appears. The screen then distorts and wavers. Finally, a log appears. Discussion on Unforums suggests that the logs may rotate, or appear randomly.

Log 1

Helen Carrick and Idola Friedberg

[ GATEHOUSE 24 ]

:: start 143805 +000000
:: start 143805 +000000
:: archive location { dev 7 }
:: index { yes }
:: retention { 9 }
:: processing time { 0.53 }
::

A

// labeled A;
// triangulated location mapped;
// passive badge { present }
// badge query { friedberg, i {119yr} }

You really said that [?]

// preliminary review complete

B

// labeled B;
// triangulated location mapped;
// passive badge { present }
// badge query { carrick, h {624yr} }

I was hungry [!] I'm not diplomatic when I'm starving [.]

// preliminary review complete
// 45% positive emotional state
// cross reference surveillance footage

{ extrapolated: badge {line 16} extracted }

{ gatekeeper system 24;
active badge interrogated, passed }

FRIEDBERG, I

I bet you fifty lecks your stuff is wiped when you get back [.]

// preliminary review complete

CARRICK, H

Hah [,] I'd like to see him even try [.]

// preliminary review complete


[ LOG EXCERPT ENDS ]
Log 2

Camden Porta and Lucas Bazeries

[ GATEHOUSE 24 ]

:: start 055814 +000000
:: start 061055 +000000
:: archive location { dev 7 }
:: index { yes }
:: retention { 9 }
:: processing time { 0.53 }
::

A

// labeled A;
// triangulated location mapped;
// passive badge { present }
// badge query { porta, c {112yr} }

Where have you been [?]

// preliminary review complete

B

// labeled B;
// triangulated location mapped;
// passive badge { present }
// badge query { bazeries, l {520yr} }

So I'm a little late [.] Relax [.]

// preliminary review complete
// 45% positive emotional state
// cross reference surveillance footage

{ extrapolated: badge {line 16} extracted }

{ gatekeeper system 24;
active badge interrogated, passed }

PORTA, C

We have to hurry and get this thing done [.]

// preliminary review complete

BAZERIES, L

Is he here yet [?]

// preliminary review complete

PORTA, C

I think so [.] Let's hurry [.]

// preliminary review complete


BAZERIES, L

I hope there's coffee [.]

// preliminary review complete

PORTA, C

Focus on the project [,] dunderhead [.]

// preliminary review complete


[ LOG EXCERPT ENDS ]
Log 3

Rowan Ashford and Mark Wooster

[ GATEHOUSE 24 ]

:: start 192355 +000000
:: start 192401 +000000
:: archive location { dev 7 }
:: index { yes }
:: retention { 9 }
:: processing time { 0.53 }
::

A

// labeled A;
// triangulated location mapped;
// passive badge { present }
// badge query { ashford, r {737yr} }

Hey [,] wait up [.]

// preliminary review complete

B

// labeled B;
// triangulated location mapped;
// passive badge { present }
// badge query { wooster, m {019yr} }

Oh [,] sorry [.] Hard meeting today [.]

// preliminary review complete
// 23% positive emotional state
// cross reference surveillance footage

{ extrapolated: badge {line 16} extracted }

{ gatekeeper system 24;
active badge interrogated, passed }

ASHFORD, R

Do you ever wonder [...]

// preliminary review complete

WOOSTER, M

Don't say it [.]

// preliminary review complete

ASHFORD, R

I know [,] I know [.] No place is safe [.]

// preliminary review complete

[ LOG EXCERPT ENDS ]

Config 7: Coffee

Configuration: zone mount run switch - / - - pwrite rotate flush / - - - cache zone

Command Path: zone, mount, pwrite, rotate, switch, flush, zone, cache

Backdoor message7.JPG

Config 8: Kiteway disrupting the department

Configuration: zone mount - - - / - switch pread - - / - - switch cache - / - - - rotate -

Command Path: zone, mount, pread, switch, swtich, rotate, cache

Alternate Configuration: zone mount switch - - / run rotate copy switch cache / - rotate pread - rotate

Command Path: zone, mount, copy, pread, rotate, rotate, switch, switch, rotate, cache

To: 55321801 

FROM: MANSOOR H. 

Kiteway's programs are disrupting the entire department. Breeding hostility 
and distrust among amicable colleagues. The man doesn't belong here anymore, 
why can't he keep his damned pet projects in his own office? Crypto is mine 
now, not his. 

Well, here are the metrics to show he's not minding his own business. 

Number of times Kiteway has visited dept. offices this year: 78 

And in 268: 129 

And in 267: 23 

Dept. suspicion level on the Howe-Panntonin Index: 8.8 

And in 268: 7.3 

And in 267: 4.5 

Suspect the man has his own agenda and isn't sharing with the proper channels, 
for example me and you. Suspect he is subverting the time and resources of my 
faculty without consulting me ahead of time. Behaving as though he can't trust 
his own senior fellows. Ridiculous. How long must we put up with this childish 
rigmarole?

Config 9: Project Data

Configuration: zone mount - - - / - switch pread - - / - - switch - - / - - - switch cache / - - - - rotate

Command Path: zone, mount, pread, switch, switch, switch, rotate, cache

Project Data.JPG

Config 10: Nanoscale imager

Configuration: zone mount - - - / - switch pread - - / - - switch - cache / - - - switch rotate / - - - - rotate

Command Path: zone, mount, pread, switch, switch, switch, rotate, rotate, cache

Backdoor message8.JPG

Config 11: Reynolds ioniser

Configuration: zone mount - - - / switch pread pread - - / - switch - - - /- - switch switch cache / - - - rotate rotate

Command Path: zone, mount, pread, pread, switch, switch, switch, rotate, switch, rotate, cache

Backdoor message9.JPG

Config 12: Noise control system

Configuration: zone mount -- -- -- / -- copy zone switch -- / -- pwrite switch rotate cache / -- -- -- rotate --

Command Path: zone-mount-zone-copy-pwrite-switch-rotate-rotate-switch-cache

Backdoor message10.JPG

Config 13: Physics simulator

Configuration: zone mount -- -- -- / copy pread pread -- -- / copy switch -- -- -- / pwrite rotate switch cache -- / -- -- -- rotate --

Command Path: zone-mount-pread-pread-copy-copy-pwrite-rotate-switch-switch-rotate-cache

Backdoor message11.JPG

Config 14: Magnet current regulators

Configuration: zone mount -- -- -- / switch zone zone -- -- / -- switch -- -- -- / -- -- switch switch cache / -- -- -- rotate rotate

Command Path: zone-mount-zone-zone-switch-switch-switch-rotate-switch-rotate-cache

Backdoor message12.JPG

Config 15: Atomic Clock

Configuration: zone mount -- -- -- / switch zone zone -- -- / -- switch -- -- -- / -- -- switch cache -- / -- -- -- rotate --

Command Path: zone-mount-zone-zone-switch-switch-switch-rotate-cache

Backdoor message14.jpg

Config 16: Big Nothing

Configuration: zone mount copy -- -- / switch zone zone switch -- / run pwrite rotate cache pread

Command Path: zone-mount-zone-zone-pwrite-rotate-switch-pread-cache

Backdoor 16.JPG

Config 17: Nuclear decay RNG

Configuration: zone mount -- -- -- / zone zone zone -- -- / pwrite rotate switch -- -- / -- -- -- cache --

Command Path: zone-mount-zone-zone-zone-pwrite-rotate-switch-cache

Backdoor message13.JPG

Config 18: WHISK array

Configuration: Z M - - -/ - - S - -/ Ca - - S -/Ro Pr Z Z Z/

Command Path: Zone-Mount-Switch-Switch-Zone-Zone-Zone-Pread-Cache

Backdoor message17.JPG

Config 19: Tajison PW Accelerator

Configuration: Z M - - -/ - S Z - -/ - - S - C/- - - S R/- - - R S/

Command Path: Zone-Mount-Zone-Switch-Switch-Switch-Switch-Rotate-Rotate-Cache

Backdoor message19.JPG

Config 20: Nelis Nuclear Battery

Configuration: Z M - - -/ - S Z - C/ - - S - R/- - - S R/- - - R S/

Command Path: Zone-Mount-Zone-Switch-Switch-Switch-Switch-Rotate-Rotate-Rotate-Cache

Backdoor message20.JPG

Historical Cryptographers

Some of the names mentioned in the logs share the names of historic cryptographers and mathematicians.

Bazeries
French military cryptographer, the 'pragmatic man of cryptology'. Famous for breaking the French 'Great Cipher' created in the 17th century.
Porta
Giovanni Battista Porta, Italian cryptographer and inventor of the Della Porta cipher - a polyalphabetic cipher with keyword.
Ashford
the name of the village in Kent where John Wallis, 17th century mathematician, was born. He wrote among other things, about the quadrature of curves, logic, theology and cryptography.
Carrick
the name of a Windows-based encryption application, designed by cryptographer Bruce Schneier.