Replies: 1 comment 4 replies
-
I brought up a similar idea very early in the project, but after meditating on it for months I decided it really wasn't the right way to approach the question. My $0.02, if the threat model is a telecommunications take-down in a situation of political strife, you are probably talking about a Nation-State adversary. If that case, the Meshtastic node should be presumed insecure, and radio emissions should be used sparingly if at all. Narrower bandwidth, more directional antennas using less RF power, shorter duration transmissions (using brevity codes: https://en.wikipedia.org/wiki/Brevity_code) on predetermined randomized and rotating schedules - move transmitting equipment often (this brings up the vulnerability of someone going to retrieve a node rather than just running it until its battery runs out and abandoning it). I also wouldn't rely on the in-built encryption - HMAC-sign (user), encrypt, and re-HMAC-sign (network) every message being sent into the Meshtastic ecosystem as you would any other publicly available message transport. Nothing beats PSK-OTPs. Take lessons away from TOR, the entry and exit points are the real vulnerability. Link Labs has an analysis of radio direction finding of LoRa (no affiliation, but linked for reference: https://www.link-labs.com/blog/lora-localization), one can use COTS equipment to localize down to 500Meters with 125kHz using TDOA - here narrower bandwidth makes it harder to discriminate between multipath signals. Nation-States would also have access to other more expensive equipment, the nature of the communications disruption needed by your adversary would determine the resources put in play to counter alternative communication methods (i.e. tanks/bombs vs. cops/bureaucrats). With a Meshtastic node as an entry point, presuming Bluetooth communication to the user terminal (phone, etc.), your unmodified range will be less than 15Meters. So a skilled RDF operator having found a Meshtastic/LoRa signal in their area, could begin a directional search for correlated frequencies (800/900MHz + 2.4GHz Bluetooth with a WIDE bandwidth, and is intentionally designed to be direction found, see Bluetooth Channel Sounding Localization) - and call in an air asset towards the center of that 500meter circle with a lot of juicy 2.4GHz traffic. The effective radius for a 500lb JDAM (a small one) is about 230ft/70Meters, with a high probability kill radius of 65feet/20meters - note that your 15Meter Bluetooth range is well inside that kill radius. They don't even have to be right on your forehead for you to have a bad day. My summary is, if your life depends on it, and your adversary is in control of general communications in your battle space - don't use a $20-30 RF node whose code was developed in the clear. At least not without some modifications. You can receive all day long and it's less likely to be RDF'd (we're ignoring LO leakage out the receive antenna, as an unintentional emitter), having something that gets you onto the Meshtastic system without RF emissions would be recommended. ESP32 has an IR receiver block, there's something to be said about lasers and omni-directional optical receivers here... If you can make the point of entry into the network appear further away from you than you are, that stand-off distance is a start. If your adversary is significantly less capable and equipped, the same advice about short-duration/agreed-schedule messages and directional antennas applies, just communicating using a OTP cipher (where the key is correctly NEVER reused) to encrypt a message before putting it on Meshtastic and blocking the node location transmission is sufficient. This can be done now with a 6-sided game die and a pencil (again no affiliation, but for reference: https://www.youtube.com/watch?v=QRa_zzQOEe8). |
Beta Was this translation helpful? Give feedback.
-
Platform
other
Description
I saw in the documentation that the current cryptography has been reviewed and has concerns. The reviewer stated an attacker can scramble content such that it arrives corrupt, for example at the bottom of their review.
It would be good to make the issues the reviewer found more prominent somewhere so developers and designers can work on them, and of course to do so.
It could make sense to apply an existing cryptosystem such as the popular double ratchet algorithm or even one with anonymity guarantees.
If there were a threat model or imagined scenario, such as a telecommunications takedown in a situation of political strife, this would really help reviewers and possibly designers too.
Beta Was this translation helpful? Give feedback.
All reactions