Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Meshtastic
  3. MeshMarauder: someone finally published a tool to demonstrate how trivial it is to defeat meshtastic's DM encryption (by replacing public keys in profile broadcasts)

MeshMarauder: someone finally published a tool to demonstrate how trivial it is to defeat meshtastic's DM encryption (by replacing public keys in profile broadcasts)

Scheduled Pinned Locked Moved Meshtastic
meshtastic
15 Posts 8 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • cypherpunks@lemmy.mlC [email protected]

    In asymmetric encryption, the private key is used for decrypting things which were encrypted using the corresponding public key. You don't encrypt things using the private key.

    The problem here is that Meshtastic doesn't have any means whatsoever of ensuring that a public key is authentic, and they allow keys to be replaced at any time. Verifying keys out-of-band would be the most secure approach, but to enable encryption between nodes who don't do that the thing Meshtastic should be doing is ssh-style TOFU (meaning that users must explicitly acknowledge when a key changes before using the new key).

    S This user is from outside of this forum
    S This user is from outside of this forum
    [email protected]
    wrote last edited by
    #5

    Oh, definitely, when keys change, you should be required to acknowledge the new key.

    1 Reply Last reply
    3
    • cypherpunks@lemmy.mlC [email protected]

      In asymmetric encryption, the private key is used for decrypting things which were encrypted using the corresponding public key. You don't encrypt things using the private key.

      The problem here is that Meshtastic doesn't have any means whatsoever of ensuring that a public key is authentic, and they allow keys to be replaced at any time. Verifying keys out-of-band would be the most secure approach, but to enable encryption between nodes who don't do that the thing Meshtastic should be doing is ssh-style TOFU (meaning that users must explicitly acknowledge when a key changes before using the new key).

      S This user is from outside of this forum
      S This user is from outside of this forum
      [email protected]
      wrote last edited by
      #6

      I may be thinking of signing. The idea is that you would have a message that's only proven to be authentic if you get the corresponding key. I probably just have the wrong terminology or something.

      cypherpunks@lemmy.mlC 1 Reply Last reply
      2
      • S [email protected]

        I may be thinking of signing. The idea is that you would have a message that's only proven to be authentic if you get the corresponding key. I probably just have the wrong terminology or something.

        cypherpunks@lemmy.mlC This user is from outside of this forum
        cypherpunks@lemmy.mlC This user is from outside of this forum
        [email protected]
        wrote last edited by
        #7

        Yes, you can make a signature using the private key and anyone can verify it using the corresponding public key.

        But, if the attacker can replace the public key they can also replace the signature with one made using their own key - so this doesn't solve the problem of keys being unverified.

        If public keys were actually verified, signatures could protect the other fields in the profile packet from being modified. You could also theoretically use signatures to authenticate key rotation, by signing a packet containing your new public key using your old private key. But this doesn't really work in the unreliable radio setting where some messages are likely to be missed.

        1 Reply Last reply
        3
        • cypherpunks@lemmy.mlC [email protected]
          This post did not contain any content.
          R This user is from outside of this forum
          R This user is from outside of this forum
          [email protected]
          wrote last edited by
          #8

          Yeah, I didn't have any current expectations about the privacy, anything beyond security-by-obscurity which is absolutely not reliable for any important private conversation.

          I'm pretty much chatting with complete strangers on the network anyway, and the usefulness I see is as a secondary communication band if traditional networks aren't available in a crisis. The PSK sounded more like a channel filter than an encryption mechanism to me anyway (I hope my past comments describing meshtastic were clear about this).

          I'm all for identifying these flaws and fixing them, improving the protocol in future version so that maybe eventually it can be suitable for sensitive information than hobbyist blather or emergency info.

          lightrush@lemmy.caL S 2 Replies Last reply
          6
          • cypherpunks@lemmy.mlC [email protected]
            This post did not contain any content.
            B This user is from outside of this forum
            B This user is from outside of this forum
            [email protected]
            wrote last edited by
            #9

            Meanwhile, radioamater enthusiasts chatting clear morse that you can listen from literally anywhere in the globe 🤣

            captain_aggravated@sh.itjust.worksC 1 Reply Last reply
            4
            • R [email protected]

              Yeah, I didn't have any current expectations about the privacy, anything beyond security-by-obscurity which is absolutely not reliable for any important private conversation.

              I'm pretty much chatting with complete strangers on the network anyway, and the usefulness I see is as a secondary communication band if traditional networks aren't available in a crisis. The PSK sounded more like a channel filter than an encryption mechanism to me anyway (I hope my past comments describing meshtastic were clear about this).

              I'm all for identifying these flaws and fixing them, improving the protocol in future version so that maybe eventually it can be suitable for sensitive information than hobbyist blather or emergency info.

              lightrush@lemmy.caL This user is from outside of this forum
              lightrush@lemmy.caL This user is from outside of this forum
              [email protected]
              wrote last edited by
              #10

              You're in the GTA right? What's your tag? I'm OO1, OO2, OO3.

              R 1 Reply Last reply
              2
              • cypherpunks@lemmy.mlC [email protected]

                In asymmetric encryption, the private key is used for decrypting things which were encrypted using the corresponding public key. You don't encrypt things using the private key.

                The problem here is that Meshtastic doesn't have any means whatsoever of ensuring that a public key is authentic, and they allow keys to be replaced at any time. Verifying keys out-of-band would be the most secure approach, but to enable encryption between nodes who don't do that the thing Meshtastic should be doing is ssh-style TOFU (meaning that users must explicitly acknowledge when a key changes before using the new key).

                lightrush@lemmy.caL This user is from outside of this forum
                lightrush@lemmy.caL This user is from outside of this forum
                [email protected]
                wrote last edited by
                #11

                Err, is it just me or does the Android client stop exchanging DMs in an existing chat if a public key changes? I've had to delete conversations between my nodes to reenable comm after regenerating one node's public key.

                1 Reply Last reply
                0
                • R [email protected]

                  Yeah, I didn't have any current expectations about the privacy, anything beyond security-by-obscurity which is absolutely not reliable for any important private conversation.

                  I'm pretty much chatting with complete strangers on the network anyway, and the usefulness I see is as a secondary communication band if traditional networks aren't available in a crisis. The PSK sounded more like a channel filter than an encryption mechanism to me anyway (I hope my past comments describing meshtastic were clear about this).

                  I'm all for identifying these flaws and fixing them, improving the protocol in future version so that maybe eventually it can be suitable for sensitive information than hobbyist blather or emergency info.

                  S This user is from outside of this forum
                  S This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #12

                  Yeah, I just started messing around with Meshtastic, and it is apparent it's more of a beta project. Has lots of little bugs, no real routing, etc. Seems like the user-base outpaced development. It is pretty cool though, and I hope they fix the glaring issues quickly.

                  1 Reply Last reply
                  2
                  • lightrush@lemmy.caL [email protected]

                    You're in the GTA right? What's your tag? I'm OO1, OO2, OO3.

                    R This user is from outside of this forum
                    R This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #13

                    Currently in Vancouver. I play with it on certain weekends only though so far with some Heltecs. I'll be in Toronto next in the fall sometime (hopefully after the fabled Eglinton Crosstown opens 🤣).

                    1 Reply Last reply
                    2
                    • cypherpunks@lemmy.mlC [email protected]
                      This post did not contain any content.
                      deafboy@lemmy.worldD This user is from outside of this forum
                      deafboy@lemmy.worldD This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #14

                      As far as I remember, the end-to-end encrypted DMs are relatively recent thing in Meshtastic. Before, the messages were just encrypted with the symetric channel key.

                      The scale of meshtastics avoidance of building security into the design is pretty epic.

                      This is not an easy problem to solve. Each possible solution requires a trade-off.

                      1 Reply Last reply
                      1
                      • B [email protected]

                        Meanwhile, radioamater enthusiasts chatting clear morse that you can listen from literally anywhere in the globe 🤣

                        captain_aggravated@sh.itjust.worksC This user is from outside of this forum
                        captain_aggravated@sh.itjust.worksC This user is from outside of this forum
                        [email protected]
                        wrote last edited by
                        #15

                        Encryption is almost entirely illegal on the ham bands. You can encrypt control signals to satellites but that's about it.

                        1 Reply Last reply
                        1
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups