Add New Page: You are not allowed to add pages Select section/namespace. New page title.
 

h1. Hackday May 18th, 2012

h2. Agenda

09:00 Arrive, coffee and pastry 09:30 Design exercise (Nina and Ben joining remotely) 10:30 Discuss coding tasks, break into groups to start working 12:00 Break for lunch 13:00 Inveneo call 14:00 Return to coding 16:30 Gather to wrap up 17:00 Clean up and depart

h2. Resources

h3. Design Exercise

* Mesh wizard bash script from Freifunk in the OpenWRT sources

* Kind of clunky, not best fit but perhaps good prod/prompt for thought

* Freifunk policy routing

* Luci interface for whether you want to share internet connection or not

* Feature in Freifunk firewall

* Facilitates sharing or not sharing hosts in your upstream network

h3. Security Architecture

text around security architecture on the wiki - threat models * Commotion Security Architecture * “Mitigating Security Threats in Tactical Networks”:https://encrypted.google.com/url?sa=t&rct=j&q=tactical+networking+threat+model&source=web&cd=1&ved=0CGIQFjAA&url=http%3A%2F%2Fftp.rta.nato.int%2Fpublic%2F%2FPubFullText%2FRTO%2FMP%2FRTO-MP-IST-092%2F%2F%2FMP-IST-092-20.doc&ei=TMOyT-7UOMfpggeX85m-CQ&usg=AFQjCNFxzrtI7sqYTdcFtTX_mmjALIP6rg&sig2=NDHpLJoIxIZencaZSdXX-g&cad=rja * “Methodology for Analyzing the Compromise of a Deployed Tactical Network”:https://encrypted.google.com/url?sa=t&rct=j&q=tactical+mesh+networking+threat+model&source=web&cd=10&ved=0CIQBEBYwCQ&url=http%3A%2F%2Fccl.northwestern.edu%2Fpapers%2F2011%2Fasman.pdf&ei=w8OyT4bDGsWggwfYkf2nCQ&usg=AFQjCNHnjf2CEmf_Wpq_97ZyzIXFcOJ4Ww&sig2=8tYcV2yYEKhdHMfADWu8Vg&cad=rja * “Security in Wireless Mesh Networks”:https://encrypted.google.com/url?sa=t&rct=j&q=tactical+mesh+networking+threat+model&source=web&cd=24&ved=0CFsQFjADOBQ&url=http%3A%2F%2Fwww.chinacommunications.cn%3A8080%2Fzgtx%2FEN%2Farticle%2FdownloadArticleFile.do%3FattachType%3DPDF%26id%3D7554&ei=08SyT4_sIdTqgQf6_qi4CQ&usg=AFQjCNEQFl-xVhfcQz1J42PmLaiRk2FlQw&sig2=H4knoHVV8ckkEkJuTqqhbw&cad=rja * “Selective Jamming/Dropping insider attacks in Wireless mesh networks”:https://encrypted.google.com/url?sa=t&rct=j&q=tactical+mesh+networking+threat+model&source=web&cd=29&ved=0CG0QFjAIOBQ&url=http%3A%2F%2Fwww2.engr.arizona.edu%2F~llazos%2Fpapers%2FLAZOS_IEEENET11.pdf&ei=08SyT4_sIdTqgQf6_qi4CQ&usg=AFQjCNEdDQ4mBqRa0P0Dzpu5MXBY0E29lA&sig2=0QDNHFg3JSjLPJu80ecWDg&cad=rja * “Jamming-Resilient Multipath Routing Leveraging Availability-Based Correlation”:https://encrypted.google.com/url?sa=t&rct=j&q=tactical+mesh+networking+threat+model&source=web&cd=40&ved=0CGoQFjAJOB4&url=http%3A%2F%2Fwww.cse.sc.edu%2F~mustafah%2Fdownload%2Fwisec15s-mustafa.pdf&ei=bsWyT4icGNDngQfssrjDCQ&usg=AFQjCNHnmD5yzUaoHYL-Lb-MfAwoSsn19g&sig2=ds7ieaJV22S2IaJdOA3afg&cad=rja

h2. Tasks

* Design exercise as a warm up Think about, if you have this node, what would you do with it? Where would you plug it in? To whom do you want to share, provide connectivity, etc?

* Bound in time, 1 hour with pointers to further discussion ideas, topics
* Including Ben, Nina if possible?
* Maybe to follow mesh config?

* Security basics knowledge share (re-schedule for a future hackday)

* Call with Inveneo

* Split into groups to tackle individual development and testing tasks.

* *Piratebox*: This is a fun one. Work on implementing Piratebox as a Luci/Commotion app. Would involve creating a file-upload interface, a hotplug script that works with mountd to format and mount USB drives as they're plugged in, and an interface for listing the files present on that node.
* *mDNS*: This is comprised of several different testing and coding sub-tasks:
* server-less XMPP: testing to see if there are any configuration issues or pitfalls with doing server-less XMPP in conjunction with OLSRd p2pd plugin
* nodes need to advertise services over the mesh, scan for services on the mesh and on local networks, and advertise available services through the web interface. Some research will be needed to figure out whether we can do this with dnsmasq or if we need Avahi, and if so, tools and interfaces will need to be written around either one to make it possible.

* *authSAE*: Build authSAE into Commotion and see if we can get a mesh link running. How well does it work and what will it and won't it do?
* *remote-update*: remote-update needs signing support, and possibly better hardware detection.

h2. mDNS

mDNS: An OLSR node equipped with mDNS plugin can passively capture mDNS packets and forward tehm into the mesh network as OLSR signalling. Other nodes with the plugin can then reproduce it on their attached subnets.

h3. Deliverables:

This is comprised of several different testing and coding sub-tasks:

server-less XMPP: testing to see if there are any configuration issues or pitfalls with doing server-less XMPP in conjunction with OLSRd p2pd plugin

nodes need to advertise services over the mesh, scan for services on the mesh and on local networks, and advertise available services through the web interface. Some r\ esearch will be needed to figure out whether we can do this with dnsmasq or if we need Avahi, and if so, tools and interfaces will need to be written around either one\ to make it possible.

h3. mDNS

http://www.multicastdns.org/

* “OLSR mDNS extension intro paper PDF”:https://encrypted.google.com/url?sa=t&rct=j&q=mesh+mdns+openwrt&source=web&cd=19&ved=0CFoQFjAIOAo&url=http%3A%2F%2Fzioproto.ninux.org%2Fdownload%2Fpublications%2Fmdns-plugin-paper.pdf&ei=PYu1T8KmF9Lhgge4sajmDw&usg=AFQjCNEhPZ_p-8vGB95MiCodWxi6OfIKrg&sig2=Y5EEg7_h-y0RB0iLhfC-RQ

* Overview of mDNS over openWRT using olsr http://wiki.ninux.org/olsrd-mdns

* mDNS does not travel across subnets (one solution): https://irq5.wordpress.com/2011/01/02/mdns-repeater-mdns-across-subnets/

* SAY: lightweight GPLv2 mDNS (ZeroConf/Avahi/Bonjor) packet repeater to cross to neigboring subnets:

http://svn.ninux.org/svn/ninuxdeveloping/say/trunk/

* zero configuration esrveces with mdns on an OLSR mesh (ninux italian mesh) http://translate.google.com/translate?sl=it&tl=en&js=n&prev=_t&hl=en&ie=UTF-8&layout=2&eotf=1&u=http%3A%2F%2Fwiki.ninux.org%2FZeroconfServices&act=url

* Hexabus: IPv6-based home automation bus that contains a mDNS tutorial on its wiki. https://github.com/mysmartgrid/hexabus/wiki/Getting-started https://github.com/mysmartgrid/hexabus/wiki/Mdnssetup

* Using OLSRd messages for mDNS https://lists.olsr.org/pipermail/olsr-dev/2009-March/002932.html

*Fun history lesson on why mDNS https://lists.olsr.org/pipermail/olsr-dev/2004-December/000143.html

h3. Testing

service)——>eth0)—>r1 (mDNS enabled)—→r2(not mDNS enabled)—→r3(mDNS Enabled)—→eth0)—→ device

h2. Notes

h3. User Interface Notes

* when thinking about networks is how large should it be * we need to user directional antenna's etc to block out noise from other areas * there are quites of the convo since the audio is down * So… UI we have a omin-antenna and we want to join a network * with this interface we find… area X has THIS density, you can join this area Y with THIS density/interfierance/capacity of the network * so giving the user feedback of which networks are usable. * so, statistics along with available mesh networks * But, how do we represent that information in a usable way (aggregate rating) for a new user * Four star network?? * User may not be able to set their own SSID * May have to search through available networks and configure the info based upon the available ones * any feedback the user gets about the layer two and how it scales will help the mesh scale accordingly * that aggregate rating question is a good one * we'd rather not invent another metric, though * but the wifi dot/semicircles are pretty universally understood

project_management/meeting_notes/hack_days/05-18-2012_hackday.txt · Last modified: 2013/11/08 20:00 (external edit)
 
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Share Alike 3.0 Unported