public inbox for b.a.t.m.a.n@lists.open-mesh.org
 help / color / mirror / Atom feed
From: Simon Wunderlich <sw@simonwunderlich.de>
To: b.a.t.m.a.n@lists.open-mesh.org
Subject: [B.A.T.M.A.N.] The Joker attacks
Date: Tue, 19 May 2015 15:14:04 +0200	[thread overview]
Message-ID: <2815619.WUHEGcIjkX@prime> (raw)

[-- Attachment #1: Type: text/plain, Size: 1600 bytes --]

After laying low for quite some time, the Joker finally makes its appearance! 
"The Joker" - a penetration testing and research tool to test security aspects 
of batman-adv networks - was developed by security researchers Pedro Larbig 
and Alexander Oberle at TU Darmstadt (Germany), and we finally got permission 
to release the source code to the public.

The tool currently supports the following tests:

 * Peer/Route flooding: flood fake OGMs
 * Blackhole: announce to neighbors that the best route is via the attacker 
node
 * Loop Forming: create local loops on multi-hop paths
 * Fuzzing: modify packets randomly to create malformed packets

Pedro & Alexander developed the tool in order to facilitate their mesh network 
security research. Their work focuses on B.A.T.M.A.N. Advanced version 
2011.1.0 and concluded that this version was performing pretty well in the 
Peer/Route and fuzzing tests. Albeit not being able to prevent maliciously 
provoked loops/blackholes entirely, B.A.T.M.A.N. Advanced did recover quickly 
when needed, according to their study.

To instigate further interest in mesh network security the 'Joker' code base 
is being published alongside this announcement. Hopefully, the Joker inspires 
security researchers as well as developers to investigate and fix issues in the 
B.A.T.M.A.N. protocol and/or implementation. We will also accept contributions 
for the Joker through the usual channels. Note that the tool does currently 
not work with the more recent versions 2013.4.0 or 2014.4.0 and later - 
patches are welcome.

Happy routing,

The B.A.T.M.A.N. team

[-- Attachment #2: This is a digitally signed message part. --]
[-- Type: application/pgp-signature, Size: 181 bytes --]

                 reply	other threads:[~2015-05-19 13:14 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2815619.WUHEGcIjkX@prime \
    --to=sw@simonwunderlich.de \
    --cc=b.a.t.m.a.n@lists.open-mesh.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox