[olsr-dev] Implementing an attack into olsrd

Jens Nachtigall (spam-protected)
Sat Jun 17 13:58:00 CEST 2006

Am Samstag, 17. Juni 2006 13:38 schrieb Roar Bjørgum Rotvik:
> aaron wrote:
> > Another hopefully better idea for a simple diploma thesis:
> > make olsrd packets signed so that black holes cannot be intentionally
> > forced.
> That is exactly what the secure plug in does, and already exist in olsrd..
> It add secure signatures for olsr packets, so you can choose to accept
> only packets from nodes with a correct signature (requiring the correct
> key when signing the packets). Evil nodes or unknown nodes may then be
> ignored.

Afaik this is simply a shared key, which is not very secure in a community 
network with several nodes and several different admins (in most cases at 
least > 50).

though the threshold might be higher

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
URL: <http://lists.olsr.org/pipermail/olsr-dev/attachments/20060617/85051f39/attachment.sig>

More information about the Olsr-dev mailing list