You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
At the moment, it is possible to spoof a baton: since the stations recognize the batons based on their MAC address, it's trivially possible to spoof batons by changing your MAC address. This could lead to all kinds of mayhem. Since it's possible to control the BTLE payload, we could do some cryptography magic™ to authenticate the batons. This should only happen on the stations (and not be propagated any further), as to not increase the complexity of Telraam or other software.
The text was updated successfully, but these errors were encountered:
Idea: use a single byte of a fast HMAC algorithm over the data sent. If data is spoofed, there's a 255/256 chance to get caught. If data is replayed, this will be noticed by monitoring that the baton has rebooted.
At the moment, it is possible to spoof a baton: since the stations recognize the batons based on their MAC address, it's trivially possible to spoof batons by changing your MAC address. This could lead to all kinds of mayhem. Since it's possible to control the BTLE payload, we could do some cryptography magic™ to authenticate the batons. This should only happen on the stations (and not be propagated any further), as to not increase the complexity of Telraam or other software.
The text was updated successfully, but these errors were encountered: