Mesh Network Security

2-hour workshop Free -- fortnightly in the L-A area

Learning Objectives

  1. Generate and manage secure PSK keys
  2. Enable and verify PKC for direct messages
  3. Explain CVE-2025-52464 and its implications
  4. Perform a basic threat model for a community mesh
  5. Follow operational security practices for key distribution

Part 1: Encryption Layers (25 min)

LayerMechanismWho Can Read
ChannelAES-256-CTRAll devices with PSK
Direct MessageX25519 + AES-256-CCMOnly recipient
meshtastic --info  # Check your device's public key

Part 2: PSK Management (25 min)

# Generate a 256-bit PSK
openssl rand -base64 32

# Apply to device
meshtastic --ch-set psk "<your-base64-psk>" --ch-index 0
PSKBitsSecurity
AQ== (default)8NONE -- publicly known
Short passphrase~40-60Weak
16-byte random128Good
32-byte random256Strong -- LA-Mesh standard

Part 3: CVE-2025-52464 Case Study (20 min)

CVSSv4: 9.5 (Critical) -- Vendors cloned firmware images without regenerating keys, causing identical key pairs across thousands of devices.

Fix: Firmware v2.7.15+ forces key regeneration. LA-Mesh policy: no device below v2.7.15. v2.7.15 also fixes CVE-2025-24797, CVE-2025-55293, CVE-2025-55292, CVE-2025-53627 and enforces PKI-only DMs.

meshtastic --info | grep "Firmware"

Part 4: Threat Modeling (30 min)

ActorCapabilityLikelihood
Curious neighborSDR receiver, basic skillsMedium
Local law enforcementProfessional RF equipmentLow-Medium
Sophisticated adversaryFull SDR suite, traffic analysisVery Low
Prankster/trollMeshtastic deviceMedium

Part 5: Operational Security (20 min)

  • Enable PKC for direct messages (enforced in v2.7.15+)
  • Use a device PIN/screen lock
  • Disable GPS position sharing if OpSec requires it
  • Monitor node list for unknown devices
  • Keep firmware updated

References

LA-Mesh - Community LoRa mesh network for Southern Maine

GitHub