Key Management Guide

PSK lifecycle, operator roles, key rotation procedures, and credential management for LA-Mesh.

Key Types

KeyTypeStored WhereRotated
Channel PSK (x3)Symmetric (AES-256)Operator encrypted storageQuarterly
Device PKC key pairAsymmetric (X25519)On-device onlyOn firmware update
MQTT credentialsUsername/passwordEncrypted keystore (KeePassXC)On compromise
SMTP credentialsAPI tokenEncrypted keystore (KeePassXC)On compromise

PSK Generation

# Generate a 256-bit random PSK on a trusted machine
openssl rand -base64 32

Produces a key like: K7xR2p4mN8vQwY3jH6fL0tBuI9sDcE5gA1rO7kZ4hXs=

PSK Distribution Rules

  1. Generate on an air-gapped device or trusted machine
  2. Distribute ONLY in person, face-to-face
  3. Never send via text, email, Signal, or any digital channel
  4. Write on paper, show screen, or use QR code in-person
  5. Destroy paper copies after devices are configured
  6. Rotate quarterly or immediately on suspected compromise

PSK Application

# Apply PSK to device
meshtastic --ch-set psk "<base64-psk>" --ch-index 0

# Verify
meshtastic --info

Compromise Response

EventAction
Suspected PSK leakRotate affected channel immediately
Device theftRotate all channels, attempt remote wipe via admin channel
Firmware vulnerabilityUpdate all devices, rotate PKC keys if needed
Operator departureRotate admin channel PSK

Recommended Tools

ToolPurpose
KeePassXCOffline AES-256 encrypted credential storage for PSKs, MQTT/SMTP credentials, and API tokens
OMEMOSignal Protocol over federated XMPP -- end-to-end encrypted messaging for operator coordination

LA-Mesh - Community LoRa mesh network for Southern Maine

GitHub