Hello,
i agree to Marek, just encryption won't give us security, and i think it's better to keep the mesh open and "unsafe" than having people a delusion of "security", which would probably make things worse.
Anyway, i'd like to add that there is more than WEP for Adhoc:
There is WPA-NONE, which can be used with wpa_supplicant. Basicly it works with static keys, but doesn't support re-keying, replay attack detection and such as there is of course no AP which would regulate these features. So this is probably much weaker than "normal" WPA-PSK. (I'd be interested in a proper "security" discussion/documentation about this).
Btw, this does not seem to be a standard thing (couldn't find it in 802.11i), and there is no proper documentation as far as i can see. If anyone finds something usable, please let me know. ;)
You can give it a try, have a look at [1] and search for WPA-NONE in the document. Be aware that drivers might not (yet?) work with that. I know from madwifi that it still tries to apply replay rules even in IBSS mode and thus won't work with more than 2 particapants (that would give a boring mesh, right?). :D
Best Regards, Simon
[1] http://user.uni-frankfurt.de/~testrad/wpa_supplicant/wpa_supplicant.conf.exa...
On Thu, Apr 10, 2008 at 07:53:58AM +0530, Vinay Menon wrote:
The problem I see here is the possibility of unwanted batman nodes joining in and announcing wrong/ false gateway. Since adhoc will only support WEP and imo its not viable having batman run only over VPN, i think a symmetric key arrangement where in all nodes have the same password to join in routing would be a great addition. This basically is the concept of olsr secure plugin.
Regards, Vinay Menon