Repository : ssh://git@diktynna/doc On branches: backup-redmine,main
commit 04ec55798a0696ddb839af1cd0c18f861cb74a49 Author: Linus Lüssing linus.luessing@c0d3.blue Date: Mon Jul 8 12:09:14 2024 +0000
doc: open-mesh/OpenHarbors
04ec55798a0696ddb839af1cd0c18f861cb74a49 open-mesh/OpenHarbors.textile | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-)
diff --git a/open-mesh/OpenHarbors.textile b/open-mesh/OpenHarbors.textile index 48316bc0..a47f2215 100644 --- a/open-mesh/OpenHarbors.textile +++ b/open-mesh/OpenHarbors.textile @@ -4,9 +4,7 @@ h1. Idea/Draft: OpenHarbors ("Gotham Docks" / "WPA over L2TP")
This document specifies a way to dynamically tunnel WPA over a potentially untrusted IP network to a gateway of the user's choice.
-h2. Issues - -h3. A) - Issues in Decentral Wireless Community Mesh Networks +h2. Scenario A): Decentral Wireless Community Mesh Networks
In a wireless community mesh network like "Freifunk":https://en.wikipedia.org/wiki/Freifunk involving "batman-adv":https://www.open-mesh.org/projects/batman-adv/wiki/ + "Gluon":https://github.com/freifunk-gluon/gluon/:
@@ -14,6 +12,8 @@ In a wireless community mesh network like "Freifunk":https://en.wikipedia.org/wi # No prior authorization, anonymous participation possible # Uses a firmware with public OpenSource code
+h3. Issues in Decentral Wireless Community Mesh Networks + Currently has the following two issues:
# A user's internet traffic is typically unencrypted in the WLAN mesh cloud (except for https etc.) @@ -70,6 +70,8 @@ Or in other words, move the 802.1x authenticator from the AP to a remote host of
!OpenHarbors-diagram.png!
+h3. S + h3. (Additional) Use-cases & Benefits
This proposed, dynamic solution yields the following, additional interesting opportunities: