SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
Introduction
        Walking down the layers
               Into kernelspace
                      That's it!



           Wireless Kernel Tweaking
        or how B.A.T.M.A.N. learned to y




         Marek Lindner, Simon Wunderlich




                    December 28, 2007




Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                     Walking down the layers
                            Into kernelspace
                                   That's it!

Outline


  1   Introduction
        what is a (dynamic) routing protocol?
        the B.A.T.M.A.N. approach

  2   Walking down the layers
        layer 3 vs. layer 2
        implementation issues
        bridging

  3   Into kernelspace
        what's dierent
        interacting with the kernel

  4   That's it!



             Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                  Walking down the layers    what is a (dynamic) routing protocol?
                         Into kernelspace    the B.A.T.M.A.N. approach
                                That's it!

Example scenario - 6:00




          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                  Walking down the layers    what is a (dynamic) routing protocol?
                         Into kernelspace    the B.A.T.M.A.N. approach
                                That's it!

Example scenario - 23:00




          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                 Walking down the layers    what is a (dynamic) routing protocol?
                        Into kernelspace    the B.A.T.M.A.N. approach
                               That's it!

Example scenario (2)




         Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                   Walking down the layers    what is a (dynamic) routing protocol?
                          Into kernelspace    the B.A.T.M.A.N. approach
                                 That's it!

Introduction to B.A.T.M.A.N.




      B.A.T.M.A.N. = better approach to mobile adhoc networks

      only decide next neighbour, not whole route

      topology is not used or known by nodes

      routing decisions are distributed by the nodes

      designed for lossy networks

      routing protocols internal is out of scope, we just assume it
      works ;)




           Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                  Walking down the layers    implementation issues
                         Into kernelspace    bridging
                                That's it!

Layer 3 - isn't that enough?




      B.A.T.M.A.N. alters routing tables

      kernel manages routing of payload trac

      this works only for IP, no IPv6, DHCP, IPX ...

      users have to make sure that everyone has an unique IP

      routing into/outside other networks is quite complex

          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                    Walking down the layers    implementation issues
                           Into kernelspace    bridging
                                  That's it!

Let's try layer 2




       write userspace proof-of-concept, then go to kernelspace

       instead of IPs, use MAC-addresses as identiers (should
       be[TM] unique per design)

       we provide a virtual switch-port bat0 to the user

       virtual Ethernet interface (TAP), all other nodes are just one
       (virtual) hop away

       IP, IPv6, DHCP, IPX already works on Ethernet, we have
       nothing to do

       can be used as bridge over multiple interfaces (e.g. WiFi and
       Ethernet)




            Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction            layer 3 vs. layer 2
                           Walking down the layers            implementation issues
                                  Into kernelspace            bridging
                                         That's it!

Usage




        provide a virtual switch-port bat0 to the user
        k e r o :/# i f c o n f i g bat0
        bat0            L i n k encap : E t h e r n e t HWaddr 0 0 : 1 3 : 3 7 : 9 1 : 4 2 : 3 7
                         i n e t 6 addr : f e 8 0 : : 2 1 7 : 1 3 f f : f e 3 7 :4237/64 Scope : L i n k
                        UP BROADCAST RUNNING MULTICAST MTU: 1 4 7 2 M e t r i c : 1
                        RX p a c k e t s : 0 e r r o r s : 0 dropped : 0 o v e r r u n s : 0 frame : 0
                        TX p a c k e t s : 4 e r r o r s : 0 dropped : 0 o v e r r u n s : 0 c a r r i e r : 0
                         c o l l i s i o n s :0 txqueuelen :500
                        RX b y t e s : 0 ( 0 . 0 B) TX b y t e s : 3 2 8 ( 3 2 8 . 0 B)

        participants set IP adresses (etc.) on their bat0 interface

        k e r o :/# i f c o n f i g bat0 i n e t 1 9 2 . 1 6 8 . 1 0 . 2 3
        k e r o :/# r o u t e add d e f a u l t gw 1 9 2 . 1 6 8 . 1 0 . 2 3
        ( o r even b e t t e r : )
        k e r o :/# d h c l i e n t bat0




                Marek Lindner, Simon Wunderlich               Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                   Walking down the layers    implementation issues
                          Into kernelspace    bridging
                                 That's it!

All the layer 2 belong to us!




      B.A.T.M.A.N. transports the Ethernet-Frame to the node with
      the destination MAC

      it does not care about IP-adresses etc, just as your switch

      OGMs and payload are encapsulated in our own
      Ethernet-Frames (Ethertype 0x0842)


           Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                    Walking down the layers    implementation issues
                           Into kernelspace    bridging
                                  That's it!

Implementation




     TAP-interface bat0 receives/sends Ethernet-Frames from the
     user
     we decide which neighbour should receive it, based on the
     B.A.T.M.A.N. algorithm
            Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                  Walking down the layers    implementation issues
                         Into kernelspace    bridging
                                That's it!

Bridging support




      B.A.T.M.A.N. collects MACs of participants behind the Bridge
      These lists are announced via HNA-Messages and ooded to
      all B.A.T.M.A.N. nodes
      With this, we have a decentralized MAC Translation Table
          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                  Walking down the layers    implementation issues
                         Into kernelspace    bridging
                                That's it!

Visualization




      Nice side eect: with the HNA information, the whole
      topology with the nodes behind the APs becomes visible
          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction    layer 3 vs. layer 2
                    Walking down the layers    implementation issues
                           Into kernelspace    bridging
                                  That's it!

Great - and now?


     proof-of-concept implementation in the userspace works quite
     well

     the problem is: performance!

     it should also run well on minimal embedded systems (Access
     Points, Cell Phones)
     typical path is:
            select(): wait for a packet
            read() it
            nd next hop, update tables etc. (pretty fast)
            write() it
     System Calls for read/write take very long time (switch to
     kernel mode and back, copy overhead)

     becomes a problem with high bandwidth usage, peak
     performance of the NICs can't be reached

            Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                  Walking down the layers    what's dierent
                         Into kernelspace    interacting with the kernel
                                That's it!

Put it into kernelspace




      No useless message copy (recycle kernel buers)

      no Syscalls and no user/kernel mode switch

      kernel works asynchronous and preemptive

      asynchronous packet handling possible




          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                         Walking down the layers        what's dierent
                                Into kernelspace        interacting with the kernel
                                       That's it!

Living in the kernelspace




      the proc lesystem
      # l s / p r o c / n e t /batman−adv /
      gateways
      interfaces
      log
      log_level
      originators
      orig_interval

      activating batman-adv
      #   echo wlan0  / p r o c / n e t /batman−adv / i n t e r f a c e s

      deactivating batman-adv
      #   echo quot;quot;  / p r o c / n e t /batman−adv / i n t e r f a c e s




              Marek Lindner, Simon Wunderlich           Wireless Kernel Tweaking
Introduction
                         Walking down the layers            what's dierent
                                Into kernelspace            interacting with the kernel
                                       That's it!

Logging merits special attention


      the log level
      #   c a t / p r o c / n e t /batman−adv / l o g _ l e v e l
      [ x ] c r i t i c a l (0)
      [ ] warnings (1)
      [ ] notices (2)
      [ ] batman ( 4 )
      [ ] routes (8)

      setting the log level
      #   echo 3  / p r o c / n e t /batman−adv / l o g _ l e v e l
      #   c a t / p r o c / n e t /batman−adv / l o g _ l e v e l
      [ x ] c r i t i c a l (0)
      [ x ] warnings (1)
      [ x ] notices (2)
      [ ] batman ( 4 )
      [ ] routes (8)

      reading the log
      #   c a t / p r o c / n e t /batman−adv / l o g
      [             6 2 6 ] B . A .T.M. A .N. Advanced 0.1− a l p h a ( c o m p a b i l i t y v e r s i o n 1)
      [             9 7 1 ] Changing l o g _ l e v e l from : 0 to : 3

              Marek Lindner, Simon Wunderlich               Wireless Kernel Tweaking
Introduction
                  Walking down the layers    what's dierent
                         Into kernelspace    interacting with the kernel
                                That's it!

Kernel development




     don't be scared

     the kernel is a big library for all your hacking needs

     debugging techniques:
          clean programming - think before you insmod
          printk - tells you what's up
          kernel oops - gives you the stack trace
          UML - safer debugging
     again: don't panic! :-)




          Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                   Walking down the layers    what's dierent
                          Into kernelspace    interacting with the kernel
                                 That's it!

Battool




      there is no ICMP on Layer 2

      we still want to ping, traceroute etc to debug the network

      implement own ICMP protocol into batman-adv protocol

      battool provides ping, traceroute and raw packet dump

      injects and receives special packets into unix socket
      (userspace) or device (kernelspace)




           Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                    Walking down the layers
                           Into kernelspace
                                  That's it!

Links




        http://open-mesh.net/

        https://dev.open-mesh.net/batman




            Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking
Introduction
                 Walking down the layers
                        Into kernelspace
                               That's it!

Thank you!




         Marek Lindner, Simon Wunderlich    Wireless Kernel Tweaking

Weitere ähnliche Inhalte

Was ist angesagt?

CloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るCloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るsamemoon
 
Iq2415181523
Iq2415181523Iq2415181523
Iq2415181523IJERA Editor
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Journals
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Publishing House
 
Presentation 3
Presentation 3Presentation 3
Presentation 3ManasviPrasad
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano GiordanoGoWireless
 
How Quantum configures Virtual Networks under the Hood?
How Quantum configures Virtual Networks under the Hood?How Quantum configures Virtual Networks under the Hood?
How Quantum configures Virtual Networks under the Hood?Etsuji Nakai
 
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...ijfcstjournal
 
BonFIRE TridentCom presentation
BonFIRE TridentCom presentationBonFIRE TridentCom presentation
BonFIRE TridentCom presentationBonFIRE
 
Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSNvik001ind
 
Networking With Windows Server 2003 Part 2 By Yapa Wijeratne
Networking With Windows Server 2003 Part 2 By Yapa WijeratneNetworking With Windows Server 2003 Part 2 By Yapa Wijeratne
Networking With Windows Server 2003 Part 2 By Yapa WijeratneYapa
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Secure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterSecure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterIDES Editor
 
Pcb carolina scg_2010
Pcb carolina scg_2010Pcb carolina scg_2010
Pcb carolina scg_2010tcoyle72
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksChuka Okoye
 

Was ist angesagt? (18)

OpenStack SDN
OpenStack SDNOpenStack SDN
OpenStack SDN
 
An03 dws
An03 dwsAn03 dws
An03 dws
 
CloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫るCloudStackユーザ会〜仮想ルータの謎に迫る
CloudStackユーザ会〜仮想ルータの謎に迫る
 
Ic0906 wi-uav UAVNet
Ic0906 wi-uav UAVNetIc0906 wi-uav UAVNet
Ic0906 wi-uav UAVNet
 
Iq2415181523
Iq2415181523Iq2415181523
Iq2415181523
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Presentation 3
Presentation 3Presentation 3
Presentation 3
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano Giordano
 
How Quantum configures Virtual Networks under the Hood?
How Quantum configures Virtual Networks under the Hood?How Quantum configures Virtual Networks under the Hood?
How Quantum configures Virtual Networks under the Hood?
 
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...
AN EVALUATION ON SELFISH BEHAVIOUR ATTACK AND JELLYFISH ATTACKS UNDER AODV RO...
 
BonFIRE TridentCom presentation
BonFIRE TridentCom presentationBonFIRE TridentCom presentation
BonFIRE TridentCom presentation
 
Security Support in In-Network Processing & analysis of key management in WSN
Security Support in In-Network  Processing & analysis of key management in  WSNSecurity Support in In-Network  Processing & analysis of key management in  WSN
Security Support in In-Network Processing & analysis of key management in WSN
 
Networking With Windows Server 2003 Part 2 By Yapa Wijeratne
Networking With Windows Server 2003 Part 2 By Yapa WijeratneNetworking With Windows Server 2003 Part 2 By Yapa Wijeratne
Networking With Windows Server 2003 Part 2 By Yapa Wijeratne
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Secure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan RegisterSecure Scan Design Using Redundant Scan Register
Secure Scan Design Using Redundant Scan Register
 
Pcb carolina scg_2010
Pcb carolina scg_2010Pcb carolina scg_2010
Pcb carolina scg_2010
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
 

Ähnlich wie Wireless Hacking Talk

Fairness of the WiMAX System
Fairness of the WiMAX SystemFairness of the WiMAX System
Fairness of the WiMAX SystemGiacomo Verticale
 
Router vs switch
Router vs switchRouter vs switch
Router vs switchIT Tech
 
Important terms in understanding internet programming
Important terms in understanding internet programmingImportant terms in understanding internet programming
Important terms in understanding internet programmingshahajahankhan123
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptAbyThomas54
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PROIDEA
 
Mcse notes
Mcse notesMcse notes
Mcse notesvrammn
 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Prince Mishra
 
Majorppt
MajorpptMajorppt
Majorpptvik001ind
 
Net consultantsch2
Net consultantsch2Net consultantsch2
Net consultantsch2citdel
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtEzxprt
 
L2/L3 fĂźr Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 fĂźr Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackL2/L3 fĂźr Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 fĂźr Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackMaximilan Wilhelm
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
 

Ähnlich wie Wireless Hacking Talk (20)

Fairness of the WiMAX System
Fairness of the WiMAX SystemFairness of the WiMAX System
Fairness of the WiMAX System
 
Router vs switch
Router vs switchRouter vs switch
Router vs switch
 
Important terms in understanding internet programming
Important terms in understanding internet programmingImportant terms in understanding internet programming
Important terms in understanding internet programming
 
WSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.pptWSN-IEEE-Nov2005-v2.ppt
WSN-IEEE-Nov2005-v2.ppt
 
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
PLNOG 17 - Krzysztof Wilczyński - EVPN – zwycięzca w wyścigu standardów budow...
 
VLAN ON PACKET TRACER
VLAN ON PACKET TRACERVLAN ON PACKET TRACER
VLAN ON PACKET TRACER
 
VLAN ON PACKET TRACER
VLAN ON PACKET TRACERVLAN ON PACKET TRACER
VLAN ON PACKET TRACER
 
VLAN on packet Tracer
VLAN on packet TracerVLAN on packet Tracer
VLAN on packet Tracer
 
Mcse notes
Mcse notesMcse notes
Mcse notes
 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
 
Majorppt
MajorpptMajorppt
Majorppt
 
lan overview
lan overviewlan overview
lan overview
 
Mini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANsMini Project- Implementation & Evaluation of Wireless LANs
Mini Project- Implementation & Evaluation of Wireless LANs
 
Telecommunications Concentration
Telecommunications ConcentrationTelecommunications Concentration
Telecommunications Concentration
 
Net consultantsch2
Net consultantsch2Net consultantsch2
Net consultantsch2
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By Ezxprt
 
Ccna (200 125)
Ccna (200 125)Ccna (200 125)
Ccna (200 125)
 
L2/L3 fĂźr Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 fĂźr Fortgeschrittene - Helle und dunkle Magie im Linux-NetzwerkstackL2/L3 fĂźr Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
L2/L3 fĂźr Fortgeschrittene - Helle und dunkle Magie im Linux-Netzwerkstack
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 

Mehr von Mario B.

Lubuntu at FOSSASIA 2011
Lubuntu at FOSSASIA 2011Lubuntu at FOSSASIA 2011
Lubuntu at FOSSASIA 2011Mario B.
 
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...Mario B.
 
OLPC Vietnam - Pilot Project Vung Vieng Fishing Village
OLPC Vietnam - Pilot Project Vung Vieng Fishing VillageOLPC Vietnam - Pilot Project Vung Vieng Fishing Village
OLPC Vietnam - Pilot Project Vung Vieng Fishing VillageMario B.
 
Pockey Lam - Women In It
Pockey Lam - Women In ItPockey Lam - Women In It
Pockey Lam - Women In ItMario B.
 
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For Gnome
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For GnomeRao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For Gnome
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For GnomeMario B.
 
Tran Van Tuan - Gnome Asia Talk 20 11 2009
Tran Van Tuan - Gnome Asia Talk 20 11 2009Tran Van Tuan - Gnome Asia Talk 20 11 2009
Tran Van Tuan - Gnome Asia Talk 20 11 2009Mario B.
 
Ray Wang - Gnome Accessibility And Automation Testing
Ray Wang - Gnome Accessibility And  Automation TestingRay Wang - Gnome Accessibility And  Automation Testing
Ray Wang - Gnome Accessibility And Automation TestingMario B.
 
Louis Suarez Potts - Community Matters Copu2009
Louis Suarez Potts - Community Matters Copu2009Louis Suarez Potts - Community Matters Copu2009
Louis Suarez Potts - Community Matters Copu2009Mario B.
 
Frank Schellenberg - Ghp Far Ease Gnome Asia 2009
Frank Schellenberg - Ghp Far Ease  Gnome Asia 2009Frank Schellenberg - Ghp Far Ease  Gnome Asia 2009
Frank Schellenberg - Ghp Far Ease Gnome Asia 2009Mario B.
 
Huu Le - Tma Open Source For Project Tools
Huu Le - Tma Open Source For Project ToolsHuu Le - Tma Open Source For Project Tools
Huu Le - Tma Open Source For Project ToolsMario B.
 
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In Vietnam
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In VietnamNguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In Vietnam
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In VietnamMario B.
 
Fred Muller - Building Amips Netbook
Fred Muller - Building Amips NetbookFred Muller - Building Amips Netbook
Fred Muller - Building Amips NetbookMario B.
 
Mario Behling - Easier Faster Energy Saving
Mario Behling - Easier Faster Energy SavingMario Behling - Easier Faster Energy Saving
Mario Behling - Easier Faster Energy SavingMario B.
 
GNOME.Asia 2009 Vietnam
GNOME.Asia 2009 VietnamGNOME.Asia 2009 Vietnam
GNOME.Asia 2009 VietnamMario B.
 
DebConf11 Berlin Proposal
DebConf11 Berlin ProposalDebConf11 Berlin Proposal
DebConf11 Berlin ProposalMario B.
 
Debconf 11 in Germany
Debconf 11 in GermanyDebconf 11 in Germany
Debconf 11 in GermanyMario B.
 
LXDE Google Summer of Code 2009
LXDE Google Summer of Code 2009LXDE Google Summer of Code 2009
LXDE Google Summer of Code 2009Mario B.
 
6mesh - IPv6 freifunk mesh networks
6mesh - IPv6 freifunk mesh networks6mesh - IPv6 freifunk mesh networks
6mesh - IPv6 freifunk mesh networksMario B.
 
LXDE Presentation at FOSDEM 2009
LXDE Presentation at FOSDEM 2009LXDE Presentation at FOSDEM 2009
LXDE Presentation at FOSDEM 2009Mario B.
 
LXDE Icos2008 Presentation
LXDE Icos2008 PresentationLXDE Icos2008 Presentation
LXDE Icos2008 PresentationMario B.
 

Mehr von Mario B. (20)

Lubuntu at FOSSASIA 2011
Lubuntu at FOSSASIA 2011Lubuntu at FOSSASIA 2011
Lubuntu at FOSSASIA 2011
 
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...
Creative Commons in Vietnam - Presentation by Mario Behling and Hong Phuc Dan...
 
OLPC Vietnam - Pilot Project Vung Vieng Fishing Village
OLPC Vietnam - Pilot Project Vung Vieng Fishing VillageOLPC Vietnam - Pilot Project Vung Vieng Fishing Village
OLPC Vietnam - Pilot Project Vung Vieng Fishing Village
 
Pockey Lam - Women In It
Pockey Lam - Women In ItPockey Lam - Women In It
Pockey Lam - Women In It
 
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For Gnome
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For GnomeRao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For Gnome
Rao Yeleswarapu - Moblin Overview Apac Roadshow 2009 For Gnome
 
Tran Van Tuan - Gnome Asia Talk 20 11 2009
Tran Van Tuan - Gnome Asia Talk 20 11 2009Tran Van Tuan - Gnome Asia Talk 20 11 2009
Tran Van Tuan - Gnome Asia Talk 20 11 2009
 
Ray Wang - Gnome Accessibility And Automation Testing
Ray Wang - Gnome Accessibility And  Automation TestingRay Wang - Gnome Accessibility And  Automation Testing
Ray Wang - Gnome Accessibility And Automation Testing
 
Louis Suarez Potts - Community Matters Copu2009
Louis Suarez Potts - Community Matters Copu2009Louis Suarez Potts - Community Matters Copu2009
Louis Suarez Potts - Community Matters Copu2009
 
Frank Schellenberg - Ghp Far Ease Gnome Asia 2009
Frank Schellenberg - Ghp Far Ease  Gnome Asia 2009Frank Schellenberg - Ghp Far Ease  Gnome Asia 2009
Frank Schellenberg - Ghp Far Ease Gnome Asia 2009
 
Huu Le - Tma Open Source For Project Tools
Huu Le - Tma Open Source For Project ToolsHuu Le - Tma Open Source For Project Tools
Huu Le - Tma Open Source For Project Tools
 
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In Vietnam
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In VietnamNguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In Vietnam
Nguyen Vu Hung - Gnome Asia 2009 The Vision Of O Oo In Vietnam
 
Fred Muller - Building Amips Netbook
Fred Muller - Building Amips NetbookFred Muller - Building Amips Netbook
Fred Muller - Building Amips Netbook
 
Mario Behling - Easier Faster Energy Saving
Mario Behling - Easier Faster Energy SavingMario Behling - Easier Faster Energy Saving
Mario Behling - Easier Faster Energy Saving
 
GNOME.Asia 2009 Vietnam
GNOME.Asia 2009 VietnamGNOME.Asia 2009 Vietnam
GNOME.Asia 2009 Vietnam
 
DebConf11 Berlin Proposal
DebConf11 Berlin ProposalDebConf11 Berlin Proposal
DebConf11 Berlin Proposal
 
Debconf 11 in Germany
Debconf 11 in GermanyDebconf 11 in Germany
Debconf 11 in Germany
 
LXDE Google Summer of Code 2009
LXDE Google Summer of Code 2009LXDE Google Summer of Code 2009
LXDE Google Summer of Code 2009
 
6mesh - IPv6 freifunk mesh networks
6mesh - IPv6 freifunk mesh networks6mesh - IPv6 freifunk mesh networks
6mesh - IPv6 freifunk mesh networks
 
LXDE Presentation at FOSDEM 2009
LXDE Presentation at FOSDEM 2009LXDE Presentation at FOSDEM 2009
LXDE Presentation at FOSDEM 2009
 
LXDE Icos2008 Presentation
LXDE Icos2008 PresentationLXDE Icos2008 Presentation
LXDE Icos2008 Presentation
 

KĂźrzlich hochgeladen

Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...batoole333
 
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & RequirementsExplore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirementsmarketingkingdomofku
 
Fixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptxFixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptxTintoTom3
 
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai MultipleDubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiplekojalpk89
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsDeepika Singh
 
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call GirlsKurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call GirlsPriya Reddy
 
Thane Call Girls , 07506202331 Kalyan Call Girls
Thane Call Girls , 07506202331 Kalyan Call GirlsThane Call Girls , 07506202331 Kalyan Call Girls
Thane Call Girls , 07506202331 Kalyan Call GirlsPriya Reddy
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumFinTech Belgium
 
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...priyasharma62062
 
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize ThemSignificant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them360factors
 
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...Call Girls Mumbai
 
Bhubaneswar🌹Kalpana Mesuem ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...
Bhubaneswar🌹Kalpana Mesuem  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...Bhubaneswar🌹Kalpana Mesuem  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...
Bhubaneswar🌹Kalpana Mesuem ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...Call Girls Mumbai
 
Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...robinsonayot
 
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X79953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...janibaber266
 
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budgetSareena Khatun
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationAdnet Communications
 
logistics industry development power point ppt.pdf
logistics industry development power point ppt.pdflogistics industry development power point ppt.pdf
logistics industry development power point ppt.pdfSalimullah13
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator OptionsVince Stanzione
 

KĂźrzlich hochgeladen (20)

Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
 
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & RequirementsExplore Dual Citizenship in Africa | Citizenship Benefits & Requirements
Explore Dual Citizenship in Africa | Citizenship Benefits & Requirements
 
Fixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptxFixed exchange rate and flexible exchange rate.pptx
Fixed exchange rate and flexible exchange rate.pptx
 
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai MultipleDubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
Dubai Call Girls Deira O525547819 Dubai Call Girls Bur Dubai Multiple
 
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Mahendragarh Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Premium Call Girls Bangalore Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call GirlsKurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
Kurla Capable Call Girls ,07506202331, Sion Affordable Call Girls
 
Thane Call Girls , 07506202331 Kalyan Call Girls
Thane Call Girls , 07506202331 Kalyan Call GirlsThane Call Girls , 07506202331 Kalyan Call Girls
Thane Call Girls , 07506202331 Kalyan Call Girls
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...
Kopar Khairane Cheapest Call Girls✔✔✔9833754194 Nerul Premium Call Girls-Navi...
 
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize ThemSignificant AI Trends for the Financial Industry in 2024 and How to Utilize Them
Significant AI Trends for the Financial Industry in 2024 and How to Utilize Them
 
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
✂️ 👅 Independent Bhubaneswar Escorts Odisha Call Girls With Room Bhubaneswar ...
 
Bhubaneswar🌹Kalpana Mesuem ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...
Bhubaneswar🌹Kalpana Mesuem  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...Bhubaneswar🌹Kalpana Mesuem  ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...
Bhubaneswar🌹Kalpana Mesuem ❤CALL GIRLS 9777949614 💟 CALL GIRLS IN bhubaneswa...
 
Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...
 
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Yamuna Vihar  (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Yamuna Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
Famous No1 Amil Baba Love marriage Astrologer Specialist Expert In Pakistan a...
 
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Howrah ( 8250092165 ) Cheap rates call girls | Get low budget
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate Presentation
 
logistics industry development power point ppt.pdf
logistics industry development power point ppt.pdflogistics industry development power point ppt.pdf
logistics industry development power point ppt.pdf
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options
 

Wireless Hacking Talk

  • 1. Introduction Walking down the layers Into kernelspace That's it! Wireless Kernel Tweaking or how B.A.T.M.A.N. learned to y Marek Lindner, Simon Wunderlich December 28, 2007 Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 2. Introduction Walking down the layers Into kernelspace That's it! Outline 1 Introduction what is a (dynamic) routing protocol? the B.A.T.M.A.N. approach 2 Walking down the layers layer 3 vs. layer 2 implementation issues bridging 3 Into kernelspace what's dierent interacting with the kernel 4 That's it! Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 3. Introduction Walking down the layers what is a (dynamic) routing protocol? Into kernelspace the B.A.T.M.A.N. approach That's it! Example scenario - 6:00 Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 4. Introduction Walking down the layers what is a (dynamic) routing protocol? Into kernelspace the B.A.T.M.A.N. approach That's it! Example scenario - 23:00 Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 5. Introduction Walking down the layers what is a (dynamic) routing protocol? Into kernelspace the B.A.T.M.A.N. approach That's it! Example scenario (2) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 6. Introduction Walking down the layers what is a (dynamic) routing protocol? Into kernelspace the B.A.T.M.A.N. approach That's it! Introduction to B.A.T.M.A.N. B.A.T.M.A.N. = better approach to mobile adhoc networks only decide next neighbour, not whole route topology is not used or known by nodes routing decisions are distributed by the nodes designed for lossy networks routing protocols internal is out of scope, we just assume it works ;) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 7. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Layer 3 - isn't that enough? B.A.T.M.A.N. alters routing tables kernel manages routing of payload trac this works only for IP, no IPv6, DHCP, IPX ... users have to make sure that everyone has an unique IP routing into/outside other networks is quite complex Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 8. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Let's try layer 2 write userspace proof-of-concept, then go to kernelspace instead of IPs, use MAC-addresses as identiers (should be[TM] unique per design) we provide a virtual switch-port bat0 to the user virtual Ethernet interface (TAP), all other nodes are just one (virtual) hop away IP, IPv6, DHCP, IPX already works on Ethernet, we have nothing to do can be used as bridge over multiple interfaces (e.g. WiFi and Ethernet) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 9. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Usage provide a virtual switch-port bat0 to the user k e r o :/# i f c o n f i g bat0 bat0 L i n k encap : E t h e r n e t HWaddr 0 0 : 1 3 : 3 7 : 9 1 : 4 2 : 3 7 i n e t 6 addr : f e 8 0 : : 2 1 7 : 1 3 f f : f e 3 7 :4237/64 Scope : L i n k UP BROADCAST RUNNING MULTICAST MTU: 1 4 7 2 M e t r i c : 1 RX p a c k e t s : 0 e r r o r s : 0 dropped : 0 o v e r r u n s : 0 frame : 0 TX p a c k e t s : 4 e r r o r s : 0 dropped : 0 o v e r r u n s : 0 c a r r i e r : 0 c o l l i s i o n s :0 txqueuelen :500 RX b y t e s : 0 ( 0 . 0 B) TX b y t e s : 3 2 8 ( 3 2 8 . 0 B) participants set IP adresses (etc.) on their bat0 interface k e r o :/# i f c o n f i g bat0 i n e t 1 9 2 . 1 6 8 . 1 0 . 2 3 k e r o :/# r o u t e add d e f a u l t gw 1 9 2 . 1 6 8 . 1 0 . 2 3 ( o r even b e t t e r : ) k e r o :/# d h c l i e n t bat0 Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 10. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! All the layer 2 belong to us! B.A.T.M.A.N. transports the Ethernet-Frame to the node with the destination MAC it does not care about IP-adresses etc, just as your switch OGMs and payload are encapsulated in our own Ethernet-Frames (Ethertype 0x0842) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 11. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Implementation TAP-interface bat0 receives/sends Ethernet-Frames from the user we decide which neighbour should receive it, based on the B.A.T.M.A.N. algorithm Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 12. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Bridging support B.A.T.M.A.N. collects MACs of participants behind the Bridge These lists are announced via HNA-Messages and ooded to all B.A.T.M.A.N. nodes With this, we have a decentralized MAC Translation Table Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 13. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Visualization Nice side eect: with the HNA information, the whole topology with the nodes behind the APs becomes visible Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 14. Introduction layer 3 vs. layer 2 Walking down the layers implementation issues Into kernelspace bridging That's it! Great - and now? proof-of-concept implementation in the userspace works quite well the problem is: performance! it should also run well on minimal embedded systems (Access Points, Cell Phones) typical path is: select(): wait for a packet read() it nd next hop, update tables etc. (pretty fast) write() it System Calls for read/write take very long time (switch to kernel mode and back, copy overhead) becomes a problem with high bandwidth usage, peak performance of the NICs can't be reached Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 15. Introduction Walking down the layers what's dierent Into kernelspace interacting with the kernel That's it! Put it into kernelspace No useless message copy (recycle kernel buers) no Syscalls and no user/kernel mode switch kernel works asynchronous and preemptive asynchronous packet handling possible Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 16. Introduction Walking down the layers what's dierent Into kernelspace interacting with the kernel That's it! Living in the kernelspace the proc lesystem # l s / p r o c / n e t /batman−adv / gateways interfaces log log_level originators orig_interval activating batman-adv # echo wlan0 / p r o c / n e t /batman−adv / i n t e r f a c e s deactivating batman-adv # echo quot;quot; / p r o c / n e t /batman−adv / i n t e r f a c e s Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 17. Introduction Walking down the layers what's dierent Into kernelspace interacting with the kernel That's it! Logging merits special attention the log level # c a t / p r o c / n e t /batman−adv / l o g _ l e v e l [ x ] c r i t i c a l (0) [ ] warnings (1) [ ] notices (2) [ ] batman ( 4 ) [ ] routes (8) setting the log level # echo 3 / p r o c / n e t /batman−adv / l o g _ l e v e l # c a t / p r o c / n e t /batman−adv / l o g _ l e v e l [ x ] c r i t i c a l (0) [ x ] warnings (1) [ x ] notices (2) [ ] batman ( 4 ) [ ] routes (8) reading the log # c a t / p r o c / n e t /batman−adv / l o g [ 6 2 6 ] B . A .T.M. A .N. Advanced 0.1− a l p h a ( c o m p a b i l i t y v e r s i o n 1) [ 9 7 1 ] Changing l o g _ l e v e l from : 0 to : 3 Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 18. Introduction Walking down the layers what's dierent Into kernelspace interacting with the kernel That's it! Kernel development don't be scared the kernel is a big library for all your hacking needs debugging techniques: clean programming - think before you insmod printk - tells you what's up kernel oops - gives you the stack trace UML - safer debugging again: don't panic! :-) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 19. Introduction Walking down the layers what's dierent Into kernelspace interacting with the kernel That's it! Battool there is no ICMP on Layer 2 we still want to ping, traceroute etc to debug the network implement own ICMP protocol into batman-adv protocol battool provides ping, traceroute and raw packet dump injects and receives special packets into unix socket (userspace) or device (kernelspace) Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 20. Introduction Walking down the layers Into kernelspace That's it! Links http://open-mesh.net/ https://dev.open-mesh.net/batman Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking
  • 21. Introduction Walking down the layers Into kernelspace That's it! Thank you! Marek Lindner, Simon Wunderlich Wireless Kernel Tweaking