Re: Android app whitelist/blacklist feature

2018-07-03 Thread Jason A. Donenfeld
On Tue, Jul 3, 2018 at 8:12 PM Samuel Holland  wrote:
> Right, trying to make it a global setting requires either some sort of
> out-of-band way to pass the information to wg-quick, or rewriting the
> configuration file every time the tunnel is brought up.
>
> Since from netd's point of view, this is a per-network setting anyway, I agree
> it makes sense to configure it per-tunnel. ExemptedApplications works as a
> configuration key, though I prefer ExcludedApplications--the application isn't
> just not required to use the tunnel, it's not allowed to use the tunnel.
>
> In that case, here are my UI suggestions:
> - Add a button in the editor that switches to a fragment or pops up a Dialog
> similar to a MultiSelectListPreference.
> - For consistency, checked means excluded -- everything defaults to unchecked.
> - The package names of excluded apps are put in the
> com.wireguard.config.Interface, and wg-quick handles package name to uid
> translation.
>
> How does that sound?

All of that sounds right-on to me, and I think you're right that
ExcludedApplications is the better key.

(This also provides a good basis for later adding a
"ExcludeLocalNetwork" option.)

 Eric's git access should be all setup now, so we can watch the
commits coming on in.
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Re: Android app whitelist/blacklist feature

2018-07-03 Thread Samuel Holland
On 07/02/18 21:31, Jason A. Donenfeld wrote:
> On Tue, Jul 3, 2018 at 4:27 AM Eric Kuck  wrote:
>> 
>> I was originally thinking the new fragment would be a per-tunnel thing
>> (set when you create the tunnel or edit it), but you’re right - making it
>> a general setting likely makes a whole lot more sense. I can’t think of
>> any use-cases for different tunnels handling different apps.
> 
> It might actually make most sense to make it a per-tunnel thing. We'd then 
> have to introduce conf key called, "ExemptedApplications=" or something. 
> Samuel - any thoughts on this?

Right, trying to make it a global setting requires either some sort of
out-of-band way to pass the information to wg-quick, or rewriting the
configuration file every time the tunnel is brought up.

Since from netd's point of view, this is a per-network setting anyway, I agree
it makes sense to configure it per-tunnel. ExemptedApplications works as a
configuration key, though I prefer ExcludedApplications--the application isn't
just not required to use the tunnel, it's not allowed to use the tunnel.

In that case, here are my UI suggestions:
- Add a button in the editor that switches to a fragment or pops up a Dialog
similar to a MultiSelectListPreference.
- For consistency, checked means excluded -- everything defaults to unchecked.
- The package names of excluded apps are put in the
com.wireguard.config.Interface, and wg-quick handles package name to uid
translation.

How does that sound?

Samuel
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Re: src/crypto/curve25519-x86_64.h:1319: Error: no such instruction while compiling in centos 6

2018-07-03 Thread Lucian Cristian

On 03.07.2018 11:59, Vbook A1 wrote:

WARNING: if you want to use ELrepo kernel - make sure your server does
not have the Matrox G200 series video card! CentOS 6.x with kernel 4.x
will not boot on Matrox GPU.

On Tue, Jun 26, 2018 at 1:10 PM, Lucian Cristian  wrote:

On 26.06.2018 05:57, karthik kumar wrote:

Hi,
   I did see the yum repo already being there RPMs available. But we use only
centos 6 and are desperately looking for alternate of strongswan :(
Is there any other suggestion for me, other than Centos 7 ? Is it worth
trying to rebuild the kernel with 8.1 gcc ? Is there an option like
--without-elliptic-curve that I can use ?

Thanks

On Tue, Jun 26, 2018 at 5:58 AM Jason A. Donenfeld  wrote:

Hello,

Please use CentOS 7.

Jason



___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard

search the mailing list, I proposed a patch for centos 6, see if it's
working, but you have to use elrepo kernels
http://elrepo.org/linux/kernel/el6/x86_64/RPMS/


Regards


___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


I don't remember having trouble on a fujitsu rx300 with

10:05.0 VGA compatible controller: Matrox Electronics Systems Ltd. MGA 
G200e [Pilot] ServerEngines (SEP1) (rev 02)


but I've updated since then

Regards

___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Re: src/crypto/curve25519-x86_64.h:1319: Error: no such instruction while compiling in centos 6

2018-07-03 Thread Vbook A1
WARNING: if you want to use ELrepo kernel - make sure your server does
not have the Matrox G200 series video card! CentOS 6.x with kernel 4.x
will not boot on Matrox GPU.

On Tue, Jun 26, 2018 at 1:10 PM, Lucian Cristian  wrote:
> On 26.06.2018 05:57, karthik kumar wrote:
>
> Hi,
>   I did see the yum repo already being there RPMs available. But we use only
> centos 6 and are desperately looking for alternate of strongswan :(
> Is there any other suggestion for me, other than Centos 7 ? Is it worth
> trying to rebuild the kernel with 8.1 gcc ? Is there an option like
> --without-elliptic-curve that I can use ?
>
> Thanks
>
> On Tue, Jun 26, 2018 at 5:58 AM Jason A. Donenfeld  wrote:
>>
>> Hello,
>>
>> Please use CentOS 7.
>>
>> Jason
>
>
>
> ___
> WireGuard mailing list
> WireGuard@lists.zx2c4.com
> https://lists.zx2c4.com/mailman/listinfo/wireguard
>
> search the mailing list, I proposed a patch for centos 6, see if it's
> working, but you have to use elrepo kernels
> http://elrepo.org/linux/kernel/el6/x86_64/RPMS/
>
>
> Regards
>
>
> ___
> WireGuard mailing list
> WireGuard@lists.zx2c4.com
> https://lists.zx2c4.com/mailman/listinfo/wireguard
>
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


MTU on public wifi

2018-07-03 Thread Brian Candler
I was testing wireguard via a public wifi service (Icomera on-train 
wifi) and found that the tunnel MTU wireguard had chosen was too large: 
TCP connections got stuck as soon as any large amount of data was sent 
(e.g. just running "top")


The MTU of the wifi service itself is 1440:

MacBook-Pro-2:~ $ ping -s1412 -D 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 1412 data bytes
1420 bytes from 8.8.8.8: icmp_seq=0 ttl=58 time=46.006 ms
1420 bytes from 8.8.8.8: icmp_seq=1 ttl=58 time=40.847 ms
^C
--- 8.8.8.8 ping statistics ---
[Interface]
2 packets transmitted, 2 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 40.847/43.427/46.006/2.579 ms
MacBook-Pro-2:~ $ ping -s1414 -D 8.8.8.8
PING 8.8.8.8 (8.8.8.8): 1414 data bytes
556 bytes from 10.101.2.1: frag needed and DF set (MTU 1440)
Vr HL TOS  Len   ID Flg  off TTL Pro  cks  Src Dst
 4  5  00 a205 33b6   0   40  01 e44d 10.101.2.227 8.8.8.8

(Payload 1412 + 20 bytes IP header + 8 bytes ICMP header = 1440)

The client is macOS wireguard-tools/wireguard-go.  Wireguard itself had 
set an MTU on utun1 of 1440.  With some experimentation, I found that 
setting MTU of 1400 was fine, but 1410 was too big.


With "MTU = 1400" in wg0.conf it now appears to work correctly, although 
I'm not sure how safe that value is - does Wireguard compress data 
before encapsulation, and therefore is there a chance that worst-case 
encapsulated packets could still be too big?


But I did try "dd if=/dev/urandom bs=1024 count=100" and it did send the 
whole random splurge without locking up the TCP connection.


I also wonder if wireguard could automatically reduce its MTU in 
response to ICMP "frag needed" packets, at least down to a configured 
minimum?


Regards,

Brian Candler.

___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard