Re: The Linux Plumbers Conference videos are up

2018-12-04 Thread Aleksa Sarai
On 2018-12-04, Bruno Wolff III  wrote:
> > Thanks Bruno. I've updated the webpage with these:
> > https://www.wireguard.com/presentations/
> 
> I've never been able to find a link to the presentations starting from the
> main wireguard page. There is probably a link to it someplace as searches
> find the presentations, but it would be nice if there was an easy to find
> link from the main page to make it easier to get to (without a separate
> bookmark).

Interworkings > Presentations is a link to this page.

-- 
Aleksa Sarai
Senior Software Engineer (Containers)
SUSE Linux GmbH



signature.asc
Description: PGP signature
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


sysctl of Alpine standard 3.8.1 doesn't support option -r.

2018-12-04 Thread Du Felix
I use alpine standard 3.8.1, which has kernel 4.14.82-0-vanilla.
When I start wireguard as client peer with *wg-quick up client*, It says:


> [#] ip link add client type wireguard
> [#] wg setconf client /dev/fd/63
> [#] ip address add 10.0.0.4/24 dev client
> [#] ip link set mtu 1420 dev client
> [#] ip link set client up
> [#] resolvconf -a client -m 0 -x
> [#] wg set client fwmark 51820
> [#] ip -4 route add 0.0.0.0/0 dev client table 51820
> [#] ip -4 rule add not fwmark 51820 table 51820
> [#] ip -4 rule add table main suppress_prefixlength 0
> sysctl: unrecognized option: r
> BusyBox v1.29.3 (2018-11-21 11:45:56 UTC) multi-call binary.
>
> Usage: sysctl -p [-enq] [FILE...] / [-enqaw] [KEY[=VALUE]]...
>
> Show/set kernel parameters
>
> -pSet values from FILEs (default /etc/sysctl.conf)
> -eDon't warn about unknown keys
> -nDon't show key names
> -q  Quiet
> -aShow all values
> -wSet values
>

The client peer cannot ping server peer.
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Android traffic not being sent over tunnel when using kernel backend

2018-12-04 Thread BBreeziN
I recently set up a WireGuard tunnel between my Android phone and
Ubuntu Server at home. When using the WireGuard app without root
granted to it, the userspace implementation works as expected. I get
the key icon in the status bar on Android and my traffic is being
routed through the tunnel.
I then rooted my device, installed the ElementalX kernel (with WireGuard
support), and upon granting the WireGuard app root access, it indicates
the kernel module backend is being used. However, now when connecting my
tunnel using the same settings, my traffic is not being routed through
the tunnel. I can see this by visiting a site like whoer.net and which
reveals my carrier WAN IP, not my IP of my home ISP.
The tunnel seems to be active using the kernel module as I can ping the
phone (192.168.2.2) from the server (192.168.2.1). I can also ping
192.168.2.1 from my phone.
Any idea why the web traffic is being routed through the tunnel ONLY
when I use the Go userspace backend? Thanks for the help!
WireGuard for Android v0.0.20181001
Kernel module backend v0.0.2018119

WireGuard Ubuntu Bionic v0.0.20181119

-BBreeziN
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Presentation

2018-12-04 Thread Jean-Denis Girard
Hi list,

I'll be doing a presentation / demo of WireGuard to the members of
CLUSIR Tahiti (https://www.clusir-tahiti.org/) on December 13th. My
presentation will mainly be based on the materials available on the
WireGuard website.

I've been using WireGuard on Linux and Android for some time, but only
in a very basic way: mainly establish peer to peer tunnels. I like WG
because it is easy to setup, light, and secure. My main gripe with WG is
the Android client caching resolved host (as reported on the list
before:
https://lists.zx2c4.com/pipermail/wireguard/2018-October/003508.html).
Also I haven't found a way to log incoming connections on the WG servers.

I would be interested if some people could share advanced usage of
WireGuard, especially setups that would have been difficult to achieve
with other VPN technologies.

You can contact me off list.


Thanks,
-- 
Jean-Denis Girard

SysNux   Systèmes   Linux   en   Polynésie  française
https://www.sysnux.pf/   Tél: +689 40.50.10.40 / GSM: +689 87.797.527



signature.asc
Description: OpenPGP digital signature
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Re: The Linux Plumbers Conference videos are up

2018-12-04 Thread Bruno Wolff III

On Tue, Dec 04, 2018 at 02:03:47 -0600,
 Bruno Wolff III  wrote:


Thanks. That explains why I can't get there, even though there is a 
path. That drop down appears to only work with javascript enabled, 
which I don't normally have enabled.


This might be a gecko bug. When I use lynx I see the dropdown. The code 
doesn't look like it should need javascript to be displayed.

___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Re: The Linux Plumbers Conference videos are up

2018-12-04 Thread Bruno Wolff III

On Tue, Dec 04, 2018 at 18:55:49 +1100,
 Aleksa Sarai  wrote:

On 2018-12-04, Bruno Wolff III  wrote:

> Thanks Bruno. I've updated the webpage with these:
> https://www.wireguard.com/presentations/

I've never been able to find a link to the presentations starting from the
main wireguard page. There is probably a link to it someplace as searches
find the presentations, but it would be nice if there was an easy to find
link from the main page to make it easier to get to (without a separate
bookmark).


Interworkings > Presentations is a link to this page.


Thanks. That explains why I can't get there, even though there is a path. 
That drop down appears to only work with javascript enabled, which I don't 
normally have enabled.

___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard