Re: Shouldn't devices tethered to a device using Wireguard share the same IP?

2020-05-21 Thread Jose Marinez
Thank you. I will try it out. Fingers crossed!!!







On Thursday, May 21, 2020, 10:29:12 AM EDT, Harsh Shandilya 
 wrote: 






On May 21 2020, at 7:52 pm, Jose Marinez  wrote:

> Thank you so much Harsh. What's the best way to make my kernel
> available to you? Even if you could allow me to push to the repo I
> wouldn't know where to save it.


The repo is maintained on GitHub so you will have to fork the repository
and create a pull request with your changes, help.github.com has very
beginner friendly documentation if this is your first time around this.

The process for adding a kernel is a bit involved and the documentation
isn't quite fleshed out. You can check the steps out here[1] and an
example of adding a new device to the repository here[2].

1: 
https://github.com/WireGuard/android-wireguard-module-builder#adding-your-phones-kernel
2: https://github.com/WireGuard/android-wireguard-module-builder/pull/3/files




Re: Shouldn't devices tethered to a device using Wireguard share the same IP?

2020-05-21 Thread Jose Marinez
Thank you so much Harsh. What's the best way to make my kernel available to 
you? Even if you could allow me to push to the repo I wouldn't know where to 
save it.

Thank you for this and your work on the apps.






Re: Shouldn't devices tethered to a device using Wireguard share the same IP?

2020-05-20 Thread Jose Marinez
Thanks Mehdi. I'll take a look.

@Harsh,

Thank you for the clarification. I will reach out to both. I know that on macOS 
Catalina, Apple implemented new APIs for loading kernel modules now that the 
core of the OS is read-only. Not sure if they've done the same for iOS. Perhaps 
they'll announce that next month.

> @Harsh - I do have a rooted Android device with Wireguard on I can use
> for tethering. Say I build my kernel module from the list you sent.
> How do I go about integrating it into the Wireguard Android app?

>>>The app will automatically detect the kernel module and work with it,
>>>there's no user-facing work to be done.

Let me see if I understand you correctly. Are you saying that if I take my 
rooted phone make the /kernels folder add the manifest.xml and corresponding 
version kernel, the regular Wireguard app in the Play Store will utilize it? 
I'm trying to make sure I follow.

Will it show this extended UI in Settings?

Thanks again,
Jose







On Wednesday, May 20, 2020, 03:00:18 PM EDT, Mehdi Sadeghi  wrote: 





Hi Marinez and the list,

There is a very nice open source app that can share the VPN connection of a 
rooted device with clients on Android. Here is the link:

https://github.com/Mygod/VPNHotspot/blob/master/README.md

Cheers,
Mehdi

Am 20. Mai 2020 20:40:31 MESZ schrieb Jose Marinez :
>  Thank you all or the responses.Wow. This seems like a big issue for Android 
>and iOS. How many people like me that are tethering, go about convinced their 
>devices are inheriting the VPN connection? Are there channels to communicate 
>with both Google and Apple about this? @Harsh - I do have a rooted Android 
>device with Wireguard on I can use for tethering. Say I build my kernel module 
>from the list you sent. How do I go about integrating it into the Wireguard 
>Android app?Thanks,JoseOn Wednesday, May 20, 2020, 1:53 PM, Harsh Shandilya 
> wrote:> 
>> 
>> On May 20 2020, at 10:57 pm, Jose Marinez  wrote:
>> 
>>>  Hi Guys,
>>>   
>>> Can you tell me if this is working as it should?...
>>>   
>>> I have a phone with Wireguard on. I share the connection via
>>> tethering/hotspot. When I check the IP on the tethered device I don't
>>> see the same IP as my Wireguard endpoint. What I do see is an IP from
>>> the phone's mobile network, the one running Wireguard. 
>>>   
>>> Is this right? Does this mean that traffic from that tethered device
>>> not using the Wireguard connection? I'm confused.
>>>   
>>>   
>>> Thanks,
>>> Jose
>> 
>>>   
>> 
>> At least on Android, tethering data is *not* routed through your VPN. If
>> you want that to happen, you will have to use the WireGuard kernel
>> module which requires a rooted device and a custom kernel. On some
>> supported devices
>> (https://github.com/WireGuard/android-wireguard-module-builder/tree/master/kernels)
>> you can use root access to install the required module automatically
>> through the app, on your stock kernel.
>> 
>> Harsh
>>> 

-- 
Diese Nachricht wurde von meinem Android-Gerät mit K-9 Mail gesendet.


Re: Shouldn't devices tethered to a device using Wireguard share the same IP?

2020-05-20 Thread Jose Marinez
Thank you all or the responses.

Wow. This seems like a big issue for Android and iOS. How many people like me 
that are tethering, go about convinced their devices are inheriting the VPN 
connection? Are there channels to communicate with both Google and Apple about 
this? 

@Harsh - I do have a rooted Android device with Wireguard on I can use for 
tethering. Say I build my kernel module from the list you sent. How do I go 
about integrating it into the Wireguard Android app?

Thanks,
Jose

On Wednesday, May 20, 2020, 1:53 PM, Harsh Shandilya  wrote:
> 
> 
> On May 20 2020, at 10:57 pm, Jose Marinez  wrote:
> 
>> Hi Guys,
>>  
>> Can you tell me if this is working as it should?...
>>  
>> I have a phone with Wireguard on. I share the connection via
>> tethering/hotspot. When I check the IP on the tethered device I don't
>> see the same IP as my Wireguard endpoint. What I do see is an IP from
>> the phone's mobile network, the one running Wireguard. 
>>  
>> Is this right? Does this mean that traffic from that tethered device
>> not using the Wireguard connection? I'm confused.
>>  
>>  
>> Thanks,
>> Jose
> 
>>  
> 
> At least on Android, tethering data is *not* routed through your VPN. If
> you want that to happen, you will have to use the WireGuard kernel
> module which requires a rooted device and a custom kernel. On some
> supported devices
> (https://github.com/WireGuard/android-wireguard-module-builder/tree/master/kernels)
> you can use root access to install the required module automatically
> through the app, on your stock kernel.
> 
> Harsh
>> 


Shouldn't devices tethered to a device using Wireguard share the same IP?

2020-05-20 Thread Jose Marinez
Hi Guys,

Can you tell me if this is working as it should?...

I have a phone with Wireguard on. I share the connection via tethering/hotspot. 
When I check the IP on the tethered device I don't see the same IP as my 
Wireguard endpoint. What I do see is an IP from the phone's mobile network, the 
one running Wireguard. 

Is this right? Does this mean that traffic from that tethered device not using 
the Wireguard connection? I'm confused.


Thanks,
Jose


Re: WireGuard deployment considerations for improved privacy

2019-01-16 Thread Jose Marinez
Hi Fredrik,
I appreciate this proposition as well as your summary for the current state of 
Wireguard for this particular case. I agree with you wholeheartedly that before 
the mass adoption of Wireguard happens these use cases should be addressed 
properly. I'd love to hear what Jason has to say about this and what he 
proposes.
I too have been thinking about all the edge cases for Wireguard. My approach 
has been to look at it from a penetration test perspective. Reality is that 
Wireguard doesn't live in isolation. As a system - hardware, OS and all it's 
settings + Wireguard - connected to the Internet and a user(s) presents many 
hostile dynamics.
Ultimately, whatever solution emerges needs to supplement the goals and 
features of Wireguard, otherwise it deafts the purpose. 
Would it make sense to create a small group to tackle this and other use cases 
- scaling, simplicity, etc? On my end, I'm not a cryptologist, but I can write 
software that would test the security of any system. I'm sure other members of 
this list have a ton of skills and experience to bring to this. 
Here's a list of things I'd like to see and would be willing to 
participate/create if they don't exist yet:
1. A honeypot server with public logs for a small team to gather and record 
real-time traffic as an authorized user of the server - root.2. A test suite 
that goes through all the domain specific scenarios from the results of #1 and 
provides a verification at the end once completed.3. Provide feedback from all 
this back to Jason for enhancements, etc. in upstream Wireguard.
Feel free to reach out off-list.

Thanks,Jose

On Tuesday, January 15, 2019, 9:27 AM, Fredrik Strömberg 
 wrote:

On Tue, Jan 15, 2019 at 1:05 PM Henning Reich  wrote:
>
> Thank for your reply too,
>
> I "use" this list and conversation to get a bit more information about crypto 
> at all (it looks like I need that :-)
>
I see. When I wanted to learn more about network security protocols I
read the RFC for TLS from start to finish a few times. Every time I
didn't understand a word or concept I looked it up on Wikipedia, often
reading the entire article on that concept. In your case maybe read
the WireGuard paper a few times and reference Wikipedia. That's a good
start.

> I try to explain how I understood the problem, and anybdoy can tell me, where 
> I have make a mistake :-)
> From https://www.wireguard.com/protocol/#key-exchange-and-data-packets
> the initiation message and the response use
> initiator.ephemeral_private = DH_GENERATE() and
> responder.ephemeral_private = DH_GENERATE()
>
Correct. Although to be exact DH-Generate returns a keypair (private, public).

> This means (I think), that for every new connection, a new DH-Key is 
> generated. For me (not a programmer) it looks like all other private 
> informations in the messages a encrypted/hashed with values derived from this 
> DH-Key.

Almost. It uses Diffie-Hellman with the ephemeral private key as one component.

In the first message, msg.static is encrypted using a key derived from
DH of the Initiator's ephemeral private key, and the Responder's
static public key (which is already known to Initiator). The first
message also includes the field msg.ephemeral which contains the
Initiator's ephemeral public key, transmitted in the clear.

When the message is received by the Responder, she is able to decrypt
msg.static and learn the Initiator's static public key. You might ask
how that is possible when she doesn't have the Initiator's ephemeral
private key. The reason is that she can derive the correct encryption
key using the Initiator's ephemeral public key, previously transmitted
in the clear, and her (the Responder) static private key.

ECDH ( Initiator's ephemeral private key, Responder's static pubkey )
=
ECDH ( Initiator's ephemeral public key, Responder's static private key )

> Because both site knows the other static key, I would look in the "XX" Row, 
> and there is your quoted destination proberty not exisintg.
>
WireGuard uses Noise_IK, not Noise_XX.

> It's probably possible that I ignore some cryptographic basics or 
> misunderstood same facts. So I hope somebody takes the time and give me some 
> more hints. Thanks
>
No worries. We're all learning something. If you want to learn more
about cryptographic protocols just put in the time. And when you don't
understand something, or suspect that you are wrong, read the whole
thing again. That's what I did :)

Cheers,
Fredrik
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard



___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


ExcludedApplication UI for Wireguard iOS

2019-01-03 Thread Jose Marinez
Hi Jason,
I checked the iOS Todo list and noticed that there's no mention of an iOS 
excluded application list ala Android. Would you mind adding it to the list?

Thanks,Jose___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Re: WireGuard for iOS - TestFlight

2018-11-06 Thread Jose Marinez
Thank you Jason and all those involved. Question for you... not sure how 
familiar you are with iOS kernel internals, but considering Apple's "Interest 
in privacy," what would it take for iOS to have similar kernel changes to 
support Wireguard natively akin to IKEv2, etc? Keep in mind that Darwin - 
iOS/macOS underpinnings are FreeBSD based.


Thanks,Jose
On Monday, November 5, 2018, 9:06 PM, Jose Marinez  wrote:

Thank you Jason and all those involved. Question for you... not sure how 
familiar you are with iOS kernel internals, but considering Apple's "Interest 
in privacy," what would it take for iOS to have similar kernel changes to 
support Wireguard natively akin to IKEv2, etc? Keep in mind that Darwin - 
iOS/macOS underpinnings are FreeBSD based.


Thanks,Jose

On Monday, November 5, 2018, 4:27 PM, Jason A. Donenfeld  
wrote:

Hey folks,

For the last few weeks, Roopesh and I have been hard at work on the
WireGuard for iOS app. Today we're happy to share a
likely-buggy-and-broken TestFlight that you can run on your phone:
<https://testflight.apple.com/join/63I19SDT>. As usual, use at your
own risk, especially since it's alpha quality.

Please let us know about any bugs as you find them -- you can send
them to me or to t...@wireguard.com. Our current TODO list lives here
[1], linked via the main project TODO list [2], and if you're an iOS
person and want to contribute code, we'd be happy to have you on
board.

The app costs $3.99 and requires an email address to sign up; we
manage all your tunnels for you in the cloud. JUST KIDDING! Like the
rest of WireGuard, the iOS app is free and open source [3]. I make
this rather tasteless joke, because of the rather surprising
quantities of people encouraging me to do the iOS stuff as proprietary
paid software, because "apple users will pay" or because "open source
is cool, but iphone folks don't care about it so you can get away with
charging" or because "none of the other vpn players are doing open
source mobile implementations" or even because "apple is more likely
to accept paid software into its app store" and so on and so forth.
But, as usual, I much prefer for this to be a community project than a
closed one, and so like everything else, it's FLOSS.

Enjoy! And do let us know about the bugs as you run into them. I'm
sure there are plenty.

Regards,
Jason

[1] 
https://docs.google.com/document/d/1BnzImOF8CkungFnuRlWhnEpY2OmEHSckat62aZ6LYGY
[2] https://www.wireguard.com/todo/
[3] https://git.zx2c4.com/wireguard-ios/
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard






___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Is it still necessary to run edge for Alpine Linux?

2018-06-27 Thread Jose Marinez
Hi Guys,
I'd like to run Wireguard on Alpine Linux perhaps at Scaleway. From the start 
of Wireguard's support for Alpine, edge repositories and kernel were necessary. 
Is that still the case? 


Thanks,Jose___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Re: Wireguard on android w/o kernel module

2018-06-02 Thread Jose Marinez
Hi Jason,
I'm looking into that specific aspect as we speak. Google at times has 
"peculiar ways" to conceive of how users would interact with Android, maybe 
this is one of them. However, I've seen developers abuse APIs in self interest 
for a number of reasons.
On iOS, once a VPN app is disconnected, it automatically ceases the right to 
"always on."
I'll dig around and get back to you on this.  


Thanks,Jose

On Saturday, June 2, 2018, 5:49 PM, Jason A. Donenfeld  wrote:

On Sat, Jun 2, 2018 at 11:47 PM Jose Marinez  wrote:
> Pardon me, as I just sent a related message without reading this one first. 
> The fact remains, there should be a better way to handle and prevent this.

Care to poke around in the APIs and see if you can come up with
something automatic and useful?

Jason



___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Re: Wireguard on android w/o kernel module

2018-06-02 Thread Jose Marinez
Pardon me, as I just sent a related message without reading this one first. The 
fact remains, there should be a better way to handle and prevent this. Perhaps, 
at a minimum and in the interim, to suggest investigating the installation of 
another VPN client settings right in the error message.


Thanks,Jose

On Friday, June 1, 2018, 12:54 PM, Maximilian Eschenbacher 
 wrote:

Hey Jason,

thanks for the quick response.

On 01/06/2018 18:42:41, Jason A. Donenfeld wrote:
>You can investigate (b) by fishing around in the system VPN settings
>and seeing what's there, possibly removing authorization for those.
>Afterwards, close the application, reopen it, and it should prompt you
>to accept permissions.

This was exactly what had happened.

Best regards

Max
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard



___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Android error, fix and next steps

2018-06-02 Thread Jose Marinez
Hello guys,
I encountered this error while testing on a LG V30 running Oreo.
"Error binging up tunnel: VPN service not authorized by user"
It turned out that due to an existing StrongSwan installation, the Wireguard 
client could not work. The fix involved deleting the StrongSwan client from the 
phone.
Next steps:
I can't imagine the Wireguard client to expect exclusivity as the sole VPN 
client to run on any device. In the case of StrongSwan, it had an "Always On" 
setting which I believe prevented Wireguard from making network changes.
What's the best way to approach this? I don't want to assume this is a 
Wireguard Android client bug. Perhaps on Android only one client can have the 
"always on" setting at once.
Any clarity on this would help, to at a minimum figure out which party to 
approach: Google vs. StrongSwan vs. Wireguard

Thanks,Jose___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Re: Formally Verified Cryptographic Primitive Implementations

2018-01-20 Thread Jose Marinez
Great work. Impressive 


On Friday, January 19, 2018, 8:26 AM, Jason A. Donenfeld  
wrote:

On Fri, Jan 19, 2018 at 9:29 AM, Greg KH  wrote:
> No questions, just a general, "Wow, this is great work!"
>
> It's wonderful to see this happen, thanks so much for pushing this
> forward.

Glad you like it. The real work, of course, will be parlaying this
work into kernel crypto api 2.0...

Jason
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard



___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Android wg binary

2017-07-25 Thread Jose Marinez
On the latest snapshot I noticed there’s a wg-quick port. One needs to build a 
“wg” binary for Android to be able to test. At the moment, there’s no 
instructions to do so from source on the installation section of wireguard.com. 
What’s the best way to build the binary?

Thanks,Jose___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


[Question] - Would it be possible to have the ip commands in ifconfig?

2017-06-26 Thread Jose Marinez
 blockquote, div.yahoo_quoted { margin-left: 0 !important; border-left:1px 
#715FFA solid !important; padding-left:1ex !important; background-color:white 
!important; } Hi Guys,
First, great work on Wireguard!!
I have a linux server configured with wireguard running well with other linux 
computers working. I’d like to extend that to a few macOS computers we have. I 
know the project at the moment is only for Linux, but I saw the distribution 
package and decided to give it a try. For the last 4 days I’ve been jumping 
through hoops trying to get this working. At first, it took so long mainly 
because I was attempting to connect from the latest macOS 10.13 beta - bad 
idea, yes I know. However, when I attempted to do this from the stable version, 
things were much better, but still haven’t been able to connect.  Here’s why:
The package for wireguard on the mac only includes wg, you don’t get wg-quick 
or any other tools. Not a big deal, but it makes a difference specially because 
the quick start instructions use ip-link and other ip related commands. 
Unfortunately, on the mac there’s no official release of ip-link and the 
iproute2mac brew package is only a subset of iproute2 so it doesn’t work. I 
know that ip is the future replacement for ifconfig, but ifconfig is 
practically everywhere there’s a POSIX-like OS. To make matters worse, even the 
“classic” capabilities for setting up routing on linux with netns are not 
available on the mac either.
Forgive my naïveté - I’m a developer, not a network engineer - but if I had the 
ifconfig (perhaps also vconfig) versions of the following quick start commands, 
plus the official wg for the mac, wouldn’t I be able to connect?:
ip link add dev wg0 type wireguard 
ip address add dev wg0 IPRANGEip link set up dev wg0


Last, but not least... I’m very interested in the Rust version of wireguard. I 
read the code and the readme, but I couldn’t tell what the exact capabilities 
and limitations are as a cross-platform userspace implementation. Could one 
redirect all internet traffic through it? Would it work on the mac as it is?
Thanks again,Jose


___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard