Android app

2018-05-07 Thread ѽ҉ᶬḳ℠
4.9.0-6-amd64 #1 SMP Debian 4.9.88-1 as WG endpoint node WG 0.0.20180420-1 DHCP no Firewall off (both ends, except unknown for the GSM provider in between) wg-quick not utilized Android 8.1.0 (security patch level april 2018) not rooted kernel 4.4.78 wg app 0.4.2 - establishing a connection is t

Re: WG endpoint node exit to inet and DNS resolver

2018-05-07 Thread ѽ҉ᶬḳ℠
There are no "clients inside a WG tunnel", only traffic inside the tunnel :-D Sure, till the point where you got a VPN inet gateway scenario with a wg endpoint node to route other wg peers through to the inet. Most of those VPN apps offering these days split DNS such as clients (routed peers

Re: WG interface to ipv4

2018-05-07 Thread ѽ҉ᶬḳ℠
There is no need for a nob in wireguard to ensure that the wireguard traffic goes through a specific interface or is bound to a specific ip address. All those statements are solely off the WG community and are certainly commendable. However, there is no (regular) external audit of WG, at le

Re: WG endpoint node exit to inet and DNS resolver

2018-05-07 Thread ѽ҉ᶬḳ℠
Had hoped there would a way for the clients to utilize the endpoint node's DNS resolver. There are many ways to do that. You could setup post-up scripts that modify resolv.conf when the wg interface is up. You could run a caching dns server on your lan that talks to your gateway dns

Re: WG interface to ipv4

2018-05-07 Thread Christophe-Marie Duquesne
On Sun, May 6, 2018 at 9:39 PM, ѽ҉ᶬḳ℠ wrote: > With a thread model considering every piece of software being flawed in > mind, and with whatever CVE unearthed being a point in case, it should be > of little surprise that the question of mitigating surface exposure is > raised. Once WG would gain

Re: WG endpoint node exit to inet and DNS resolver

2018-05-07 Thread Kalin KOZHUHAROV
On Mon, May 7, 2018 at 1:21 PM, ѽ҉ᶬḳ℠ wrote: > 4.9.0-6-amd64 #1 SMP Debian 4.9.88-1 as WG endpoint node > WG 0.0.20180420-1 > DHCP no > Firewall off (both server and client) > wg-quick not utilized > > Which DNS resolver is utilized by the clients inside a WG tunnel, the > client's resolver or the

Re: WG endpoint node exit to inet and DNS resolver

2018-05-07 Thread Christophe-Marie Duquesne
Re-adding the ML that I removed from my response by mistake On Mon, May 7, 2018 at 3:12 PM, ѽ҉ᶬḳ℠ wrote: > Thank you for the instant response. > >> >> Wireguard does not mess with the DNS (afaik) so whatever is already >> configured on the client is used. >> > > Had hoped there would a way for t

Re: WG interface to ipv4

2018-05-07 Thread Jordan Glover
On May 7, 2018 11:37 AM, Matthias Urlichs wrote: > On 07.05.2018 10:41, Jordan Glover wrote: > > > Pointing to go and rust implementations which are being > > > > worked on will be much better. > > They still run in userspace. ​And pointing to them will be better example for argumentation. Po

WG endpoint node exit to inet and DNS resolver

2018-05-07 Thread ѽ҉ᶬḳ℠
4.9.0-6-amd64 #1 SMP Debian 4.9.88-1 as WG endpoint node WG 0.0.20180420-1 DHCP no Firewall off (both server and client) wg-quick not utilized Which DNS resolver is utilized by the clients inside a WG tunnel, the client's resolver or the server's? And can this be tweaked in WG? --- Clients ar

Re: WG interface to ipv4

2018-05-07 Thread Matthias Urlichs
On 07.05.2018 10:41, Jordan Glover wrote: > Pointing to go and rust implementations which are being > worked on will be much better. They still run in userspace. That being said, I still don't see any reason for doing something in WG for which (a) there's no threat model, (b) a perfectly adequate

Re: WG interface to ipv4

2018-05-07 Thread Jordan Glover
On May 7, 2018 10:24 AM, ѽ҉ᶬḳ℠ wrote: > > SSH is different for two reasons: It runs over TCP, and it runs in > > > > userspace. > > > > Secondly, because SSH runs in userspace, a lot of the processing (such > > > > as the TCP handshake) is done by the kernel on the application's behalf. > > >

Re: WG interface to ipv4

2018-05-07 Thread ѽ҉ᶬḳ℠
SSH is different for two reasons: It runs over TCP, and it runs in userspace. Secondly, because SSH runs in userspace, a lot of the processing (such as the TCP handshake) is done by the kernel on the application's behalf. So the only way the application has of telling the kernel not to do this,