Re: MacOS app update needed

2022-09-22 Thread Harald Dunkel

I would love to have an update for Wireguard on MacOS and Ios.

Maybe Apple would include wireguard into MacOS' kernel as well,
if there is sufficient demand for this feature? Make yourself
heard at Apple's feedback page for MacOS.


Regards
Harri


Re: Split DNS for macOS

2022-01-28 Thread Harald Dunkel

On 2022-01-28 06:23:29, Stephen Larew wrote:


I would appreciate some feedback from the WireGuard maintainers on next steps. 
Thanks ahead.



Metoo. Testers wanted?


Regards
Harri


Re: Split DNS for macOS

2021-11-03 Thread Harald Dunkel

Hi folks,

I really like this patch. Currently DNS on MacOS is unable to resolve
both my local DNS names and the domain in the office in parallel, if
Wireguard is enabled. I have to use somehost.local to fall back to
zeroconf for my LAN as a workaround, which is pretty annoying.

My suggestion would be to set SupplementalMatchDomains instead(!) of
SearchDomains, using the current config file syntax without '~'. Since
SupplementalMatchDomainsNoSearch is disabled by default, setting
SupplementalMatchDomains is sufficient to configure both lists. See

https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf

This has to be verified, of course.


Regards
Harri



On 2021-10-29 23:07:38, Stephen Larew wrote:

On Oct 29, 2021, at 10:03, Andrew Fried  wrote:


On Oct 29, 2021, at 08:33, Stephen Larew  wrote:


On Oct 28, 2021, at 02:58, Bruce Ferrell  wrote:

On 10/28/21 12:16 AM, Stephen Larew wrote:

For many months now, I have been running a patched WireGuard macOS app
that enables a split DNS configuration. I would like to try to upstream
my patches for split DNS.

There has been some interest in this patch:
- "Mac APP DNS Search Domain" thread from July and August 2021 [1]
- A commenter on my GitHub fork of wireguard-apple.

What is split DNS? It allows sending DNS queries to a specific server
based on the domain name. Systemd-resolved calls it a routing domain.
Apple's Network Extension framework calls it a match domain.  Split DNS
is especially useful for internal DNS servers.

For example, if corp.example.com is a routing domain for the DNS server
at 192.0.2.1 (only accessible over WireGuard), then
server.corp.example.com is resolved using 192.0.2.1 while
www.example.com is resolved using some other DNS resolver (depending on
the other network settings in macOS).

The proposed patch adds new syntax to the wg-quick DNS= line.
Specifically, a tilde prefixed domain is treated as a routing domain.
Multiple routing domains can be added.

Limitations:
- Needs modifications to iOS UI to work on iOS.
- Only matching routing domains are sent to the DNS servers specified in
  the DNS= config line.  No separate fallback catch-all DNS server can
  be set.
- Routing/match domains are also included in the list of search domains.
  This could be changed with the matchDomainsNoSearch API, but lacking
  more UI or config file changes to expose this option to the user, I
  went with the default.

[1] 
https://lore.kernel.org/wireguard/20210810074232.aah5ktq5yzysaaey@SvensMacBookAir-2.local/T/
[2] 
https://github.com/slarew/wireguard-apple/commit/6ebc356d9e11ab91443e06de5e89f1af57fcdff8


That seems to be a redefinition of the existing definition of split DNS.

Most usually, split DNS is done at the DNS server and different zones are 
served to the resolver based on various criteria... Usually the origination IP 
of the query;  If the query comes from a client on your LAN, or a particular 
subnet, the contents of a particular, private, zone are returned.  If the query 
comes from, say the internet,  a public zone is returned.

YOUR description, is how DNS works in general... Except  your patch also seems 
to either bypass the resolver libraries or wedge itself in front of them The 
system resolver libraries well tested and understood and they handle the 
following very nicely.

There is the issue of what happens with large DNS responses.  Any DNS response 
over 512 bytes UDP fails and is required to be retried as a TCP query, which 
can handle the large response.  It's late and I'm too tired to look it up, but 
there IS an RFC for this.

It's a little known issue, but I've seen it when working with other VPN 
products that ignored/didn't understand the behavior. The results weren't 
pretty and really embarrassing.

Systemd has a bad habit of re-inventing the wheel... Badly. Eventually it get's sorted, 
but is that really progress? In the long haul, "move fast and break things" is 
a MAJOR pita for the vast majority of us.  But some like it.

For some real fun, look into DHCPCD.  It faithfully implements a particular 
RFC.  In some networking environments using VPNs, it breaks routing 
horribly But it meets the RFC.  You'll find it in Raspbian by default, and 
most other Debian derived distros.  I automatically rip it out and replace it 
with the also available ISC DHCP client.  That one is fully compatible with 
Windows, OS X, iOS, and every android and smart device I could test it with.  A 
DHCP server configured to be compatible with DHCPCD broke all of the previously 
named.

I'm giving this opinion away for free, so it's worth what you paid for it.


Regardless of naming or definitions, I think the ability for a *local device* 
to route DNS queries to different DNS servers based on domain matching criteria 
is certainly useful. It’s not always possible or desirable to control and 
configure an upstream DNS server. Hence, this patch enables the local device to 
do split DNS.

To be clea

running wireguard company-wide?

2021-06-16 Thread Harald Dunkel
Hi folks,

how can I bind the private key to a specific host, eg. an office
Macbook? Esp on MacOS the private key is in plain sight in the
wireguard GUI, making it easy to reuse it for other, unintended
purposes.

For private installations this might be OK, but for a company-wide
deployment this is a major headache.

Every helpful hint is highly appreciated
Harri


QR code is very useful, if its available

2021-02-07 Thread Harald Dunkel

Hi folks,

2 remarks about the very useful QR code feature:

* Too bad its missing on some platforms. All these road warrior
   laptops (Mac or Intel) do have a camera.
* Maybe it would be possible to support password protected QR
   codes? Not sure if such a thing exists at all.


Regards
Harri



mtu on Linux vs MacOS

2021-01-21 Thread Harald Dunkel

Hi folks,

I am using PPPoE to connect to my IP provider. To use wireguard on Linux I
have to reduce the MTU in wg0.conf to 1400. Using the default 1420 a ssh
connection tunneled through wireguard gets stuck (reproducible). An echo
of a very long line (e.g. 4096 chars) is sufficient.

The weird part is, MTU 1420 works fine for wireguard on MacOS. How comes
that Wireguard appears to be more stable on MacOS than on Linux?

Peer is OpenBSD 6.8.


Regards
Harri