Hey Chris, Glad to hear you're playing with Wintun. Indeed we're keeping it locked down to SYSTEM for the time being. As we gain a better understanding of the attack surface, maybe we'll reduce that to built-in administrators. But you can pretty easily impersonate SYSTEM if you have enough admin privs. Here's some code I wrote to do it from Go: https://github.com/WireGuard/wgctrl-go/issues/36#issuecomment-491912143 Just replace the "DialPipe" invocation with "os.Open(path/to/wintun)". Or if you want to do it from C, here's something similar: https://git.zx2c4.com/WireGuard/tree/src/tools/wincompat/ipc.c
Jason _______________________________________________ WireGuard mailing list [email protected] https://lists.zx2c4.com/mailman/listinfo/wireguard
