Am 18.08.19 um 19:09 schrieb Reto:
For starters, storing stuff on a hard disc is certainly not "quite insecure".
Are you aware that you can encrypt discs / partions / files?

Anyone with access to the running machine or malicious software can read the keys on hard-disk.

How do you de-crypt the encrypted disk on a headless machine which has to reboot autonomously on error conditions?

Wireguard also allows you to set the private key on the fly, so you can feed it
for example secrets stored in pass (gpg encrypted), which you *can* decrypt with
a yubikey already.

Are you speaking specifically about wg-quick?
In that case the manpage already shows you how to feed wg encrypted secrets

Or, perhaps it is desirable to store private keys in encrypted form, such as  
through
use of pass(1):
        PostUp = wg set %i private-key <(pass WireGuard/private-keys/%i

The point of security-tokens is you never get access to the private key.

Instead you pass the stream-cipher encrypted with the public key to the security token

to be de-crypted by the security token.

Regards,

Renne

_______________________________________________
WireGuard mailing list
[email protected]
https://lists.zx2c4.com/mailman/listinfo/wireguard

Reply via email to