Hi Diab,
Thank you for the detailed explanation.
My suggestion to add a new registry key seemed easy, but I understand a
limited number of options is important.
From your alternatives :
1) Probably the easiest to implement. It's not my favorite, but it would
be better no doubt.
2) I used Network Configuration Operators for everyone because no other
option was available. It's not great as you said, but users need to
start and stop the VPN sometimes. I can't remove all rights.
3) Do you suggest a "read only" interface ? I looks like the opposite of
what I need, the less users see the better.
4) It seems pretty complicate for a small improvement. Like you I'm not
fan, but why not if Jason like it. It can but combined with the first
option.
5) I like this option, but I supposed it wasn't possible. If it is, a
group that can only access to the list of tunnels and start or stop them
is a good solution for my environment. Removing Network Configuration
Operators rights would be an improvement.
To summarize, the option 5 is what I'm looking for from the beginning.
But if it's to complicate (or impossible) to do, the first one looks
like a good start.
Rewording can be done easily and quickly (before a better solution is
chosen, if possible). In that case, I indicate that I mainly use the
french localization (it explains my poor english language level). Maybe
the french version seems more aggressive that the english one? I don't
know who leads this language translation, but I suggest him (or her) to
change the Windows title "Obsolète" (out of date) to something softer,
or nothing in the title just the update tab.
Thank for your time too,
Bruno ANDRY
Le 25/11/2021 à 15:23, [email protected] a écrit :
Dear Bruno,
Whilst I understand the frustration that having hundreds of users can
cause, I don't believe simply reverting the change [as proposed by
Jason] is the correct solution. I've come up with a few alternative
solutions, but before I present them I'd just like to give a brief
introduction into why I requested that change in the first place.
WireGuard on Windows exclusively provides a GUI to users of the
Administrators group, as well as a limited GUI to users of the Network
Configuration Operators group when the `LimitedOperatorUI` DWORD is
set. The latter is helpful for users who wish to separate their
personal and administrator accounts (to protect themselves against the
plethora of UAC exploits, amongst other security issues) where
otherwise the user would have to switch accounts to switch tunnels.
However, the GUI shown to Network Configuration Operators lacked any
information about updates. This lead to users in such setups to not be
informed about any updates unless they switched out to the
Administrator account and or kept an eye on the releases online. This
is quite a problem as users could be running ancient versions of
WireGuard for relatively long periods of time without the knowledge
that they are doing so (some users may even assume WireGuard
automatically updates). As such, I asked Jason if he could add the
ability for non-admins to at least be informed of an update which lead
to where we are today.
After speaking to Jason "off the mailing list", he stated he wouldn't
like to add any more configuration options (via the Registry or within
the GUI) nor any metadata to updates so bearing that in mind I came up
with a few alternatives:
1) Rewording the update prompt for non-admins to appear less
"aggressive". Currently, the prompt is "Please ask the system
administrator to update." but this could be changed to something along
the lines of "There is an update available. The system administrator
will update when necessary." which should reduce most, if not all,
users from contacting you unnecessarily. I can throw up a patch for
this if Jason agrees.
2) Avoiding users seeing the UI at all, where unnecessary. If your
users do not need *control* of the WireGuard configuration, then
avoiding showing them the UI altogether could be an option. I don't
know your system as well as you do, of course, so I can't assure that
this solution is valid. However, having hundreds of users as Network
Configuration Operators sounds a little "worrying" to me.
3) Showing an even more limited UI for unprivileged users. If the
users still need some form of UI, then an even more limited UI could
be presented to users not part of the Administrators nor the Network
Configuration Operators groups. This would lack any form of control,
and could still be under the same `LimitedOperatorUI` Registry DWORD,
or not if is deemed "safe enough for the masses". If it is, you could
say the semantics refer to "Limited [User or Network] Operator UI".
4) Updates could be hidden from the UI for N days after an update or N
updates (preferably two in this case, so that it doesn't pile up) for
Network Configuration Operators. This provides you [and any other
sysadmins] with a "buffer zone" to apply the updates before users
contact you about them. This could also be teamed up with 1) to
further reduce the likelihood of users contacting you. I'm not a large
fan of this "solution", however, since WireGuard for Windows lacks any
metadata to differentiate important and optional updates which can
lead to a security patch or critical bug-fix being ignored for some time.
5) Creating a separate group which are able to switch tunnels. For
users who just need the GUI to switch tunnels, having a group specific
to such behavior named something along the lines of "WireGuard
Operators" could be helpful.
Hopefully at least one of these suffices for you so that we can meet a
mid-point of sorts that matches both your criteria as well as my own.
Thank for your time,
Diab Neiroukh
PS: Whilst it may seem a pain, I believe that a balance should be
achieved between the sysadmins and users where if the former forgets
to apply an update "for too long" then the users contact them as a
reminder. After all, we're all humans and we do forget sometimes. The
solutions 1) - with a prompt such as "There is an update available.
The system administrator should update soon." - and 4) match up to
this quite nicely.
On 2021-11-24 15:42, Jason A. Donenfeld wrote:
I agree the situation is a bit ridiculous. I'll revert the change that
added this:
https://git.zx2c4.com/wireguard-windows/commit/?id=82129ba288f7561c89bb80e04841ffb46bc29889
I'm CCing Diab, who originally requested the change, in case he wants
to argue with you about it. But in the absence of that, I'll revert.
!DSPAM:5,619f9c6d262291485912835!