Development discussion of WireGuard
 help / color / mirror / Atom feed
From: crasm@wireguard.1.email.vczf.io
To: wireguard@lists.zx2c4.com
Subject: Re: potential preshared-key changes
Date: Sun, 23 Apr 2017 15:05:49 -0400	[thread overview]
Message-ID: <1492974349.3561563.953531152.63E71A3E@webmail.messagingengine.com> (raw)
In-Reply-To: <CANTUoefkd_GaS2TPD-T3sAYiGxjdXOy3=YtQ2iEsWeCsj810CA@mail.gmail.com>

On Sun, Apr 23, 2017, at 06:49 AM, Fredrik Str=C3=B6mberg wrote:
> [...]
> Furthermore, consider that the IP addresses of the peers will most
> likely be available to the attacker.
> [...]
> 2. The attacker gains an advantage by knowing S(pub,i) which is not
> gained by already available metadata (such as the IP addresses)

At least in my case, my IP addresses are pretty closely linked to my
identity. I don't change my VPSs as often as I should and I'm fairly
sure my residential IP is the same as it was months ago.

But isn't the public key of the initiator sure proof of identity if the
handshake is completed? An IP address would only be circumstantial and
would require extra information, like a log/account request to the ISP,
before they'd know with certainty.

In the context of a public VPN and per-user PSKs, a user's usage can be
tracked by a global adversary even if they hop networks. And their
location or movement can also be estimated. I believe interface PSKs
could prevent that if every user was trusted (private VPN?), but that
seems impossible for a public service, since someone malicious could
simply sign up for the service to get the PSK.

On Sun, Apr 23, 2017, at 07:13 AM, Fredrik Str=C3=B6mberg wrote:
> Hi! :)

Hello!

> In practice this is equivalent to the discussed change, and "Peer PSK"
> would be the real key, for that peer.

Ah, so that would be an implementation detail for how the keys are
generated.

  reply	other threads:[~2017-04-23 18:57 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-04-22 22:22 Jason A. Donenfeld
2017-04-23  7:05 ` crasm
2017-04-23 11:13   ` Fredrik Strömberg
2017-04-23 19:05     ` crasm [this message]
2017-04-23 10:49 ` Fredrik Strömberg
2017-04-28  9:24 ` Mathias
2017-04-28 10:15   ` Kalin KOZHUHAROV

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1492974349.3561563.953531152.63E71A3E@webmail.messagingengine.com \
    --to=crasm@wireguard.1.email.vczf.io \
    --cc=wireguard@lists.zx2c4.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).