Development discussion of WireGuard
 help / color / mirror / Atom feed
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
To: "WireGuard mailing list" <wireguard@lists.zx2c4.com>
Subject: [ANNOUNCE] wireguard-tools v1.0.20200510 released
Date: Sun, 10 May 2020 22:28:25 -0600	[thread overview]
Message-ID: <5f287badbb95231b@mail.zx2c4.com> (raw)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hello,

A new version, v1.0.20200510, of wireguard-tools has been tagged in the git
repository, containing various required userspace utilities, such as the
wg(8) and wg-quick(8) commands and documentation.

== Changes ==

  * ipc: add support for openbsd kernel implementation
  * ipc: cleanup openbsd support
  * wg-quick: add support for openbsd kernel implementation
  * wg-quick: cleanup openbsd support
  
  Very exciting! wg(8) and wg-quick(8) now support the kernel implementation for
  OpenBSD. OpenBSD is the second kernel, after Linux, to receive full fledged
  and supported WireGuard kernel support. We'll probably send our patch set up
  to the list during this next week. `ifconfig wg0 create` to make an interface,
  and `wg ...` like usual to configure WireGuard aspects of it, like usual.
  
  * wg-quick: support dns search domains
  
  If DNS= has a non-IP in it, it is now treated as a search domain in
  resolv.conf.  This new feature will be rolling out across our various GUI
  clients in the next week or so.
  
  * Makefile: simplify silent cleaning
  * ipc: remove extra space
  * git: add gitattributes so tarball doesn't have gitignore files
  * terminal: specialize color_mode to stdout only
  
  Small cleanups.
  
  * highlighter: insist on 256-bit keys, not 257-bit or 258-bit
  
  The highlighter's key checker is now stricter with base64 validation.
  
  * wg-quick: android: support application whitelist
  
  Android users can now have an application whitelist instead of application
  blacklist.
  
  * systemd: add wg-quick.target
  
  This enables all wg-quick@.services to be restarted or managed as a unit via
  wg-quick.target.

This release contains commits from: Jason A. Donenfeld, Matt Dunwoodie, and 
Martin Hauke.

As always, the source is available at https://git.zx2c4.com/wireguard-tools/ and
information about the project is available at https://www.wireguard.com/ .

This release is available in compressed tarball form here:
  https://git.zx2c4.com/wireguard-tools/snapshot/wireguard-tools-1.0.20200510.tar.xz
  SHA2-256: cd526c7ea177e59ae4c0ebc4f3cc360b8524881b090d043426bdf7e3c85ac8e7

A PGP signature of that file decompressed is available here:
  https://git.zx2c4.com/wireguard-tools/snapshot/wireguard-tools-1.0.20200510.tar.asc
  Signing key: AB9942E6D4A4CFC3412620A749FC7012A5DE03AE
  Remember to unxz the tarball before verifying the signature.

If you're a package maintainer, please bump your package version. If you're a
user, the WireGuard team welcomes any and all feedback on this latest version.

Finally, WireGuard development thrives on donations. By popular demand, we
have a webpage for this: https://www.wireguard.com/donations/

Thank you,
Jason Donenfeld


-----BEGIN PGP SIGNATURE-----
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=gwNR
-----END PGP SIGNATURE-----

                 reply	other threads:[~2020-05-11  4:28 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5f287badbb95231b@mail.zx2c4.com \
    --to=jason@zx2c4.com \
    --cc=wireguard@lists.zx2c4.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).