From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: hcarrega@gmail.com Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 91545e92 for ; Mon, 5 Mar 2018 08:17:15 +0000 (UTC) Received: from mail-wm0-f44.google.com (mail-wm0-f44.google.com [74.125.82.44]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 7d1213ef for ; Mon, 5 Mar 2018 08:17:15 +0000 (UTC) Received: by mail-wm0-f44.google.com with SMTP id i3so13645767wmi.4 for ; Mon, 05 Mar 2018 00:26:28 -0800 (PST) Return-Path: Received: from [94.133.122.53] (a94-133-122-53.cpe.netcabo.pt. [94.133.122.53]) by smtp.gmail.com with ESMTPSA id i11sm10069659wre.36.2018.03.05.00.26.24 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 05 Mar 2018 00:26:24 -0800 (PST) From: Henrique Carrega Content-Type: multipart/alternative; boundary=Apple-Mail-9E5386EF-09E8-4B19-881F-2A56F90F2D31 Mime-Version: 1.0 (1.0) Date: Mon, 5 Mar 2018 08:26:23 +0000 Subject: Tunsafe Windows client for wireguard (not opensource yet they say Message-Id: <41222FCF-F9F5-4FEC-AA71-73C48F4DA4BA@gmail.com> To: wireguard@lists.zx2c4.com List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , --Apple-Mail-9E5386EF-09E8-4B19-881F-2A56F90F2D31 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable https://tunsafe.com/ https://reddit.com/r/VPN/comments/82183o/tunsafe_a_high_performance_wireguar= d_vpn_client/ Sent from my iPhone= --Apple-Mail-9E5386EF-09E8-4B19-881F-2A56F90F2D31 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: 7bit https://tunsafe.com/ --Apple-Mail-9E5386EF-09E8-4B19-881F-2A56F90F2D31-- From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Jason@zx2c4.com Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id acce0657 for ; Mon, 5 Mar 2018 09:10:23 +0000 (UTC) Received: from frisell.zx2c4.com (frisell.zx2c4.com [192.95.5.64]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 4af9ca4a for ; Mon, 5 Mar 2018 09:10:23 +0000 (UTC) Received: by frisell.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 60ea981c for ; Mon, 5 Mar 2018 09:01:32 +0000 (UTC) Received: by frisell.zx2c4.com (ZX2C4 Mail Server) with ESMTPSA id b9ecc159 (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128:NO) for ; Mon, 5 Mar 2018 09:01:32 +0000 (UTC) Received: by mail-oi0-f49.google.com with SMTP id c83so11516436oib.1 for ; Mon, 05 Mar 2018 01:19:36 -0800 (PST) MIME-Version: 1.0 In-Reply-To: <41222FCF-F9F5-4FEC-AA71-73C48F4DA4BA@gmail.com> References: <41222FCF-F9F5-4FEC-AA71-73C48F4DA4BA@gmail.com> From: "Jason A. Donenfeld" Date: Mon, 5 Mar 2018 10:19:35 +0100 Message-ID: Subject: Re: Tunsafe Windows client for wireguard (not opensource yet they say To: Henrique Carrega Content-Type: text/plain; charset="UTF-8" Cc: WireGuard mailing list List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Hi Henrique, Thanks for posting this. Please stay away from this software, and generally be wary of closed-source WireGuard implementations trying to fill the void. This one was written by a community-unfriendly proprietary author, and we've got little way of ensuring protocol compliance or basic security. Especially from my discussions from him, it's clear what he's up to, and this seems like some nastiness. Should I spend my time reverse engineering this software and discovering zero-days? Probably not a good use of my time, despite my usual love of this sort of thing. One aspect of the WireGuard project is that we're taking development very carefully and slowly, not jumping to premature releases, and really studying every bit of what we produce in order to ship the least-vulnerable and most-correct code we possibly can. We're still shipping code -- it's not an approach that results in a complete standstill -- but it does mean that in these intervening periods, there will be propheteers and cowboys coming out of the woodwork to fill the void. It's quite easy to make a tiny tunneling protocol that's reasonably fast and does a few things; if you look on Github there are hundreds. It's quite another thing to write robust and secure software intend to last for a long time. That's what we're working on here. Fortunately we have two very nice projects that are rapidly approaching maturity: one in Go and one in Rust. I fully welcome future OSS authors into the project. When I'm back from visiting family at the beginning of April, I think we'll be in a good place to have a few first releases. I'll also do what I can to see that people aren't peddling junk and calling it wireguard, so as to reduce user confusion, but this of course isn't a very easy endeavor. I'm open to suggestions on how to approach this. Regards, Jason From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: hcarrega@gmail.com Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id bbff136f for ; Mon, 5 Mar 2018 11:02:11 +0000 (UTC) Received: from mail-wm0-f49.google.com (mail-wm0-f49.google.com [74.125.82.49]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 479a1608 for ; Mon, 5 Mar 2018 11:02:11 +0000 (UTC) Received: by mail-wm0-f49.google.com with SMTP id t74so15040600wme.3 for ; Mon, 05 Mar 2018 03:11:25 -0800 (PST) Return-Path: Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (1.0) Subject: Re: Tunsafe Windows client for wireguard (not opensource yet they say From: Henrique Carrega In-Reply-To: Date: Mon, 5 Mar 2018 11:11:22 +0000 Message-Id: <5070B418-FD3D-4DF5-9D12-4EB3868927AA@gmail.com> References: <41222FCF-F9F5-4FEC-AA71-73C48F4DA4BA@gmail.com> To: "Jason A. Donenfeld" Cc: WireGuard mailing list List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Just post to alert you:) don=E2=80=99t want to install:) Sent from my iPhone > On 5 Mar 2018, at 09:19, Jason A. Donenfeld wrote: >=20 > Hi Henrique, >=20 > Thanks for posting this. >=20 > Please stay away from this software, and generally be wary of > closed-source WireGuard implementations trying to fill the void. This > one was written by a community-unfriendly proprietary author, and > we've got little way of ensuring protocol compliance or basic > security. Especially from my discussions from him, it's clear what > he's up to, and this seems like some nastiness. Should I spend my time > reverse engineering this software and discovering zero-days? Probably > not a good use of my time, despite my usual love of this sort of > thing. >=20 > One aspect of the WireGuard project is that we're taking development > very carefully and slowly, not jumping to premature releases, and > really studying every bit of what we produce in order to ship the > least-vulnerable and most-correct code we possibly can. We're still > shipping code -- it's not an approach that results in a complete > standstill -- but it does mean that in these intervening periods, > there will be propheteers and cowboys coming out of the woodwork to > fill the void. >=20 > It's quite easy to make a tiny tunneling protocol that's reasonably > fast and does a few things; if you look on Github there are hundreds. > It's quite another thing to write robust and secure software intend to > last for a long time. That's what we're working on here. >=20 > Fortunately we have two very nice projects that are rapidly > approaching maturity: one in Go and one in Rust. I fully welcome > future OSS authors into the project. When I'm back from visiting > family at the beginning of April, I think we'll be in a good place to > have a few first releases. >=20 > I'll also do what I can to see that people aren't peddling junk and > calling it wireguard, so as to reduce user confusion, but this of > course isn't a very easy endeavor. I'm open to suggestions on how to > approach this. >=20 > Regards, > Jason From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: BATV+5fe850e08560218f2c67+5307+infradead.org+dwmw2@twosheds.srs.infradead.org Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 7e1c30a5 for ; Mon, 5 Mar 2018 11:10:13 +0000 (UTC) Received: from twosheds.infradead.org (twosheds.infradead.org [90.155.92.209]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 0cf632d6 for ; Mon, 5 Mar 2018 11:10:13 +0000 (UTC) Message-ID: <1520248764.27019.10.camel@infradead.org> Subject: Re: Tunsafe Windows client for wireguard (not opensource yet they say From: David Woodhouse To: "Jason A. Donenfeld" , Henrique Carrega In-Reply-To: References: <41222FCF-F9F5-4FEC-AA71-73C48F4DA4BA@gmail.com> Content-Type: multipart/signed; micalg="sha-256"; protocol="application/x-pkcs7-signature"; boundary="=-anbi35sTfcR2F+GY9Sju" Date: Mon, 05 Mar 2018 12:19:24 +0100 Mime-Version: 1.0 Cc: WireGuard mailing list List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , --=-anbi35sTfcR2F+GY9Sju Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Mon, 2018-03-05 at 10:19 +0100, Jason A. Donenfeld wrote: > One aspect of the WireGuard project is that we're taking development > very carefully and slowly, not jumping to premature releases, and > really studying every bit of what we produce in order to ship the > least-vulnerable and most-correct code we possibly can. We're still > shipping code -- it's not an approach that results in a complete > standstill -- but it does mean that in these intervening periods, > there will be propheteers and cowboys coming out of the woodwork to > fill the void. I wasn't sure whether to suggest this before, but adding Wireguard support to OpenConnect ought to be fairly easy. We already support three VPN protocols, so we have a *relatively* sane distinction between the protocol-specific parts, and all the OS-specific tun device handling and other bits that would just be gratuitous wheel-reinvention=20 for you. It basically gives you support for Windows, Solaris, OSX, Android and various BSDs for nothing. With NetworkManager support. For a client that *isn't* purely wrapping the kernel implementation, it probably makes sense rather starting from scratch. If anyone's interested in working on it, I'd be happy to give some pointers. (I've also looked in the past at adding kernel support too, for DTLS acceleration; I may take a look at that again.) --=-anbi35sTfcR2F+GY9Sju Content-Type: application/x-pkcs7-signature; name="smime.p7s" Content-Disposition: attachment; filename="smime.p7s" Content-Transfer-Encoding: base64 MIAGCSqGSIb3DQEHAqCAMIACAQExDzANBglghkgBZQMEAgEFADCABgkqhkiG9w0BBwEAAKCCEFQw ggUxMIIEGaADAgECAhBNRhEyk/HZ7naOeTHWrzuAMA0GCSqGSIb3DQEBCwUAMIGXMQswCQYDVQQG EwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYD VQQKExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0Q09NT0RPIFJTQSBDbGllbnQgQXV0aGVu dGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTAeFw0xNzEyMjEwMDAwMDBaFw0xODEyMjEyMzU5 NTlaMCQxIjAgBgkqhkiG9w0BCQEWE2R3bXcyQGluZnJhZGVhZC5vcmcwggEiMA0GCSqGSIb3DQEB AQUAA4IBDwAwggEKAoIBAQDgzLNWa18DNpGUj/ZeH0Sgz53ESIbzdPw3OJeuNP6jZhxZojbyfxbM hETscxI/Hj6UZ4a7sHm5BkVjlsB1Af2Za/PXUt8MmLAcPMHkMPGunvkUibEvblDvpqMkQZlaZM+t 5PqFmWkbehLaEvbpNY7dmEAAeKh4klTzJzrr5AAzaCQ32cA2e3+DEIv5O5l9ViMIjy/JM+xMQrfX 3PZ0chY1PaVWjg59d4Uno+5LRDbgCnPkKJX4ysBGadibjBGQGJEZCjh94iiEebn2KsRLvtrJ72Ph 3W2HDEdngW3YP0wujFQVs81U7L8XN3kdPRsa9zNqGtYQP/+1KMMJQ57hnfi9AgMBAAGjggHpMIIB 5TAfBgNVHSMEGDAWgBSCr2yM+MX+lmF86B89K3FIXsSLwDAdBgNVHQ4EFgQUpL+/5lli9jmj2KHj ryyhnB2xRt0wDgYDVR0PAQH/BAQDAgWgMAwGA1UdEwEB/wQCMAAwIAYDVR0lBBkwFwYIKwYBBQUH AwQGCysGAQQBsjEBAwUCMBEGCWCGSAGG+EIBAQQEAwIFIDBGBgNVHSAEPzA9MDsGDCsGAQQBsjEB AgEBATArMCkGCCsGAQUFBwIBFh1odHRwczovL3NlY3VyZS5jb21vZG8ubmV0L0NQUzBaBgNVHR8E UzBRME+gTaBLhklodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDbGllbnRBdXRoZW50 aWNhdGlvbmFuZFNlY3VyZUVtYWlsQ0EuY3JsMIGLBggrBgEFBQcBAQR/MH0wVQYIKwYBBQUHMAKG SWh0dHA6Ly9jcnQuY29tb2RvY2EuY29tL0NPTU9ET1JTQUNsaWVudEF1dGhlbnRpY2F0aW9uYW5k U2VjdXJlRW1haWxDQS5jcnQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmNvbW9kb2NhLmNvbTAe BgNVHREEFzAVgRNkd213MkBpbmZyYWRlYWQub3JnMA0GCSqGSIb3DQEBCwUAA4IBAQCK28BdbVJ9 QKQqTDfXwogAYiRBEGptfE1Bjy4F5vC6eWJqOJ15vunxjLwdbZYb4L0qrJlh+ZHHHlbIK8uEZu7N XHUntmWMbGbZiu7JgrbSXJK1ct9gxrN/sdWYJ+JDjVHg7GfDTvTTPa26JMRqJsO1TjjyDX7A3K39 TjV8C0hqXvwF9BsNf+qBeWO6GVzJ5572awY221hc1umibmZaKV4fg+7fS7qscx5TSuIc6uvMBQhm 7NQiCq6euMMWBDUDlotQCDW0ilm0OuLW3IVLuZCm6Msc+6hT9+dCT4JUvxTHZnnO7uLCxV+Ujad+ PH3itRm38i96p2zvwgLr8vwWA0ckMIIFMTCCBBmgAwIBAgIQTUYRMpPx2e52jnkx1q87gDANBgkq hkiG9w0BAQsFADCBlzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQ MA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxPTA7BgNVBAMTNENP TU9ETyBSU0EgQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFuZCBTZWN1cmUgRW1haWwgQ0EwHhcNMTcx MjIxMDAwMDAwWhcNMTgxMjIxMjM1OTU5WjAkMSIwIAYJKoZIhvcNAQkBFhNkd213MkBpbmZyYWRl YWQub3JnMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4MyzVmtfAzaRlI/2Xh9EoM+d xEiG83T8NziXrjT+o2YcWaI28n8WzIRE7HMSPx4+lGeGu7B5uQZFY5bAdQH9mWvz11LfDJiwHDzB 5DDxrp75FImxL25Q76ajJEGZWmTPreT6hZlpG3oS2hL26TWO3ZhAAHioeJJU8yc66+QAM2gkN9nA Nnt/gxCL+TuZfVYjCI8vyTPsTEK319z2dHIWNT2lVo4OfXeFJ6PuS0Q24Apz5CiV+MrARmnYm4wR kBiRGQo4feIohHm59irES77aye9j4d1thwxHZ4Ft2D9MLoxUFbPNVOy/Fzd5HT0bGvczahrWED// tSjDCUOe4Z34vQIDAQABo4IB6TCCAeUwHwYDVR0jBBgwFoAUgq9sjPjF/pZhfOgfPStxSF7Ei8Aw HQYDVR0OBBYEFKS/v+ZZYvY5o9ih468soZwdsUbdMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8E AjAAMCAGA1UdJQQZMBcGCCsGAQUFBwMEBgsrBgEEAbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAw RgYDVR0gBD8wPTA7BgwrBgEEAbIxAQIBAQEwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUu Y29tb2RvLm5ldC9DUFMwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2NybC5jb21vZG9jYS5jb20v Q09NT0RPUlNBQ2xpZW50QXV0aGVudGljYXRpb25hbmRTZWN1cmVFbWFpbENBLmNybDCBiwYIKwYB BQUHAQEEfzB9MFUGCCsGAQUFBzAChklodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9SU0FD bGllbnRBdXRoZW50aWNhdGlvbmFuZFNlY3VyZUVtYWlsQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRw Oi8vb2NzcC5jb21vZG9jYS5jb20wHgYDVR0RBBcwFYETZHdtdzJAaW5mcmFkZWFkLm9yZzANBgkq hkiG9w0BAQsFAAOCAQEAitvAXW1SfUCkKkw318KIAGIkQRBqbXxNQY8uBebwunliajideb7p8Yy8 HW2WG+C9KqyZYfmRxx5WyCvLhGbuzVx1J7ZljGxm2YruyYK20lyStXLfYMazf7HVmCfiQ41R4Oxn w0700z2tuiTEaibDtU448g1+wNyt/U41fAtIal78BfQbDX/qgXljuhlcyeee9msGNttYXNbpom5m WileH4Pu30u6rHMeU0riHOrrzAUIZuzUIgqunrjDFgQ1A5aLUAg1tIpZtDri1tyFS7mQpujLHPuo U/fnQk+CVL8Ux2Z5zu7iwsVflI2nfjx94rUZt/Iveqds78IC6/L8FgNHJDCCBeYwggPOoAMCAQIC EGqb4Tg7/ytrnwHV2binUlYwDQYJKoZIhvcNAQEMBQAwgYUxCzAJBgNVBAYTAkdCMRswGQYDVQQI ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBD QSBMaW1pdGVkMSswKQYDVQQDEyJDT01PRE8gUlNBIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4X DTEzMDExMDAwMDAwMFoXDTI4MDEwOTIzNTk1OVowgZcxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJH cmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBM aW1pdGVkMT0wOwYDVQQDEzRDT01PRE8gUlNBIENsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgU2Vj dXJlIEVtYWlsIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvrOeV6wodnVAFsc4 A5jTxhh2IVDzJXkLTLWg0X06WD6cpzEup/Y0dtmEatrQPTRI5Or1u6zf+bGBSyD9aH95dDSmeny1 nxdlYCeXIoymMv6pQHJGNcIDpFDIMypVpVSRsivlJTRENf+RKwrB6vcfWlP8dSsE3Rfywq09N0Zf xcBa39V0wsGtkGWC+eQKiz4pBZYKjrc5NOpG9qrxpZxyb4o4yNNwTqzaaPpGRqXB7IMjtf7tTmU2 jqPMLxFNe1VXj9XB1rHvbRikw8lBoNoSWY66nJN/VCJv5ym6Q0mdCbDKCMPybTjoNCQuelc0IAaO 4nLUXk0BOSxSxt8kCvsUtQIDAQABo4IBPDCCATgwHwYDVR0jBBgwFoAUu69+Aj36pvE8hI6t7jiY 7NkyMtQwHQYDVR0OBBYEFIKvbIz4xf6WYXzoHz0rcUhexIvAMA4GA1UdDwEB/wQEAwIBhjASBgNV HRMBAf8ECDAGAQH/AgEAMBEGA1UdIAQKMAgwBgYEVR0gADBMBgNVHR8ERTBDMEGgP6A9hjtodHRw Oi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9SU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDBx BggrBgEFBQcBAQRlMGMwOwYIKwYBBQUHMAKGL2h0dHA6Ly9jcnQuY29tb2RvY2EuY29tL0NPTU9E T1JTQUFkZFRydXN0Q0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20w DQYJKoZIhvcNAQEMBQADggIBAHhcsoEoNE887l9Wzp+XVuyPomsX9vP2SQgG1NgvNc3fQP7TcePo 7EIMERoh42awGGsma65u/ITse2hKZHzT0CBxhuhb6txM1n/y78e/4ZOs0j8CGpfb+SJA3GaBQ+39 4k+z3ZByWPQedXLL1OdK8aRINTsjk/H5Ns77zwbjOKkDamxlpZ4TKSDMKVmU/PUWNMKSTvtlenlx Bhh7ETrN543j/Q6qqgCWgWuMAXijnRglp9fyadqGOncjZjaaSOGTTFB+E2pvOUtY+hPebuPtTbq7 vODqzCM6ryEhNhzf+enm0zlpXK7q332nXttNtjv7VFNYG+I31gnMrwfHM5tdhYF/8v5UY5g2xANP ECTQdu9vWPoqNSGDt87b3gXb1AiGGaI06vzgkejL580ul+9hz9D0S0U4jkhJiA7EuTecP/CFtR72 uYRBcunwwH3fciPjviDDAI9SnC/2aPY8ydehzuZutLbZdRJ5PDEJM/1tyZR2niOYihZ+FCbtf3D9 mB12D4ln9icgc7CwaxpNSCPt8i/GqK2HsOgkL3VYnwtx7cJUmpvVdZ4ognzgXtgtdk3ShrtOS1iA N2ZBXFiRmjVzmehoMof06r1xub+85hFQzVxZx5/bRaTKTlL8YXLI8nAbR9HWdFqzcOoB/hxfEyIQ px9/s81rgzdEZOofSlZHynoSMYIDxzCCA8MCAQEwgawwgZcxCzAJBgNVBAYTAkdCMRswGQYDVQQI ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBD QSBMaW1pdGVkMT0wOwYDVQQDEzRDT01PRE8gUlNBIENsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQg U2VjdXJlIEVtYWlsIENBAhBNRhEyk/HZ7naOeTHWrzuAMA0GCWCGSAFlAwQCAQUAoIIB6zAYBgkq hkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBTEPFw0xODAzMDUxMTE5MjRaMC8GCSqG SIb3DQEJBDEiBCBQkzzn5YL6Pd8eG1q/fkv4Hyc1YK3eWZw4mYAHjA6/QTCBvQYJKwYBBAGCNxAE MYGvMIGsMIGXMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD VQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE9MDsGA1UEAxM0Q09NT0RP IFJTQSBDbGllbnQgQXV0aGVudGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQTUYRMpPx2e52 jnkx1q87gDCBvwYLKoZIhvcNAQkQAgsxga+ggawwgZcxCzAJBgNVBAYTAkdCMRswGQYDVQQIExJH cmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9ETyBDQSBM aW1pdGVkMT0wOwYDVQQDEzRDT01PRE8gUlNBIENsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgU2Vj dXJlIEVtYWlsIENBAhBNRhEyk/HZ7naOeTHWrzuAMA0GCSqGSIb3DQEBAQUABIIBAEkkqrrlM8tV egX/4QvOw9NwRhJzUmiduzLRYaeVam66LzNW8Bqs4wacydUYJxT/0n0MT9Z/ShfAdsLwdTF5+7RQ 8sSWhgVxOweWIayDV2nCvyTmZhhqJQdc1W3HvsvPDIUoImz7PiIPMXGxawP0zCgWNcn+bNOTnHXt NjDNBdpzI+401hm94jfDL43kLa7ffJ2yhiMnydGpLMrdP1mkDv6bg4EoIiXhn5/krh5/uDY5JadD mKjtDM3JraM9ZK0oDg8d5siC34h3eHo1rbV+GNOH8x4VRUmngHakGWs+4G/z9cpMqCykxJXQFmb5 wAp3NxV/u8u38ndY1Z5yhWxPnJoAAAAAAAA= --=-anbi35sTfcR2F+GY9Sju-- From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: s.gottschall@dd-wrt.com Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 47ea952c for ; Mon, 5 Mar 2018 11:16:17 +0000 (UTC) Received: from webmail.newmedia-net.de (smtps.newmedia-net.de [185.84.6.167]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 7ea24bc8 for ; Mon, 5 Mar 2018 11:16:17 +0000 (UTC) Subject: Re: Tunsafe Windows client for wireguard (not opensource yet they say To: wireguard@lists.zx2c4.com References: <41222FCF-F9F5-4FEC-AA71-73C48F4DA4BA@gmail.com> <1520248764.27019.10.camel@infradead.org> From: Sebastian Gottschall Message-ID: Date: Mon, 5 Mar 2018 12:25:29 +0100 MIME-Version: 1.0 In-Reply-To: <1520248764.27019.10.camel@infradead.org> Content-Type: text/plain; charset=utf-8; format=flowed List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , google chrome warns if you try to download tunsafe. its potentially unsafe. :-) Am 05.03.2018 um 12:19 schrieb David Woodhouse: > On Mon, 2018-03-05 at 10:19 +0100, Jason A. Donenfeld wrote: >> One aspect of the WireGuard project is that we're taking development >> very carefully and slowly, not jumping to premature releases, and >> really studying every bit of what we produce in order to ship the >> least-vulnerable and most-correct code we possibly can. We're still >> shipping code -- it's not an approach that results in a complete >> standstill -- but it does mean that in these intervening periods, >> there will be propheteers and cowboys coming out of the woodwork to >> fill the void. > I wasn't sure whether to suggest this before, but adding Wireguard > support to OpenConnect ought to be fairly easy. We already support > three VPN protocols, so we have a *relatively* sane distinction between > the protocol-specific parts, and all the OS-specific tun device > handling and other bits that would just be gratuitous wheel-reinvention > for you. > > It basically gives you support for Windows, Solaris, OSX, Android and > various BSDs for nothing. With NetworkManager support. > > For a client that *isn't* purely wrapping the kernel implementation, it > probably makes sense rather starting from scratch. If anyone's > interested in working on it, I'd be happy to give some pointers. > > (I've also looked in the past at adding kernel support too, for DTLS > acceleration; I may take a look at that again.) > > > _______________________________________________ > WireGuard mailing list > WireGuard@lists.zx2c4.com > https://lists.zx2c4.com/mailman/listinfo/wireguard -- Mit freundlichen Grüssen / Regards Sebastian Gottschall / CTO NewMedia-NET GmbH - DD-WRT Firmensitz: Stubenwaldallee 21a, 64625 Bensheim Registergericht: Amtsgericht Darmstadt, HRB 25473 Geschäftsführer: Peter Steinhäuser, Christian Scheele http://www.dd-wrt.com email: s.gottschall@dd-wrt.com Tel.: +496251-582650 / Fax: +496251-5826565 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: s.gottschall@dd-wrt.com Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 53c82f5a for ; Mon, 5 Mar 2018 11:19:57 +0000 (UTC) Received: from webmail.newmedia-net.de (smtps.newmedia-net.de [185.84.6.167]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id e76371a9 for ; Mon, 5 Mar 2018 11:19:57 +0000 (UTC) Subject: Re: Tunsafe Windows client for wireguard (not opensource yet they say To: wireguard@lists.zx2c4.com References: <41222FCF-F9F5-4FEC-AA71-73C48F4DA4BA@gmail.com> From: Sebastian Gottschall Message-ID: <8f4c1033-d41c-e358-58f2-cd02618e5e82@dd-wrt.com> Date: Mon, 5 Mar 2018 12:29:10 +0100 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , it isnt closed source. the sourcecode is provided as far as i have seen and licensed under GPL but correct me if i'm wrong https://tunsafe.com/downloads/TunSafe-TAP-9.21.2-sources.zip Am 05.03.2018 um 10:19 schrieb Jason A. Donenfeld: > Hi Henrique, > > Thanks for posting this. > > Please stay away from this software, and generally be wary of > closed-source WireGuard implementations trying to fill the void. This > one was written by a community-unfriendly proprietary author, and > we've got little way of ensuring protocol compliance or basic > security. Especially from my discussions from him, it's clear what > he's up to, and this seems like some nastiness. Should I spend my time > reverse engineering this software and discovering zero-days? Probably > not a good use of my time, despite my usual love of this sort of > thing. > > One aspect of the WireGuard project is that we're taking development > very carefully and slowly, not jumping to premature releases, and > really studying every bit of what we produce in order to ship the > least-vulnerable and most-correct code we possibly can. We're still > shipping code -- it's not an approach that results in a complete > standstill -- but it does mean that in these intervening periods, > there will be propheteers and cowboys coming out of the woodwork to > fill the void. > > It's quite easy to make a tiny tunneling protocol that's reasonably > fast and does a few things; if you look on Github there are hundreds. > It's quite another thing to write robust and secure software intend to > last for a long time. That's what we're working on here. > > Fortunately we have two very nice projects that are rapidly > approaching maturity: one in Go and one in Rust. I fully welcome > future OSS authors into the project. When I'm back from visiting > family at the beginning of April, I think we'll be in a good place to > have a few first releases. > > I'll also do what I can to see that people aren't peddling junk and > calling it wireguard, so as to reduce user confusion, but this of > course isn't a very easy endeavor. I'm open to suggestions on how to > approach this. > > Regards, > Jason > _______________________________________________ > WireGuard mailing list > WireGuard@lists.zx2c4.com > https://lists.zx2c4.com/mailman/listinfo/wireguard > -- Mit freundlichen Grüssen / Regards Sebastian Gottschall / CTO NewMedia-NET GmbH - DD-WRT Firmensitz: Stubenwaldallee 21a, 64625 Bensheim Registergericht: Amtsgericht Darmstadt, HRB 25473 Geschäftsführer: Peter Steinhäuser, Christian Scheele http://www.dd-wrt.com email: s.gottschall@dd-wrt.com Tel.: +496251-582650 / Fax: +496251-5826565 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: s.gottschall@dd-wrt.com Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 81f672f8 for ; Mon, 5 Mar 2018 11:20:40 +0000 (UTC) Received: from webmail.newmedia-net.de (smtps.newmedia-net.de [185.84.6.167]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id db3daf5b for ; Mon, 5 Mar 2018 11:20:40 +0000 (UTC) Subject: Re: Tunsafe Windows client for wireguard (not opensource yet they say To: wireguard@lists.zx2c4.com References: <41222FCF-F9F5-4FEC-AA71-73C48F4DA4BA@gmail.com> From: Sebastian Gottschall Message-ID: <9e0354b6-9f31-665c-fee1-db504572ce86@dd-wrt.com> Date: Mon, 5 Mar 2018 12:29:53 +0100 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , nevermind. its just the tap source Am 05.03.2018 um 10:19 schrieb Jason A. Donenfeld: > Hi Henrique, > > Thanks for posting this. > > Please stay away from this software, and generally be wary of > closed-source WireGuard implementations trying to fill the void. This > one was written by a community-unfriendly proprietary author, and > we've got little way of ensuring protocol compliance or basic > security. Especially from my discussions from him, it's clear what > he's up to, and this seems like some nastiness. Should I spend my time > reverse engineering this software and discovering zero-days? Probably > not a good use of my time, despite my usual love of this sort of > thing. > > One aspect of the WireGuard project is that we're taking development > very carefully and slowly, not jumping to premature releases, and > really studying every bit of what we produce in order to ship the > least-vulnerable and most-correct code we possibly can. We're still > shipping code -- it's not an approach that results in a complete > standstill -- but it does mean that in these intervening periods, > there will be propheteers and cowboys coming out of the woodwork to > fill the void. > > It's quite easy to make a tiny tunneling protocol that's reasonably > fast and does a few things; if you look on Github there are hundreds. > It's quite another thing to write robust and secure software intend to > last for a long time. That's what we're working on here. > > Fortunately we have two very nice projects that are rapidly > approaching maturity: one in Go and one in Rust. I fully welcome > future OSS authors into the project. When I'm back from visiting > family at the beginning of April, I think we'll be in a good place to > have a few first releases. > > I'll also do what I can to see that people aren't peddling junk and > calling it wireguard, so as to reduce user confusion, but this of > course isn't a very easy endeavor. I'm open to suggestions on how to > approach this. > > Regards, > Jason > _______________________________________________ > WireGuard mailing list > WireGuard@lists.zx2c4.com > https://lists.zx2c4.com/mailman/listinfo/wireguard > -- Mit freundlichen Grüssen / Regards Sebastian Gottschall / CTO NewMedia-NET GmbH - DD-WRT Firmensitz: Stubenwaldallee 21a, 64625 Bensheim Registergericht: Amtsgericht Darmstadt, HRB 25473 Geschäftsführer: Peter Steinhäuser, Christian Scheele http://www.dd-wrt.com email: s.gottschall@dd-wrt.com Tel.: +496251-582650 / Fax: +496251-5826565 From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Jason@zx2c4.com Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 44ee2c6d for ; Mon, 5 Mar 2018 11:22:45 +0000 (UTC) Received: from frisell.zx2c4.com (frisell.zx2c4.com [192.95.5.64]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 5b3b37be for ; Mon, 5 Mar 2018 11:22:45 +0000 (UTC) Received: by frisell.zx2c4.com (ZX2C4 Mail Server) with ESMTP id fc5d9505 for ; Mon, 5 Mar 2018 11:13:54 +0000 (UTC) Received: by frisell.zx2c4.com (ZX2C4 Mail Server) with ESMTPSA id cd6ab655 (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128:NO) for ; Mon, 5 Mar 2018 11:13:54 +0000 (UTC) Received: by mail-oi0-f48.google.com with SMTP id u73so11768286oie.3 for ; Mon, 05 Mar 2018 03:31:59 -0800 (PST) MIME-Version: 1.0 In-Reply-To: <8f4c1033-d41c-e358-58f2-cd02618e5e82@dd-wrt.com> References: <41222FCF-F9F5-4FEC-AA71-73C48F4DA4BA@gmail.com> <8f4c1033-d41c-e358-58f2-cd02618e5e82@dd-wrt.com> From: "Jason A. Donenfeld" Date: Mon, 5 Mar 2018 12:31:58 +0100 Message-ID: Subject: Re: Tunsafe Windows client for wireguard (not opensource yet they say To: Sebastian Gottschall Content-Type: text/plain; charset="UTF-8" Cc: WireGuard mailing list List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Mon, Mar 5, 2018 at 12:29 PM, Sebastian Gottschall wrote: > it isnt closed source. the sourcecode is provided as far as i have seen and > licensed under GPL > but correct me if i'm wrong > https://tunsafe.com/downloads/TunSafe-TAP-9.21.2-sources.zip This isn't the source code of tunsafe. This is the source code of the OpenVPN Windows tuntap kernel driver, which has been hacked up in various ways for tunsafe. That's a super scary driver, by the way. The actual source code of tunsafe is closed source. From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Jason@zx2c4.com Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 28471d5e for ; Mon, 5 Mar 2018 11:24:43 +0000 (UTC) Received: from frisell.zx2c4.com (frisell.zx2c4.com [192.95.5.64]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id ff3bcc22 for ; Mon, 5 Mar 2018 11:24:43 +0000 (UTC) Received: by frisell.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 951a7de7 for ; Mon, 5 Mar 2018 11:15:52 +0000 (UTC) Received: by frisell.zx2c4.com (ZX2C4 Mail Server) with ESMTPSA id 4ba126e0 (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128:NO) for ; Mon, 5 Mar 2018 11:15:52 +0000 (UTC) Received: by mail-oi0-f54.google.com with SMTP id f186so11761668oig.4 for ; Mon, 05 Mar 2018 03:33:57 -0800 (PST) MIME-Version: 1.0 In-Reply-To: <1520248764.27019.10.camel@infradead.org> References: <41222FCF-F9F5-4FEC-AA71-73C48F4DA4BA@gmail.com> <1520248764.27019.10.camel@infradead.org> From: "Jason A. Donenfeld" Date: Mon, 5 Mar 2018 12:33:56 +0100 Message-ID: Subject: Re: Tunsafe Windows client for wireguard (not opensource yet they say To: David Woodhouse Content-Type: text/plain; charset="UTF-8" Cc: WireGuard mailing list List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Mon, Mar 5, 2018 at 12:19 PM, David Woodhouse wrote: > I wasn't sure whether to suggest this before, but adding Wireguard > support to OpenConnect ought to be fairly easy. We already support > three VPN protocols, so we have a *relatively* sane distinction between > the protocol-specific parts, and all the OS-specific tun device > handling and other bits that would just be gratuitous wheel-reinvention > for you. > > It basically gives you support for Windows, Solaris, OSX, Android and > various BSDs for nothing. With NetworkManager support. > > For a client that *isn't* purely wrapping the kernel implementation, it > probably makes sense rather starting from scratch. If anyone's > interested in working on it, I'd be happy to give some pointers. > > (I've also looked in the past at adding kernel support too, for DTLS > acceleration; I may take a look at that again.) That sounds pretty excellent. I'll add that the project TODO list and maybe we'll get an interested contributor or a GSoC student for it. By the way, how would you feel about doing this via the existing Go and Rust implementations? If I can jerry rig it into the build system, would you be interested? From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: strigeus@gmail.com Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id c9801824 for ; Tue, 6 Mar 2018 01:35:44 +0000 (UTC) Received: from mail-ot0-f177.google.com (mail-ot0-f177.google.com [74.125.82.177]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 620c9f42 for ; Tue, 6 Mar 2018 01:35:44 +0000 (UTC) Received: by mail-ot0-f177.google.com with SMTP id g97so16883738otg.13 for ; Mon, 05 Mar 2018 17:45:02 -0800 (PST) MIME-Version: 1.0 From: Ludvig Strigeus Date: Tue, 6 Mar 2018 02:44:31 +0100 Message-ID: Subject: Re: Tunsafe Windows client for wireguard (not opensource yet they say To: wireguard@lists.zx2c4.com Content-Type: multipart/alternative; boundary="94eb2c1c1ce2493a530566b497f9" List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , --94eb2c1c1ce2493a530566b497f9 Content-Type: text/plain; charset="UTF-8" Jason A. Donenfeld wrote: > Please stay away from this software, and generally be wary of > closed-source WireGuard implementations trying to fill the void.* This **> one was written by a community-unfriendly proprietary author*, and > we've got little way of ensuring protocol compliance or basic > security. *Especially from my discussions from him, it's clear what **> he's up to, and this seems like some nastiness.* Should I spend my time > reverse engineering this software and discovering zero-days? Probably > not a good use of my time, despite my usual love of this sort of thing. First of all could you change tone a little bit, personal attacks and rudeness do not have a place in those discussions unless you actually back them up with facts. Never once during our IRC chat did I say something negative about you, instead I wrote several times that WireGuard was fanastic and you're an inspiring person. I'd be happy to share IRC logs of our brief communication with this list to prove my point, but your attitude appears to be that everything that is not open source, and hosted under the WireGuard brand/webpage, is community-unfriendly and nasty. Is that what you mean by community unfriendly? I said that if I release TunSafe I probably want it under my own name, on my own website, where I'm free to develop the project in any direction I want, without pressure to release it as open source. I don't want to spend weeks or months building a client for it to end up on some semi-hidden place on wireguard.com just because you prefer Rust or Go, where my contribution may get diminished into nothing at all. How would you deal with Microsoft if they wanted to add a closed source implementation of WireGuard in Windows. Would they also be considered a community-unfriendly proprietary author with a clear agenda of nastiness? Is this how you envision how things would work should WireGuard become a future RFC / Internet Standard? The only accepted implementation would be that one from yourself? No companies would be allowed to implement it or take part in discussions? This is not how Internet protocols typically work. Given these constraints, I'm happy to participate in whatever protocol discussions or community related questions that I'm in the capacity to answer or contribute to. I totally understand your point about open source applications being easier to audit, especially important when it's related to security. I share this view, and will address it eventually, in some way. Either just the wireguard protocol layer or the whole UI too. Though, your behavior this past day has confirmed even more that I'm not interested in being a slave in a dictatorship. You've ignored my attempts at communications for 2 weeks. You ban me from #wireguard IRC even though I haven't talked there for weeks, but just because I'm in there and not being as much of a die-hard open-source evangelist as you are. Jason A. Donenfeld wrote: > This isn't the source code of tunsafe. This is the source code of the > OpenVPN Windows tuntap kernel driver, *which has been hacked up in **> various ways for tunsafe*. That's a super scary driver, by the way. Incorrect. The driver files are not modified at all. They still carry OpenVPN's codesigning signature. You can see this on the driver install prompt: https://tunsafe.com/img/quickstart-driver-confirm.png I agree that the driver is scary, I think I even found some potential OOB memory accesses in it from a quick glance. However, this is the best driver the community has at this point in time, and even your own userspace implementations of WG use it. I'd be happy to improve it but then I need an expensive driver codesigning certificate in order to load it into the kernel. /Ludde --94eb2c1c1ce2493a530566b497f9 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Jason A. Donenfeld wrote:
=
> Please stay away from this software, and generally be= wary of > closed-source WireGuard implementations trying to fi= ll the void. This > one was written by a community-unfriendly pro= prietary author, and > we've got little way of ensuring protocol compli= ance or basic > security. Especially from my discussions from him= , it's clear what > he's up to, and this seems like some nast= iness. Should I spend my time > reverse engineering this software and discovering ze= ro-days? Probably > not a good use of my time, despite my usual love of = this sort of thing.

First of all could you change tone a lit= tle bit, personal attacks and
ruden= ess do not have a place in those discussions unles= s you actually
back them up = with facts.

= Never once during our IRC chat did I say something negative= about you,
instead I wrote several= times that WireGuard was fanastic and you're
<= font color=3D"#000000" face=3D"monospace, monospace">an inspiring person.

I'd be happy to share IR= C logs of our brief communication with this list
to prove my point, but your attitude= appears to be that everything that
is not open= source, and hosted under the WireGuard brand/webpage, is=
community-unfriendly and nas= ty. Is that what you mean by community
unfriend= ly?

I said tha= t if I release TunSafe I probably want it under my own = name,
on my own website, where I'm free= to develop the project in any
direction I want= , without pressure to release it as open source.
I don't want to spend weeks or <= /span>months building a clie= nt for it to end
up on so= me semi-hidden place on wireguard.com=C2=A0just because you
prefer Rust or Go,=C2=A0where= my contribution may get diminished int= o
nothing at all.

<= div>How would you deal with Microsoft if they wanted to add a cl= osed
source implementation of WireGuard in = Windows. Would they also
be considered a commun= ity-unfriendly proprietary author with a
clear= agenda of nastiness?

Is this how you envision how things would work should WireGuard
become a future RFC / Internet S= tandard? The only accepted
implementation would= be that one from yourself? No companies
would = be allowed to implement it or take part in discussions?
This is not how Internet protocols typically wor= k.

Given these constraints, I= 9;m happy to participate in whatever
proto= col discussions or community related questions that I'm
in the capacity to answer or contribute to.
=
I totally understand you= r point about open source applications
being easier to audit, especially important when= it's related
to security. I share this view, and will address it eventually,
in some way. Eith= er just the wireguard protocol layer or the
whole UI too.

Though, your behavi= or this past day has confirmed even more that
= I'm not interested in being a slave in a dictatorship= . You've
ignored my attem= pts at communications for 2 weeks. You ban me
= from #wireguard IRC even though I haven't talked ther= e for weeks,
but just because I'm in there = and not being as much of a die-hard
open-source evangelist as you are.

Jason A. D= onenfeld wrote:
> This isn't the sou= rce code of tunsafe. This is the source code of the > OpenVPN Windows tuntap kernel driver, which has been hacked up in > various ways for tunsafe. That's a supe= r scary driver, by the way.

Incorrect. The driver files are not modified at all. They still
carry OpenVPN's codesigning s= ignature. You can see this on the
driver install prompt:

I agree that the driver is scary, I think I even found some=C2= =A0
potent= ial OOB=C2=A0memory = accesses in it from a quick glance. However,=C2=A0
this is the best driver the=C2=A0<= /span>community has at this= point in time,
and even your own userspace=C2=A0implementations of WG use it. I'd
<= span style=3D"font-family:monospace,monospace">be happy to improve it but t= hen I need an expensive driver
codesigning=C2=A0certificate in order to load it into the kernel.<= /font>

/Ludde


--94eb2c1c1ce2493a530566b497f9-- From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Jason@zx2c4.com Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id de075416 for ; Tue, 6 Mar 2018 09:07:31 +0000 (UTC) Received: from frisell.zx2c4.com (frisell.zx2c4.com [192.95.5.64]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 55f6973f for ; Tue, 6 Mar 2018 09:07:31 +0000 (UTC) Received: by frisell.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 165f689c for ; Tue, 6 Mar 2018 08:58:39 +0000 (UTC) Received: by frisell.zx2c4.com (ZX2C4 Mail Server) with ESMTPSA id d4967cf9 (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128:NO) for ; Tue, 6 Mar 2018 08:58:38 +0000 (UTC) Received: by mail-ot0-f182.google.com with SMTP id n74so17708692ota.1 for ; Tue, 06 Mar 2018 01:16:50 -0800 (PST) MIME-Version: 1.0 In-Reply-To: References: From: "Jason A. Donenfeld" Date: Tue, 6 Mar 2018 10:16:49 +0100 Message-ID: Subject: Re: Tunsafe Windows client for wireguard (not opensource yet they say To: Ludvig Strigeus Content-Type: text/plain; charset="UTF-8" Cc: WireGuard mailing list List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Tue, Mar 6, 2018 at 2:44 AM, Ludvig Strigeus wrote: > The driver files are not modified at all. They still > carry OpenVPN's codesigning signature. Both good and bad to hear. That's a really really flaky driver, and it _does_ need to be hacked to pieces, removing tons of things, in order for it to be real software someone would want to run. On the other hand, at least you get code signing for free. > First of all could you change tone a little bit, personal attacks and > rudeness do not have a place in those discussions unless you actually > back them up with facts. There are no personal attacks. I don't know much about you, beyond uTorrent and adware. Rather, my comments are in relation to your software -- which doesn't implement the protocol correctly and has security issues. (Your stripped binaries really wasted way too much time, by the way.) It's not safe for users to use. I've got a duty to such users to inform them when these types of security and interoperability issues crop up. > but your attitude appears to be that everything that > is not open source, and hosted under the WireGuard brand/webpage, is > community-unfriendly and nasty. Is that what you mean by community > unfriendly? No I think the notion is a bit different than that. This community here looks very closely at design decisions and implementations, making sure we deliver secure software of high quality. Part of that means working together and doing extensive code reviews and sharing source code. Another part of that is keeping things unified as one single project. From the beginning you've seemed interested in bifurcation, and releasing hastily written software with little review quickly. > probably want it under my own name, > on my own website, where I'm free to develop the project in any > direction I want Sounds to be like an interoperability and compatibility disaster in the making, NIH gone bad. > I don't want to spend weeks or months building a client for it to end > up on some semi-hidden place on wireguard.com just because you > prefer Rust or Go, where my contribution may get diminished into > nothing at all. Actually that's not the case at all. On a personal note, I've spent decades writing C++, and I'm surprisingly fond of it, despite its warts. I used to keep Stroustrup's book on the back of the toilet for casual perusing. We have a Rust and a Go implementation because those are what's been contributed by volunteers, and have the nice aspect of being somewhat "safer" to write code in, especially Rust. Aside from your flamebait email here, I (and other developers working on WireGuard) still would be happy to work with you on the codebase to ensure that it's written securely and compatibly, doing regular releases as WireGuard software. But indeed that would mean working with the community and doing things under one roof, not running off and shipping bad bits. > How would you deal with Microsoft if they wanted to add a closed > source implementation of WireGuard in Windows. Would they also > be considered a community-unfriendly proprietary author with a > clear agenda of nastiness? I'm pretty confident Microsoft would pick a reasonable strategy for working with us here and releasing code responsibility. It's true they have that classic history of "embrace, extend, extinguish" (is the new CEO different? maybe?), but knowing some people working on their security teams and crypto teams who would likely be implementing this kind of thing, maybe this wouldn't happen? Or that's being too optimistic? I oscillate between thinking recent github-friendly and linuxsubsystem-writing Microsoft has really changed itself since the 2000s, and thinking this is just naivete on my part. So, who knows what they'd do. One can dream I suppose. > The only accepted > implementation would be that one from yourself? No companies > would be allowed to implement it or take part in discussions? > This is not how Internet protocols typically work. Actually no. There are several people working on several implementations. This list here has extensive discussion about different features, and the design of the protocol has, in extremely large part, been driven by this mailing list. We're a quite open community. > to security. I share this view, and will address it eventually, > in some way. Either just the wireguard protocol layer or the > whole UI too. That's great to hear. I look forward to you open sourcing your project, and we can get to work in earnest on it once this happens. > I'm not interested in being a slave in a dictatorship. That's a pretty offensive and outrageous way of describing any of this. We're an open source project of volunteers. Lots of people are doing their invaluable part and contributing invaluable time. At least two of us are doing this more or less full-time, because we want to. Others are doing this between jobs or between classes or between military deployments. We're all volunteers, working to do this the best we can. > You've > ignored my attempts at communications for 2 weeks. That's an odd thing to say. The last messages I have from you are you indicating to me you're going to go the closed source way, and then nothing after that for quite some time. In case IRC is irreliable for me or for you, I prefer we speak privately over email -- jason@zx2c4.com usually works well these days. > You ban me > from #wireguard IRC even though I haven't talked there for weeks As said prior, there's little interest in inundating users with proprietary insecure software, not to mention freenode having some policies about proprietary software. If you decide you'd like to open source it at some point, rather than putting ads on it or selling it like you've done in the past with software, we can talk. But insofar as you're putting users in harm's way and fragmenting the project, I ask that you stay away from these parts. Nobody is interested in insecure software. Yet in spite of your to-date brazenness, I'm still willing to work with you if you'd like to turn things around. Shoot me an email if you'd like to talk about open sourcing this work and integrating with the community. Regards, Jason From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: steffan@karger.me Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 2f197bbf for ; Tue, 6 Mar 2018 12:23:38 +0000 (UTC) Received: from mail-qt0-f176.google.com (mail-qt0-f176.google.com [209.85.216.176]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 97adb50f for ; Tue, 6 Mar 2018 12:23:37 +0000 (UTC) Received: by mail-qt0-f176.google.com with SMTP id c7so24305560qtn.3 for ; Tue, 06 Mar 2018 04:32:59 -0800 (PST) MIME-Version: 1.0 In-Reply-To: References: From: Steffan Karger Date: Tue, 6 Mar 2018 13:32:39 +0100 Message-ID: Subject: Re: Tunsafe Windows client for wireguard (not opensource yet they say To: Ludvig Strigeus Content-Type: text/plain; charset="UTF-8" Cc: wireguard@lists.zx2c4.com List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Hi Ludvig, On 6 March 2018 at 02:44, Ludvig Strigeus wrote: > Jason A. Donenfeld wrote: >> This isn't the source code of tunsafe. This is the source code of the > >> OpenVPN Windows tuntap kernel driver, which has been hacked up in > various >> ways for tunsafe. That's a super scary driver, by the way. > > Incorrect. The driver files are not modified at all. They still > carry OpenVPN's codesigning signature. You can see this on the > driver install prompt: > https://tunsafe.com/img/quickstart-driver-confirm.png > > I agree that the driver is scary, I think I even found some > potential OOB memory accesses in it from a quick glance. However, > this is the best driver the community has at this point in time, > and even your own userspace implementations of WG use it. I'd > be happy to improve it but then I need an expensive driver > codesigning certificate in order to load it into the kernel. Please report any issues you find in the tap-windows driver to security@openvpn.net, so those can be fixed and many more people can profit from your work. In the same train of thought: you don't need a code signing certificate to improve the driver, you are more than welcome to work with the openvpn community to improve it (I expect, I don't actually work on tap-windows myself). Just send your patches to openvpn-devel@lists.sourceforge.net, or discuss your plans beforehand on the list if you want confirmation that your plans are okay with the community. Then wait for the next OpenVPN release to get your signed binary :) -Steffan