From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Jason@zx2c4.com Received: from krantz.zx2c4.com (localhost [127.0.0.1]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id af19649b for ; Fri, 2 Mar 2018 13:47:26 +0000 (UTC) Received: from frisell.zx2c4.com (frisell.zx2c4.com [192.95.5.64]) by krantz.zx2c4.com (ZX2C4 Mail Server) with ESMTP id bad6b391 for ; Fri, 2 Mar 2018 13:47:26 +0000 (UTC) Received: by frisell.zx2c4.com (ZX2C4 Mail Server) with ESMTP id 44b76cc1 for ; Fri, 2 Mar 2018 13:38:34 +0000 (UTC) Received: by frisell.zx2c4.com (ZX2C4 Mail Server) with ESMTPSA id 62f3cca0 (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128:NO) for ; Fri, 2 Mar 2018 13:38:33 +0000 (UTC) Received: by mail-ot0-f171.google.com with SMTP id m22so8752250otf.10 for ; Fri, 02 Mar 2018 05:56:17 -0800 (PST) MIME-Version: 1.0 In-Reply-To: References: From: "Jason A. Donenfeld" Date: Fri, 2 Mar 2018 14:56:15 +0100 Message-ID: Subject: Re: ephemeral key extraction To: WireGuard mailing list Content-Type: text/plain; charset="UTF-8" List-Id: Development discussion of WireGuard List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Wed, Feb 28, 2018 at 9:11 PM, Jason A. Donenfeld wrote: > For a few days, I'll run a simple netcat server on demo.wireguard.com. > Try typing `nc demo.wireguard.com 58812` and then connecting to the > demo box like usual. Basically, it's every cryptographer's girlfriend > Eve's wildest fantasy. All of the key compromises all of the time! By popular demand, for a limited time only, coming to a key compromise situation near you, with no strings attached, in full bitstream quality, now avid Eves can get a live pcap in addition to the stream of ephemeral keys above: Try running `nc demo.wireguard.com 37281`, and piping it to wireshark. Happy decrypting! Jason