Development discussion of WireGuard
 help / color / mirror / Atom feed
From: Paul Swanson <psw@protonmail.com>
To: "wireguard@lists.zx2c4.com" <wireguard@lists.zx2c4.com>
Subject: Rethinking Obfuscation
Date: Fri, 16 Dec 2016 20:27:35 -0500	[thread overview]
Message-ID: <JV2fwV4TKBj6RAsdUIvPz41Ag-inFjFU9bWkmJYT74k6DhQrwz-yWh9cTTBfYq7iLYOv_j690kq2QyAOqR-HBVtdnYeQFrc8wuKncatCS28=@protonmail.com> (raw)

[-- Attachment #1: Type: text/plain, Size: 2969 bytes --]

Hi,

I'd just like to revisit a topic that recently came on the mailing list, traffic obfuscation.

Firstly, I'd like to state that I'm merely a grateful user of Wireguard, not a contributor.

That's relevant because the only way I can get reliable, uncensored Internet is with the help of Wireguard. And the only reason that is so, is because Wireguard is not yet a popular protocol.

I don't want to be so bold as to make an outright "feature request" for traffic obfuscation, but I would like to make my case for it's acceptance.

Right now, in many countries there are extreme filtering practices in place. And I realise that there's an argument for addressing this at a policy level but sadly that thinking is just not useful for literally billions of people (https://freedomhouse.org/report/freedom-net/freedom-net-2016). It's a different political context.

It's easy to feel comfortable from a western democratic context with our relative sense of freedom, but our governments have already built the most pervasive instruments of mass surveillance ever known. We've a lot of trust and people who've brazenly betrayed us. We're just building security infrastructure on the assumption we'll be continued to be allowed to use it for privacy.

For old VPN protocols such as IPSEC, OpenVPN and the like there's no hope. These are easily blocked by breaking the handshake processes, at the very least. Systems like TOR are praised by privacy advocates but are all but useless in the face of state-level / ISP filtering.

So while the problem might originate at a political level, this is not always resolvable. And right now there's precious little offering a technical solution. The only reliable approach I'm seeing widely employed is proprietary implementations of Open Source VPNs. VPN providers are making various obfuscation tweaks to things like OpenVPN to enable there services to work in places like China. The problem here is at least two fold. Firstly, it's proprietary! Need I say more here. Secondly, I don't see why any rational person should have confidence in these companies' cryptographic expertise.

I'd humbly like to propose a change in philosophy:

That obfuscation is a necessary, intermediary safeguard on the road to policy change.

That at least making provision for compatibility with obfuscation tools is relevant to the mission of projects such as Wireguard.

That providing expertise or guidance on how to obfuscate the Wireguard protocol, in the least miserable way, is a good and worthwhile thing.

Once again, thanks for all your work on the project. I love working with the userspace tools, they're well thought through. I love how resilient and well the protocol performs in the real world with miserable network latencies and giant evil firewalls. I love that it's open source.

I just hope I can keep using it where it really counts.

Paul S.


Sent from [ProtonMail](https://protonmail.com), encrypted email based in Switzerland.

[-- Attachment #2: Type: text/html, Size: 3771 bytes --]

             reply	other threads:[~2016-12-17  1:21 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-12-17  1:27 Paul Swanson [this message]
  -- strict thread matches above, loose matches on Subject: below --
2016-12-17  1:09 Paul Swanson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='JV2fwV4TKBj6RAsdUIvPz41Ag-inFjFU9bWkmJYT74k6DhQrwz-yWh9cTTBfYq7iLYOv_j690kq2QyAOqR-HBVtdnYeQFrc8wuKncatCS28=@protonmail.com' \
    --to=psw@protonmail.com \
    --cc=wireguard@lists.zx2c4.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).