Re: Instability during large transfers

2017-03-01 Thread Samuel Holland

On 02/17/17 07:36, Jason A. Donenfeld wrote:

Thanks very much for the excellent debugging output. I'll try to
reproduce this as well on my systems.


I assume you have not been able to reproduce this issue.


The stack trace does indicate that the OOPS is happening in padata,
not in wireguard, so I wonder if this is some bug caused either by
grsecurity or by something else that was then fixed, but since your
kernel is a bit old (4.7.10) maybe the fix didn't make it. In either
case, I'll try to reproduce on that kernel and on newer kernels and
will get back to you.

I presume you have most PaX options turned on?


Since this is on 4.7.10 (that is pre-4.9), this is not related to the
other bug recently reported.

I have disabled all grsecurity/PaX options in my kernel config
(attached) and was able to trigger the bug again. This is with WireGuard
commit f97b7e34bda436ac4572697a8770837eec7470b6 and debugging enabled.
Again attached is the dmesg.

I used the same SSH cat /dev/zero | dd of=/dev/null as before. This time
I got "192656101376 bytes (193 GB, 179 GiB) copied, 41643 s, 4.6 MB/s"
before the connection was broken.

Interestingly, when the firewall came back up, I again had the issue
where devices were continuing to handshake, but no data went through
(and I could confirm this with the wireguard debug output in dmesg).

I was unable to reproduce this issue with a spare laptop (ThinkPad
X220), even after leaving it running for about three days. Since the
router has a rather weak Atom CPU (http://ark.intel.com/products/78866),
I suspect maybe a race condition due to the high load might be involved?

Is there anything else I can do to debug this? Enable some kernel
debugging option? Try a vanilla kernel? Try a newer kernel?


Thanks, Jason


Thanks,
Samuel Holland


panic_grsec_disabled.config.gz
Description: application/gzip


panic_grsec_disabled.dmesg.gz
Description: application/gzip
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Encapsulation

2017-03-01 Thread James Wilson
Hi,

Just out of curiosity, how does a "wireguard packet' look like on the wire
??

I'm guessing:

 Ethernet
 IP
 UDP
|--|
| IP |
| WG payload |
|--|


What's in the box is encrypted

Is that right ?? If not, what does it look like?

Thanks,

James
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Re: [ wireguard-devel] Purge old peer

2017-03-01 Thread jens
On 01.03.2017 14:47, Nicolas Prochazka wrote:
> Hello,
> we hare using wireguard with a lot of client, with a lot of
> dynamically generated peer key.
> So we have, server side, a lot of peers that are become obsoletes
> At this time, we delete peer , based on latest handshake > delta time
> , with wg command.
> Is the best thing to do ? is it possible to implement an auto purge of
> old peer ?
>
>
user handling, somehow "user-state" is something which may better
parseable in terms of "wg" output - but to implement it in wireguard
itself opens a whole lot of topics. And i prefer solutions build around
the kernel modul itself and keep it quite impossible to trigger an
invalidation of any peer (by manipulating time servers or exploiting
some strange timeissues like leap seconds, timezones etc.) - especially
since this is the special usecase for many2one connections, like your
Serverexample.

-- 
make the world nicer, please use PGP encryption


___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


[ wireguard-devel] Purge old peer

2017-03-01 Thread Nicolas Prochazka
Hello,
we hare using wireguard with a lot of client, with a lot of dynamically
generated peer key.
So we have, server side, a lot of peers that are become obsoletes
At this time, we delete peer , based on latest handshake > delta time ,
with wg command.
Is the best thing to do ? is it possible to implement an auto purge of old
peer ?

Regards,
Nicolas Prochazka.
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard


Re: RTNETLINK answers: Operation not supported

2017-03-01 Thread Jörg Thalheim

On 2017-02-28 17:08, William Clark wrote:
> Hello,
>
> So I wanted to try WireGuard but unfortunately I can't get pas this part:
> ip link add dev wg0 type wireguard.
>
> When ever I run the command "ip link add dev wg0 type wireguard"
> I get the output:
> RTNETLINK answers: Operation not supported
>
> This both happens on CentOS 7 and Fedora 25 and Ubuntu 16.04.
>
> CentOS 7 Kernel:
> Linux hostname 3.10.0-514.6.2.el7.x86_64 #1 SMP Thu Feb 23 03:04:39 UTC 2017 
> x86_64 x86_64 x86_64 GNU/Linux
> Fedora 25 Kernel:
> Linux hostname 4.9.7-x86_64-X #2 SMP Thu Feb 2 15:43:55 EST 2017 x86_64 
> x86_64 x86_64 GNU/Linux
>
> I've tried installing Linux headers too, but no luck and I've rebooted after 
> the upgrade too, and still no luck.
>
> Thanks a lot.

If the following commands do not succeed, the wireguard kernel module was not 
installed correctly:

$ modprobe wireguard
$ lsmod | grep wireguard
wireguard 126976  0
x_tables   28672  2 xt_hashlimit,wireguard
ip6_udp_tunnel 16384  1 wireguard
udp_tunnel 16384  1 wireguard
ipv6  401408  162 
nf_conntrack_ipv6,nf_defrag_ipv6,wireguard,bridge

___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard