Hi everyone,
On Mon, Sep 27, 2021 at 9:55 AM Nico Schottelius
wrote:
> Bruno Wolff III writes:
> > On Mon, Sep 27, 2021 at 09:53:08 +0900,
> > Nico Schottelius wrote:
> >
> > The problem is mostly orthogonal to Wireguard. There isn't going to be
> > a one size fits all solution for hiding
On Tue, Apr 14, 2020 at 10:30 AM wrote:
>
> I have some older routers that run OpenWRT just fine, but are a bit slow at
> Wireguard (3-5 MBytes/s for SMB transfers) and which are too slow for
> playing HD movies.
> For these routers/uses I don't care about security, I just want a VPN to
> tunnel
On Mon, Mar 30, 2020 at 4:33 AM Jason A. Donenfeld wrote:
> Earlier this evening, Linus released [1] Linus 5.6, which contains our
> first release of WireGuard. This is quite exciting. It means that
> kernels from here on out will have WireGuard built-in by default.
Yippee!
Congratulations
On Mon, Dec 9, 2019 at 4:46 PM Daniel Kahn Gillmor
wrote:
>
> On Mon 2019-12-09 11:12:23 +0100, Jason A. Donenfeld wrote:
> > I'm happy to announce that WireGuard has been merged into Dave
> > Miller's net-next tree. That means when Linus Torvalds opens up his
> > tree for Linux 5.6, Dave will
Deep Packet Inspection is the term used to describe detailed
inspection of network traffic.
A firewall might allow, block, or log traffic based on source or
destination IP address. Or it might do so by looking at TCP and UDP
headers inside the IP packet frame. Or, the firewall will even look at
On Wed, Jan 16, 2019 at 5:34 PM Jose Marinez wrote:
> I appreciate this proposition as well as your summary for the current state
> of Wireguard for this particular case. I agree with you wholeheartedly that
> before the mass adoption of Wireguard happens these use cases should be
> addressed
On Tue, Jan 15, 2019 at 1:05 PM Henning Reich wrote:
>
> Thank for your reply too,
>
> I "use" this list and conversation to get a bit more information about crypto
> at all (it looks like I need that :-)
>
I see. When I wanted to learn more about network security protocols I
read the RFC for
On Mon, Jan 14, 2019 at 1:05 PM Henning Reich wrote:
>
> 3. The attacker uses the VPN server static private key to decrypt the
> recorded handshakes, revealing client static pubkeys.
>
> I think, this is not possible.
> WG use DH for Key-Exchange as other VPNs do (like OpenVPN). Only with
>
Greetings fellow WireGuard users,
I represent Mullvad, a privacy-focused VPN provider. We and some
others think there are currently two aspects of WireGuard that make
its deployment in a privacy-focused setting a bit challenging. The
goal of this email is to present current thoughts on the issues
Hi everyone,
First of all, censorship circumvention is an important societal
problem to solve. It is also clearly outside of the scope of
WireGuard. Any suggested protocol change with that motive will
increase the complexity of the code base, which increases the risk of
vulnerabilities. This
Congratulations, and thank you! Looking forward to following the
discussions that will be sparked by this.
Cheers,
Fredrik Stromberg
On Wed, Aug 1, 2018 at 3:49 AM, jugs wrote:
> I don't have anything unique to say, but congratulations Jason!
>
> Years of hard work coming together for this
Hi Luis,
On Tue, Apr 10, 2018 at 3:16 PM, Ing. Luis Felipe Domínguez Vega
wrote:
> 1 - Can I change the length (to 4096 bits for example) of private key? or is
> not neccesary, I am a little paranoic with this kind of security cipher.
>
No. WireGuard uses
/blog/2017/9/27/wireguard-future/
> But as "production environment" always means different things for
> different people, perhaps only you can answer this question? What would
> it take for _you_ to be comfortable with it in your network environment?
I second Greg's question
On Tue, Sep 12, 2017 at 10:08 AM, Eric Light wrote:
> For the record, Mullvad are great. I've purchased a subscription there
> as a direct result of their sponsorship of Wireguard. I've also
> recommended it to others. :)
>
Thanks Eric! I'm happy to hear that you like our
Great to hear. Thank you all for your hard work.
Cheers,
Fredrik
On Thu, May 11, 2017 at 10:32 PM, Jason A. Donenfeld wrote:
> Hey lazylist,
>
> Since the last discussion of preshared key mode in WireGuard, we've
> made some substantial progress. Trevor and I have been working
On Tue, Apr 25, 2017 at 12:48 PM, Jamie Stuart wrote:
> Hi,
> I’d like to trial transitioning our VPN system to WireGuard.
> We currently have an Ubuntu server running OpenVPN with many ( > 50) clients
> (running OpenWRT) connecting to it periodically. Clients get addresses
Hi! :)
On Sun, Apr 23, 2017 at 9:05 AM, wrote:
> Forgive me in advance if this is a horrible or misinformed idea, but why
> not blake2s the preshared-key with each peer's public key and distribute
> that as a per-peer "preshared" key, mixing it in last? That
On Sat, Feb 25, 2017 at 3:31 PM, Jason A. Donenfeld wrote:
> Those instructions are very thorough, but they're not as simple as
> they could be. Instead, I'd recommend you use wg-quick, which takes
> care of setting up all the addressing and routing table stuff.
>
Thanks for the
. Sometime
soon we'll install a 10 Gbit card to see where things break first.
Enjoy :)
Cheers,
Fredrik Strömberg
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard
19 matches
Mail list logo