Virtual private networks with WireGuard
Virtual private networks with WireGuard
Posted Mar 6, 2018 19:03 UTC (Tue) by Cyberax (✭ supporter ✭, #52523)Parent article: Virtual private networks with WireGuard
The userspace key agreement protocol (IKE) is another story, but you don't have to use it, ipsec actually has a standardized cross-platform API to manage the kernel-level keys.
Posted Mar 7, 2018 2:18 UTC (Wed)
by amworsley (subscriber, #82049)
[Link] (6 responses)
I am not aware of how it handles replay and denial of service attacks but hopefully when it is merged in there will be many chances to check for these and other issues.
Also if it is 4000 lines to implement it would be hard to add it to other platforms.
Posted Mar 7, 2018 14:12 UTC (Wed)
by bavay (subscriber, #60804)
[Link] (3 responses)
Mathias
Posted Mar 7, 2018 14:45 UTC (Wed)
by smurf (subscriber, #17840)
[Link]
I've been using it for months on my office VPN. Zero problems, it's a breeze to set up compared to OpenVPN (and much faster).
Posted Mar 10, 2018 0:20 UTC (Sat)
by coolhandluke (guest, #114151)
[Link] (1 responses)
This ensures that traffic will not be sent out if the VPN link dies for any reason.
Whether or not this approach is an acceptable solution for you obviously depends on your specific requirements.
Posted Mar 12, 2018 22:46 UTC (Mon)
by james (subscriber, #1325)
[Link]
Those routes to the VPN concentrators are the only routes over the WAN link(s): even without a firewall, the router won't know which way to send packets to the Internet until the VPN is up. Then routing protocols (configured to talk to the internal addresses of the VPN concentrators) can add more routes.
Posted Mar 7, 2018 14:57 UTC (Wed)
by smurf (subscriber, #17840)
[Link] (1 responses)
Android will get a userspace implementation.
Posted Mar 8, 2018 5:37 UTC (Thu)
by thestinger (guest, #91827)
[Link]
Virtual private networks with WireGuard
Another additional design features is that it has very few options and deliberately selected modern algorithms likely to be secure for much time in the future. Greatly reducing the chance of insecurity through mis-configuration versus ipsec.
Finally once a secure tunnel is set up the remote end can change IP as the public key is used to verify any new IP address automatically - removing another "brittleness" where transport network changes can kill the connectivity.
Presumably if it is popular Android phones could start using fairly quickly.
It would be interesting to know how it would handle the China's great firewall.
Virtual private networks with WireGuard
PS: Yes, the data transfer itself is also encrypted, but better safe than sorry and encapsulate it within a VPN alongside masses of uninteresting data
Virtual private networks with WireGuard
Virtual private networks with WireGuard
I've seen people go one stage further and configure the router without a default gateway, just with routes to the public IP addresses of the VPN concentrators.Virtual private networks with WireGuard
Virtual private networks with WireGuard
Virtual private networks with WireGuard