* [WireGuard] Fwd: WireGuard cryptokey routing [not found] ` <CAHmME9qr2H=4Qdzx9Kz4=op-O-yzum0+hJWvazHZ_K7ex05ncQ@mail.gmail.com> @ 2016-07-05 16:34 ` Jason A. Donenfeld 2016-07-05 18:05 ` [WireGuard] " Norman Shulman 1 sibling, 0 replies; 12+ messages in thread From: Jason A. Donenfeld @ 2016-07-05 16:34 UTC (permalink / raw) To: Norman Shulman, WireGuard mailing list [-- Attachment #1: Type: text/plain, Size: 3732 bytes --] Hi Norm, I'm moving this discussion over to the mailing list. Please be sure to keep wireguard@lists.zx2c4.com CC'd in your replies if you'd like a response. Our prior conversation follows below. Regards, Jason Forwarded conversation Subject: WireGuard cryptokey routing ------------------------ From: *Norman Shulman* <norman.shulman@n-dimension.com> Date: Tue, Jul 5, 2016 at 5:58 PM To: team@wireguard.io You state: " In the server configuration, when the network interface wants to send a packet to a peer (a client), it looks at that packet's destination IP and compares it to each peer's list of allowed IPs to see which peer to send it to. ... In other words, when sending packets, the list of allowed IPs behaves as a sort of routing table " But the allowed IPs can be non-routable addresses, so they are not necessarily unique. ---------- From: *Jason A. Donenfeld* <Jason@zx2c4.com> Date: Tue, Jul 5, 2016 at 6:09 PM To: Norman Shulman <norman.shulman@n-dimension.com> Hi Norman, Can you expand what you mean a little bit by "not necessarily unique"? And why that matters? I'm not sure I understand the thrust of your point. Thanks, Jason ---------- From: *Norman Shulman* <norman.shulman@n-dimension.com> Date: Tue, Jul 5, 2016 at 6:14 PM To: "Jason A. Donenfeld" <Jason@zx2c4.com> Hi Jason, Many clients use the non-routable 192.168.0.0/16 addresses. How can looking up such an address identify the client? Thanks. Norm ---------- From: *Jason A. Donenfeld* <Jason@zx2c4.com> Date: Tue, Jul 5, 2016 at 6:19 PM To: Norman Shulman <norman.shulman@n-dimension.com> Hi Norm, I think you're misunderstanding how things work. I'll try to explain a bit more clear here: A linux system has several network interfaces, such as lo, eth0, wlan0, wg0. The ordinary kernel routing table determines which interface to use when sending outgoing packets. So, let's say the kernel routing table is setup to route 192.168.0.0/16 via WireGuard: # ip route add 192.168.0.0/16 dev wg0 or # ip addr add 192.168.0.5/16 dev wg0 Now userspace can send packets that will be handled by the wireguard driver: # ping 192.168.32.19 ... When that ping packet hits the wireguard driver, it has a dst IP of 192.168.32.19. What does wireguard do with it now? It looks in the cryptokey routing table to see if 192.168.32.19 belongs to any peers. If so, it uses that peer's public key to make a secure session and encrypt that ping packet. It then sends it off to the peer's configured external internet endpoint. Does this make more sense? Or is there still something you're wondering about? Regards, Jason ---------- From: *Norman Shulman* <norman.shulman@n-dimension.com> Date: Tue, Jul 5, 2016 at 6:23 PM To: "Jason A. Donenfeld" <Jason@zx2c4.com> Hi Jason, I'm still wondering what wireguard does if more than one peer has the address 192.168.32.19. Thanks. Norm ---------- From: *Jason A. Donenfeld* <Jason@zx2c4.com> Date: Tue, Jul 5, 2016 at 6:30 PM To: Norman Shulman <norman.shulman@n-dimension.com> Hi Norm, If you run these commands: wg set wg0 peer ABCD allowed-ips 192.168.32.19/32 wg set wg0 peer EFGH allowed-ips 192.168.32.19/32 After the first command ABCD has 192.168.32.19/32. After the second command, ABCD has no allowed ips, and EFGH has 192.168.32.19/32. However, if you run these commands: wg set wg0 peer ABCD allowed-ips 192.168.32.0/24 wg set wg0 peer EFGH allowed-ips 192.168.32.19/32 After running both commands, ABCD will have 192.168.32.0/24 and EFGH will have 192.168.32.19/32. However, when sending packets, the routing table lookups will always match on the most specific match, so ABCD will not be able to send or receive packets for 192.168.32.19/32. Make sense? Jason [-- Attachment #2: Type: text/html, Size: 7234 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [WireGuard] WireGuard cryptokey routing [not found] ` <CAHmME9qr2H=4Qdzx9Kz4=op-O-yzum0+hJWvazHZ_K7ex05ncQ@mail.gmail.com> 2016-07-05 16:34 ` [WireGuard] Fwd: WireGuard cryptokey routing Jason A. Donenfeld @ 2016-07-05 18:05 ` Norman Shulman 2016-07-05 19:06 ` Jason A. Donenfeld 1 sibling, 1 reply; 12+ messages in thread From: Norman Shulman @ 2016-07-05 18:05 UTC (permalink / raw) To: Jason A. Donenfeld; +Cc: wireguard [-- Attachment #1: Type: text/plain, Size: 1379 bytes --] Hi Jason, Makes sense, but what if both clients have the same address ( 192.168.32.19/32)? Norm On Tue, Jul 5, 2016 at 12:30 PM, Jason A. Donenfeld <Jason@zx2c4.com> wrote: > Hi Norm, > > If you run these commands: > > wg set wg0 peer ABCD allowed-ips 192.168.32.19/32 > wg set wg0 peer EFGH allowed-ips 192.168.32.19/32 > > After the first command ABCD has 192.168.32.19/32. After the second > command, ABCD has no allowed ips, and EFGH has 192.168.32.19/32. > > However, if you run these commands: > > wg set wg0 peer ABCD allowed-ips 192.168.32.0/24 > wg set wg0 peer EFGH allowed-ips 192.168.32.19/32 > > After running both commands, ABCD will have 192.168.32.0/24 and EFGH > will have 192.168.32.19/32. However, when sending packets, the routing > table lookups will always match on the most specific match, so ABCD > will not be able to send or receive packets for 192.168.32.19/32. > > Make sense? > > Jason > -- Norman Shulman Sr. Developer/Architect N-Dimension Solutions Inc. 9030 Leslie St, Unit 300 Richmond Hill, ON L4B 1G2 Canada Tel: 905 707-8884 x 226 Fax: 905 707-0886 This email and any files transmitted with it are solely intended for the use of the named recipient(s) and may contain information that is privileged and confidential. If you receive this email in error, please immediately notify the sender and delete this message in all its forms. [-- Attachment #2: Type: text/html, Size: 2653 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [WireGuard] WireGuard cryptokey routing 2016-07-05 18:05 ` [WireGuard] " Norman Shulman @ 2016-07-05 19:06 ` Jason A. Donenfeld 2016-07-05 19:09 ` Norman Shulman 0 siblings, 1 reply; 12+ messages in thread From: Jason A. Donenfeld @ 2016-07-05 19:06 UTC (permalink / raw) To: Norman Shulman; +Cc: WireGuard mailing list One peer may have multiple allowed-ips. Several peers may not share the same IP. ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [WireGuard] WireGuard cryptokey routing 2016-07-05 19:06 ` Jason A. Donenfeld @ 2016-07-05 19:09 ` Norman Shulman 2016-07-05 19:11 ` Jason A. Donenfeld 0 siblings, 1 reply; 12+ messages in thread From: Norman Shulman @ 2016-07-05 19:09 UTC (permalink / raw) To: Jason A. Donenfeld; +Cc: WireGuard mailing list [-- Attachment #1: Type: text/plain, Size: 668 bytes --] How is this enforced? How does this scale? On Tue, Jul 5, 2016 at 3:06 PM, Jason A. Donenfeld <Jason@zx2c4.com> wrote: > One peer may have multiple allowed-ips. > > Several peers may not share the same IP. > -- Norman Shulman Sr. Developer/Architect N-Dimension Solutions Inc. 9030 Leslie St, Unit 300 Richmond Hill, ON L4B 1G2 Canada Tel: 905 707-8884 x 226 Fax: 905 707-0886 This email and any files transmitted with it are solely intended for the use of the named recipient(s) and may contain information that is privileged and confidential. If you receive this email in error, please immediately notify the sender and delete this message in all its forms. [-- Attachment #2: Type: text/html, Size: 1096 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [WireGuard] WireGuard cryptokey routing 2016-07-05 19:09 ` Norman Shulman @ 2016-07-05 19:11 ` Jason A. Donenfeld 2016-07-06 15:31 ` Norman Shulman 0 siblings, 1 reply; 12+ messages in thread From: Jason A. Donenfeld @ 2016-07-05 19:11 UTC (permalink / raw) To: Norman Shulman; +Cc: WireGuard mailing list On Tue, Jul 5, 2016 at 9:09 PM, Norman Shulman <norman.shulman@n-dimension.com> wrote: > How is this enforced? Receiving, line 238 here: https://git.zx2c4.com/WireGuard/tree/src/receive.c#n238 Sending, line 112 here: https://git.zx2c4.com/WireGuard/tree/src/device.c#n112 > How does this scale? The same way in which an ethernet network scales? One ethernet device can have multiple IPs, but separate (unbonded) ethernet devices generally do not share IPs. ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [WireGuard] WireGuard cryptokey routing 2016-07-05 19:11 ` Jason A. Donenfeld @ 2016-07-06 15:31 ` Norman Shulman 2016-07-06 15:37 ` Jason A. Donenfeld 2016-07-06 15:48 ` Baptiste Jonglez 0 siblings, 2 replies; 12+ messages in thread From: Norman Shulman @ 2016-07-06 15:31 UTC (permalink / raw) To: Jason A. Donenfeld; +Cc: WireGuard mailing list [-- Attachment #1: Type: text/plain, Size: 1288 bytes --] Ethernet networks don't scale; that's why we have IP networks. So in general a client needs one address for each server? Rather limiting for clients on small subnets, especially considering the case of n clients on a subnet, each connecting to m different servers. On Tue, Jul 5, 2016 at 3:11 PM, Jason A. Donenfeld <Jason@zx2c4.com> wrote: > On Tue, Jul 5, 2016 at 9:09 PM, Norman Shulman > <norman.shulman@n-dimension.com> wrote: > > How is this enforced? > Receiving, line 238 here: > https://git.zx2c4.com/WireGuard/tree/src/receive.c#n238 > Sending, line 112 here: > https://git.zx2c4.com/WireGuard/tree/src/device.c#n112 > > > How does this scale? > The same way in which an ethernet network scales? One ethernet device > can have multiple IPs, but separate (unbonded) ethernet devices > generally do not share IPs. > -- Norman Shulman Sr. Developer/Architect N-Dimension Solutions Inc. 9030 Leslie St, Unit 300 Richmond Hill, ON L4B 1G2 Canada Tel: 905 707-8884 x 226 Fax: 905 707-0886 This email and any files transmitted with it are solely intended for the use of the named recipient(s) and may contain information that is privileged and confidential. If you receive this email in error, please immediately notify the sender and delete this message in all its forms. [-- Attachment #2: Type: text/html, Size: 2086 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [WireGuard] WireGuard cryptokey routing 2016-07-06 15:31 ` Norman Shulman @ 2016-07-06 15:37 ` Jason A. Donenfeld 2016-07-06 15:48 ` Baptiste Jonglez 1 sibling, 0 replies; 12+ messages in thread From: Jason A. Donenfeld @ 2016-07-06 15:37 UTC (permalink / raw) To: Norman Shulman; +Cc: WireGuard mailing list [-- Attachment #1: Type: text/plain, Size: 1583 bytes --] Hey Norman, I'm not sure I follow here. Could you maybe describe a concrete example of what your concern is, with as much detail as possible? Jason On Jul 6, 2016 5:31 PM, "Norman Shulman" <norman.shulman@n-dimension.com> wrote: > Ethernet networks don't scale; that's why we have IP networks. > > So in general a client needs one address for each server? Rather limiting > for clients on small subnets, especially considering the case of n clients > on a subnet, each connecting to m different servers. > > > > > On Tue, Jul 5, 2016 at 3:11 PM, Jason A. Donenfeld <Jason@zx2c4.com> > wrote: > >> On Tue, Jul 5, 2016 at 9:09 PM, Norman Shulman >> <norman.shulman@n-dimension.com> wrote: >> > How is this enforced? >> Receiving, line 238 here: >> https://git.zx2c4.com/WireGuard/tree/src/receive.c#n238 >> Sending, line 112 here: >> https://git.zx2c4.com/WireGuard/tree/src/device.c#n112 >> >> > How does this scale? >> The same way in which an ethernet network scales? One ethernet device >> can have multiple IPs, but separate (unbonded) ethernet devices >> generally do not share IPs. >> > > > > -- > Norman Shulman > Sr. Developer/Architect > N-Dimension Solutions Inc. > 9030 Leslie St, Unit 300 > Richmond Hill, ON L4B 1G2 > Canada > > Tel: 905 707-8884 x 226 > Fax: 905 707-0886 > > This email and any files transmitted with it are solely intended for the > use of the named recipient(s) and may contain information that is > privileged and confidential. If you receive this email in error, please > immediately notify the sender and delete this message in all its forms. > [-- Attachment #2: Type: text/html, Size: 2753 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [WireGuard] WireGuard cryptokey routing 2016-07-06 15:31 ` Norman Shulman 2016-07-06 15:37 ` Jason A. Donenfeld @ 2016-07-06 15:48 ` Baptiste Jonglez 2016-07-07 16:15 ` Norman Shulman 1 sibling, 1 reply; 12+ messages in thread From: Baptiste Jonglez @ 2016-07-06 15:48 UTC (permalink / raw) To: Norman Shulman; +Cc: WireGuard mailing list [-- Attachment #1: Type: text/plain, Size: 2050 bytes --] On Wed, Jul 06, 2016 at 11:31:28AM -0400, Norman Shulman wrote: > Ethernet networks don't scale; that's why we have IP networks. Wireguard does not use Ethernet at all, it operates purely at layer 3 (IP). IP over Ethernet would use a reactive scheme (ARP, Neighbour Discovery) to discover the mapping between IP addresses and link-layer addresses. This is part of the reason why Ethernet does not scale well. Wireguard, on the other hand, does the equivalent mapping statically, via the AllowedIPs directive. The mapping is also slightly different: - with Ethernet, you map from IP address to MAC address (using ARP or ND) - Wireguard maps from IP address to public key (using AllowedIP, so this is completely static). A public key is then mapped to the IP address and UDP port of the peer on the Internet, using the last known endpoint of the peer. This makes this second mapping mostly dynamic, even though it falls back to a static "Endpoint" configuration for bootstrap. Does that make things clearer for you? > So in general a client needs one address for each server? Rather limiting > for clients on small subnets, especially considering the case of n clients > on a subnet, each connecting to m different servers. > > > > > On Tue, Jul 5, 2016 at 3:11 PM, Jason A. Donenfeld <Jason@zx2c4.com> wrote: > > > On Tue, Jul 5, 2016 at 9:09 PM, Norman Shulman > > <norman.shulman@n-dimension.com> wrote: > > > How is this enforced? > > Receiving, line 238 here: > > https://git.zx2c4.com/WireGuard/tree/src/receive.c#n238 > > Sending, line 112 here: > > https://git.zx2c4.com/WireGuard/tree/src/device.c#n112 > > > > > How does this scale? > > The same way in which an ethernet network scales? One ethernet device > > can have multiple IPs, but separate (unbonded) ethernet devices > > generally do not share IPs. > > > _______________________________________________ > WireGuard mailing list > WireGuard@lists.zx2c4.com > http://lists.zx2c4.com/mailman/listinfo/wireguard [-- Attachment #2: signature.asc --] [-- Type: application/pgp-signature, Size: 819 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [WireGuard] WireGuard cryptokey routing 2016-07-06 15:48 ` Baptiste Jonglez @ 2016-07-07 16:15 ` Norman Shulman 2016-07-07 16:18 ` Jason A. Donenfeld 0 siblings, 1 reply; 12+ messages in thread From: Norman Shulman @ 2016-07-07 16:15 UTC (permalink / raw) To: Jason A. Donenfeld; +Cc: WireGuard mailing list [-- Attachment #1: Type: text/plain, Size: 2803 bytes --] Look at it from the server side. There are millions of clients on millions of 192.168.1.0/24 networks, yet a server can communicate with no more than 254 of them. On Wed, Jul 6, 2016 at 11:48 AM, Baptiste Jonglez < baptiste@bitsofnetworks.org> wrote: > On Wed, Jul 06, 2016 at 11:31:28AM -0400, Norman Shulman wrote: > > Ethernet networks don't scale; that's why we have IP networks. > > Wireguard does not use Ethernet at all, it operates purely at layer 3 (IP). > > IP over Ethernet would use a reactive scheme (ARP, Neighbour Discovery) to > discover the mapping between IP addresses and link-layer addresses. This > is part of the reason why Ethernet does not scale well. > > Wireguard, on the other hand, does the equivalent mapping statically, via > the AllowedIPs directive. The mapping is also slightly different: > > - with Ethernet, you map from IP address to MAC address (using ARP or ND) > > - Wireguard maps from IP address to public key (using AllowedIP, so this > is completely static). A public key is then mapped to the IP address > and UDP port of the peer on the Internet, using the last known endpoint > of the peer. This makes this second mapping mostly dynamic, even though > it falls back to a static "Endpoint" configuration for bootstrap. > > Does that make things clearer for you? > > > So in general a client needs one address for each server? Rather limiting > > for clients on small subnets, especially considering the case of n > clients > > on a subnet, each connecting to m different servers. > > > > > > > > > > On Tue, Jul 5, 2016 at 3:11 PM, Jason A. Donenfeld <Jason@zx2c4.com> > wrote: > > > > > On Tue, Jul 5, 2016 at 9:09 PM, Norman Shulman > > > <norman.shulman@n-dimension.com> wrote: > > > > How is this enforced? > > > Receiving, line 238 here: > > > https://git.zx2c4.com/WireGuard/tree/src/receive.c#n238 > > > Sending, line 112 here: > > > https://git.zx2c4.com/WireGuard/tree/src/device.c#n112 > > > > > > > How does this scale? > > > The same way in which an ethernet network scales? One ethernet device > > > can have multiple IPs, but separate (unbonded) ethernet devices > > > generally do not share IPs. > > > > > > _______________________________________________ > > WireGuard mailing list > > WireGuard@lists.zx2c4.com > > http://lists.zx2c4.com/mailman/listinfo/wireguard > > -- Norman Shulman Sr. Developer/Architect N-Dimension Solutions Inc. 9030 Leslie St, Unit 300 Richmond Hill, ON L4B 1G2 Canada Tel: 905 707-8884 x 226 Fax: 905 707-0886 This email and any files transmitted with it are solely intended for the use of the named recipient(s) and may contain information that is privileged and confidential. If you receive this email in error, please immediately notify the sender and delete this message in all its forms. [-- Attachment #2: Type: text/html, Size: 4084 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [WireGuard] WireGuard cryptokey routing 2016-07-07 16:15 ` Norman Shulman @ 2016-07-07 16:18 ` Jason A. Donenfeld 2016-07-14 21:16 ` Norman Shulman 0 siblings, 1 reply; 12+ messages in thread From: Jason A. Donenfeld @ 2016-07-07 16:18 UTC (permalink / raw) To: Norman Shulman; +Cc: WireGuard mailing list On Thu, Jul 7, 2016 at 6:15 PM, Norman Shulman <norman.shulman@n-dimension.com> wrote: > Look at it from the server side. There are millions of clients on millions > of 192.168.1.0/24 networks, yet a server can communicate with no more than > 254 of them. Voila, this is where you are most certainly mistaken. While a client might have 192.168.1.8 as their IP address for eth0, their IP address for wg0 can be something completely different. Want a million clients? Use a /20 as your wireguard device inner IP. Anyway, why don't you tell us all what you actually want to do, rather than these meandering theoretical questions? Then maybe we can help you effectively. ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [WireGuard] WireGuard cryptokey routing 2016-07-07 16:18 ` Jason A. Donenfeld @ 2016-07-14 21:16 ` Norman Shulman 2016-07-15 11:51 ` Jason A. Donenfeld 0 siblings, 1 reply; 12+ messages in thread From: Norman Shulman @ 2016-07-14 21:16 UTC (permalink / raw) To: Jason A. Donenfeld; +Cc: WireGuard mailing list [-- Attachment #1: Type: text/plain, Size: 1527 bytes --] Hi Jason, Sorry if this sounds too theoretical. I'm just trying to understand the cryptokey routing well enough to determine if it's suitable for our use. The main problem I have is understanding how you can base routing on non-routable addresses, which are not unique. Thanks. Norm On Thu, Jul 7, 2016 at 12:18 PM, Jason A. Donenfeld <Jason@zx2c4.com> wrote: > On Thu, Jul 7, 2016 at 6:15 PM, Norman Shulman > <norman.shulman@n-dimension.com> wrote: > > Look at it from the server side. There are millions of clients on > millions > > of 192.168.1.0/24 networks, yet a server can communicate with no more > than > > 254 of them. > > Voila, this is where you are most certainly mistaken. > > While a client might have 192.168.1.8 as their IP address for eth0, > their IP address for wg0 can be something completely different. Want a > million clients? Use a /20 as your wireguard device inner IP. > > Anyway, why don't you tell us all what you actually want to do, rather > than these meandering theoretical questions? Then maybe we can help > you effectively. > -- Norman Shulman Sr. Developer/Architect N-Dimension Solutions Inc. 9030 Leslie St, Unit 300 Richmond Hill, ON L4B 1G2 Canada Tel: 905 707-8884 x 226 Fax: 905 707-0886 This email and any files transmitted with it are solely intended for the use of the named recipient(s) and may contain information that is privileged and confidential. If you receive this email in error, please immediately notify the sender and delete this message in all its forms. [-- Attachment #2: Type: text/html, Size: 2245 bytes --] ^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: [WireGuard] WireGuard cryptokey routing 2016-07-14 21:16 ` Norman Shulman @ 2016-07-15 11:51 ` Jason A. Donenfeld 0 siblings, 0 replies; 12+ messages in thread From: Jason A. Donenfeld @ 2016-07-15 11:51 UTC (permalink / raw) To: Norman Shulman; +Cc: WireGuard mailing list On Thu, Jul 14, 2016 at 11:16 PM, Norman Shulman <norman.shulman@n-dimension.com> wrote: > Sorry if this sounds too theoretical. I'm just trying to understand the > cryptokey routing well enough to determine if it's suitable for our use. The > main problem I have is understanding how you can base routing on > non-routable addresses, which are not unique. I don't think it's productive for either of us for me to continue answering questions posed in this form. How about instead you write down an example network layout ("Subnet A is 10.2.3.0/24, Subnet B is...") and then present a problem you'd like to solve with WireGuard but are having trouble figuring out how. ^ permalink raw reply [flat|nested] 12+ messages in thread
end of thread, other threads:[~2016-07-15 11:50 UTC | newest] Thread overview: 12+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- [not found] <CANQAqMXqQv_MkEsLSuSHNVqHGJuy6yVHhVP4mM6v3x+5iVbVqA@mail.gmail.com> [not found] ` <CAHmME9rXYm3yV0j5pW3yH59j-C9S=6X8-6OY+b=dkuRq7Vpzvw@mail.gmail.com> [not found] ` <CANQAqMX8Bf9taS+VgRYnGwuOoJcG3PL8PNmyOK66O3pHjP6VBw@mail.gmail.com> [not found] ` <CAHmME9rRHgEtsJ8F-4UrzZMwOs43T24Jq+mUHO91-oimQXXjwg@mail.gmail.com> [not found] ` <CANQAqMV=QeCG9BPvPpaCAu56a+mNi_7sNvhDL=_i4N7WFY1=Ng@mail.gmail.com> [not found] ` <CAHmME9qr2H=4Qdzx9Kz4=op-O-yzum0+hJWvazHZ_K7ex05ncQ@mail.gmail.com> 2016-07-05 16:34 ` [WireGuard] Fwd: WireGuard cryptokey routing Jason A. Donenfeld 2016-07-05 18:05 ` [WireGuard] " Norman Shulman 2016-07-05 19:06 ` Jason A. Donenfeld 2016-07-05 19:09 ` Norman Shulman 2016-07-05 19:11 ` Jason A. Donenfeld 2016-07-06 15:31 ` Norman Shulman 2016-07-06 15:37 ` Jason A. Donenfeld 2016-07-06 15:48 ` Baptiste Jonglez 2016-07-07 16:15 ` Norman Shulman 2016-07-07 16:18 ` Jason A. Donenfeld 2016-07-14 21:16 ` Norman Shulman 2016-07-15 11:51 ` Jason A. Donenfeld
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.