On 18.06.2018 14:08, Vivien Malerba wrote: > However, for any organization which will use WireGuard, even if admins > are very effective at applying updates, updating all the endpoint > systems simultaneously is not realistic. At the same time, it may be > the case that the organization can't afford the downtime, in which > case using WireGuard will simply not be an option, which is too bad. Fixing any crypto weakness will require kernel updates and configuration changes. A very easy config change, compared to all the other work you'd have to do if a flaw is discovered that forces a different crypto algorithm, is "use a second WG instance with a different UDP port". A script that monitors connections to the new WG instance and auto-disables the associated peer keys in the old instance is easy enough to write. Problem solved, no downgrade attack possible. -- -- Matthias Urlichs