Edge Security

589 posts

Edge Security banner
Edge Security

Edge Security

@EdgeSecurity

Tweets from @zx2c4. Security Research & Consulting. Support WireGuard development via https://t.co/x6Y8S0VFRw https://t.co/dodHzVeb15 . Or hire us.

انضم Ocak 2015
123 يتبع3.3K المتابعون
Edge Security
Edge Security@EdgeSecurity·
All sorted now. WireGuardNT 0.11 will be released soon, with a new WireGuard for Windows out after some testing. Thank you to @shanselman for helping.
Edge Security@EdgeSecurity

WireGuard has some big updates ready to go on Windows, our first on the platform in nearly 4 years. We've done some nice modernizations and improvements, fixed bugs, added features, updated the toolchain, and more. But our release is currently blocked by @Microsoft. The recent thread on Hacker News encouraged me to write this up, rather than just grumbling to myself privately about it as I have the last two weeks. I logged in to get the WireGuardNT driver signed -- a necessary step for driver authors -- and was greeted by this vague message that the account has been suspended. Looking further into it, it seems like they instituted an identity verification policy, didn't notify me about it, and then I guess they suspended accounts who didn't do the verification. So of course I did the ID card verification immediately, but now an appeal is necessary. The appeals process requires filing a support ticket, but filing a support ticket requires a non-suspended account... Catch-22, eventually resolved by filing one through Azure and getting it rerouted to the right department. That was two weeks ago. Now they've told me there's a 60 day appeal review period. Wish us luck! It's a little crazy, because what if there was some critical ring 0 RCE vuln that was being exploited in the wild and that needed to be patched immediately? (Just hypothetical; there isn't.) In that case, telling users "sorry, you've got to wait 60 days" would be sort of bad. And users of WireGuard for Windows are also Microsoft Windows users, so I can't see how this is good for Microsoft either. I think it must just be a case of bureaucracy gone slightly off the rails. Happens. If any Microsofters are able to make this take not-sixty-days, please do get in touch.

English
0
10
45
2.3K
Edge Security
Edge Security@EdgeSecurity·
WireGuard has some big updates ready to go on Windows, our first on the platform in nearly 4 years. We've done some nice modernizations and improvements, fixed bugs, added features, updated the toolchain, and more. But our release is currently blocked by @Microsoft. The recent thread on Hacker News encouraged me to write this up, rather than just grumbling to myself privately about it as I have the last two weeks. I logged in to get the WireGuardNT driver signed -- a necessary step for driver authors -- and was greeted by this vague message that the account has been suspended. Looking further into it, it seems like they instituted an identity verification policy, didn't notify me about it, and then I guess they suspended accounts who didn't do the verification. So of course I did the ID card verification immediately, but now an appeal is necessary. The appeals process requires filing a support ticket, but filing a support ticket requires a non-suspended account... Catch-22, eventually resolved by filing one through Azure and getting it rerouted to the right department. That was two weeks ago. Now they've told me there's a 60 day appeal review period. Wish us luck! It's a little crazy, because what if there was some critical ring 0 RCE vuln that was being exploited in the wild and that needed to be patched immediately? (Just hypothetical; there isn't.) In that case, telling users "sorry, you've got to wait 60 days" would be sort of bad. And users of WireGuard for Windows are also Microsoft Windows users, so I can't see how this is good for Microsoft either. I think it must just be a case of bureaucracy gone slightly off the rails. Happens. If any Microsofters are able to make this take not-sixty-days, please do get in touch.
Edge Security tweet media
English
50
224
1.3K
75.7K
Edge Security
Edge Security@EdgeSecurity·
vDSO getrandom() objective complete!
Edge Security tweet media
English
1
2
11
1K
Edge Security
Edge Security@EdgeSecurity·
RT @veorq: this is the official code of a major HSM vendor used for verify key attestations (what's wrong left as an exercise) https://t.co…
English
0
1
0
112
Edge Security
Edge Security@EdgeSecurity·
vDSO getrandom() has now been ported to arm64, powerpc64, powerpc32, s390x, and loongarch64, in addition to the prior x86_64 port: @zx2c4.com/" target="_blank" rel="nofollow noopener">lore.kernel.org/all/2024091612…
English
0
0
3
440
Edge Security
Edge Security@EdgeSecurity·
Direct APK downloads for WireGuard for Android are now available: @zx2c4.com/" target="_blank" rel="nofollow noopener">lore.kernel.org/wireguard/ZGIo…
Edge Security tweet media
English
0
1
11
1.5K
Edge Security
Edge Security@EdgeSecurity·
Dunno if this will prove acceptable, but I automated adding it to all of the reproducibly built packages: gitlab.com/fdroid/fdroidd… Maybe an okay way to bootstrap that process? And then make it mandatory going forward.
English
2
0
0
180
Edge Security
Edge Security@EdgeSecurity·
WireGuard is the first reproducible build package on F-Droid that has a fully verified signature path. The WireGuard Project builds WireGuard from source, and then signs the resultant APK with a private key stored in an HSM. F-Droid’s build server downloads that source and does the same build process. Then, F-Droid downloads the APK that the WireGuard Project built, makes sure it matches the APK that it build itself, and then, critically, *makes sure that the APK is signed with the WireGuard Project’s HSM-resident signing key.* Other reproducible packages on F-Droid don’t have this final signature checking step, which means there’s a problem if the upstream developer's git repo and download server are serving up malicious source and binaries, two things that often live on the same server or GitHub account. (And F-Droid doesn’t have the ability to check git tag signatures.) So, barring other issues, the APK that F-Droid puts on their server for users to download is verified to be the same one from the WireGuard Project built. A nice consequence of this week’s Android reproducible builds announcement: x.com/edgesecurity/s…
Edge Security tweet media
English
1
3
26
3.3K
Edge Security
Edge Security@EdgeSecurity·
WireGuard for Android now builds reproducibly, and both Google Play Store and F-Droid now distribute packages using the same signing key. [Note, though, that F-Droid users need to uninstall & reinstall the app.] Announcement email: lists.zx2c4.com/pipermail/wire…
Edge Security tweet mediaEdge Security tweet media
English
1
4
22
3K