[WireGuard] Options to obfuscate WireGuard traffic?
Jason A. Donenfeld
Jason at zx2c4.com
Fri Jul 8 12:29:10 CEST 2016
On Fri, Jul 8, 2016 at 12:26 PM, Jason A. Donenfeld <Jason at zx2c4.com> wrote:
>
> a) The first byte, which is a fixed `type` value.
> b) The fact that `mac2` is most often all zeros.
> c) The fixed length of handshake messages.
> d) The unencrypted ephemeral public key.
How could I forget?
e) Incremental nonce.
This system would clearly need to be replaced by random IVs -- using
something like xchacha20. Inside then would be an encrypted sequence
number to prevent replay attack.
More information about the WireGuard
mailing list