[WireGuard] auth-only wireguard

Jason A. Donenfeld Jason at zx2c4.com
Thu Oct 6 19:35:48 CEST 2016

On Thu, Oct 6, 2016 at 6:34 PM, Jehan Tremback <jehan at altheamesh.com> wrote:
> Let me be more specific about my application. I'm trying to create a
> system where routers in a "mesh" network (mixed ad-hoc wifi and
> ethernet) pay their neighbors, or are paid by their neighbors for
> bandwidth. To make this happen, I've got to be able to identify traffic
> from specific neighbors with something less spoofable than MAC
> addresses. Creating tunnels between neighbors fits the bill for now, and
> gives me a good handle to apply traffic shaping to different neighbors.
> The encapsulating tunnel packet will have the source IP address of the
> previous hop neighbor, and will be sent to the next hop neighbor, and
> can be prioritized . Authentication keeps anyone from spoofing addresses
> and stealing bandwidth.

And encryption keeps various neighbors traffic hidden from passive
eavesdroppers. Do your customers a service; encrypt their traffic
wherever possible.

> Anyway, I'm experimenting with fastd right now, and it's working, but
> WireGuard seems like a very nicely designed and executed piece of
> software so I thought I'd ask. I understand that WireGuard is designed
> to be very focused on a traditional VPN server usecase, so more
> configurability may not be something you want to support.

WireGuard isn't very focused on any particular use case. It certainly
aims to be something directly applicable for what you have in mind.
Recently we've been talking with a large community run ISP that
extends across Germany that does some interesting and complicated mesh
networking to bring affordable internet everywhere. They're currently
using fastd, too, but I believe are in a transition to WireGuard,
because the performance is substantially better than fastd.

>> Without encryption you authentication won't be useful against attackers
>> that can modify packets or insert packets with the source address of your
>> contact.
> Isn't this exactly what authentication prevents? If the signature does
> not match the sender and the packet content, it will fail authentication
> by definition, at least by any definition of authentication that I am
> familiar with.

I was confused by Bruno's statement too with more or less your exact
same reaction.

More information about the WireGuard mailing list