[ANNOUNCE] WireGuard Snapshot `0.0.20180802` Available
Jason A. Donenfeld
Jason at zx2c4.com
Fri Aug 3 05:28:31 CEST 2018
-----BEGIN PGP SIGNED MESSAGE-----
A new snapshot, `0.0.20180802`, has been tagged in the git repository.
Please note that this snapshot is, like the rest of the project at this point
in time, experimental, and does not consitute a real release that would be
considered secure and bug-free. WireGuard is generally thought to be fairly
stable, and most likely will not crash your computer (though it may).
However, as this is a pre-release snapshot, it comes with no guarantees, and
its security is not yet to be depended on; it is not applicable for CVEs.
With all that said, if you'd like to test this snapshot out, there are a
few relevent changes.
== Changes ==
* chacha20poly1305: selftest: split up test vector constants
The test vectors are encoded as long strings -- really long strings -- and
apparently RFC821 doesn't like lines longer than 998.
* queueing: keep reference to peer after setting atomic state bit
This fixes a regression introduced when preparing the LKML submission.
* allowedips: prevent double read in kref
* allowedips: avoid window of disappeared peer
* hashtables: document immediate zeroing semantics
* peer: ensure resources are freed when creation fails
* queueing: document double-adding and reference conditions
* queueing: ensure strictly ordered loads and stores
* cookie: returned keypair might disappear if rcu lock not held
* noise: free peer references on failure
* peer: ensure destruction doesn't race
Various fixes, as well as lots of code comment documentation, for a
small variety of the less obvious aspects of object lifecycles,
focused on correctness.
* allowedips: free root inside of RCU callback
* allowedips: use different macro names so as to avoid confusion
These incorporate two suggestions from LKML.
This snapshot contains commits from: Jason A. Donenfeld and Jann Horn.
As always, the source is available at https://git.zx2c4.com/WireGuard/ and
information about the project is available at https://www.wireguard.com/ .
This snapshot is available in compressed tarball form here:
A PGP signature of that file decompressed is available here:
Signing key: AB9942E6D4A4CFC3412620A749FC7012A5DE03AE
If you're a snapshot package maintainer, please bump your package version. If
you're a user, the WireGuard team welcomes any and all feedback on this latest
Finally, WireGuard development thrives on donations. By popular demand, we
have a webpage for this: https://www.wireguard.com/donations/
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----
More information about the WireGuard