[ANNOUNCE] WireGuard Snapshot `0.0.20180802` Available

Jason A. Donenfeld Jason at zx2c4.com
Fri Aug 3 05:28:31 CEST 2018


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hello,

A new snapshot, `0.0.20180802`, has been tagged in the git repository.

Please note that this snapshot is, like the rest of the project at this point
in time, experimental, and does not consitute a real release that would be
considered secure and bug-free. WireGuard is generally thought to be fairly
stable, and most likely will not crash your computer (though it may).
However, as this is a pre-release snapshot, it comes with no guarantees, and
its security is not yet to be depended on; it is not applicable for CVEs.

With all that said, if you'd like to test this snapshot out, there are a
few relevent changes.

== Changes ==

  * chacha20poly1305: selftest: split up test vector constants
  
  The test vectors are encoded as long strings -- really long strings -- and
  apparently RFC821 doesn't like lines longer than 998.
  https://cr.yp.to/smtp/message.html
  
  * queueing: keep reference to peer after setting atomic state bit
  
  This fixes a regression introduced when preparing the LKML submission.
  
  * allowedips: prevent double read in kref
  * allowedips: avoid window of disappeared peer
  * hashtables: document immediate zeroing semantics
  * peer: ensure resources are freed when creation fails
  * queueing: document double-adding and reference conditions
  * queueing: ensure strictly ordered loads and stores
  * cookie: returned keypair might disappear if rcu lock not held
  * noise: free peer references on failure
  * peer: ensure destruction doesn't race
  
  Various fixes, as well as lots of code comment documentation, for a
  small variety of the less obvious aspects of object lifecycles,
  focused on correctness.
  
  * allowedips: free root inside of RCU callback
  * allowedips: use different macro names so as to avoid confusion
  
  These incorporate two suggestions from LKML.

This snapshot contains commits from: Jason A. Donenfeld and Jann Horn.

As always, the source is available at https://git.zx2c4.com/WireGuard/ and
information about the project is available at https://www.wireguard.com/ .

This snapshot is available in compressed tarball form here:
  https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20180802.tar.xz
  SHA2-256: cd1da34b377d58df760aadf69ced045081517570586fc2d4eed7f09f5d5a47c6
  BLAKE2b-256: ff233c4193d28793b3352813b667b5173d25fbf08a2fa1836b1556628fe46749

A PGP signature of that file decompressed is available here:
  https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20180802.tar.asc
  Signing key: AB9942E6D4A4CFC3412620A749FC7012A5DE03AE

If you're a snapshot package maintainer, please bump your package version. If
you're a user, the WireGuard team welcomes any and all feedback on this latest
snapshot.

Finally, WireGuard development thrives on donations. By popular demand, we
have a webpage for this: https://www.wireguard.com/donations/

Thank you,
Jason Donenfeld


-----BEGIN PGP SIGNATURE-----
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=AvEO
-----END PGP SIGNATURE-----


More information about the WireGuard mailing list