[ANNOUNCE] WireGuard Snapshot `0.0.20180718` Available

Jason A. Donenfeld Jason at zx2c4.com
Wed Jul 18 21:37:19 CEST 2018


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Hello,

A new snapshot, `0.0.20180718`, has been tagged in the git repository.

Please note that this snapshot is, like the rest of the project at this point
in time, experimental, and does not consitute a real release that would be
considered secure and bug-free. WireGuard is generally thought to be fairly
stable, and most likely will not crash your computer (though it may).
However, as this is a pre-release snapshot, it comes with no guarantees, and
its security is not yet to be depended on; it is not applicable for CVEs.

With all that said, if you'd like to test this snapshot out, there are a
few relevent changes.

== Changes ==

  * tools: only error on wg show if all interfaces fail
  
  wg(8) now has a more reasonable error code semantic.
  
  * receive: account for zero or negative budget
  
  A correctness fix that no other drivers implement but that we really should
  be doing anyway.
  
  * recieve: disable NAPI busy polling
  
  This avoids adding one reference per peer to the napi_hash hashtable, as
  normally done by netif_napi_add(). Since we potentially could have up to
  2^20 peers this would make busy polling very slow globally. This approach is
  preferable to having only a single napi struct because we get one gro_list
  per peer, which means packets can be combined nicely even if we have a large
  number of peers. This is also done by gro_cells_init() in net/core/gro_cells.c.
  
  * receive: use gro call instead of plain call
  
  This enables incredible performance improvements in some cases. Benchmark and
  see for yourself. It should affect large TCP flows.
  
  * wg-quick: allow link local default gateway
  
  IPv6 endpoints will now work better on BSD and Darwin.
  
  * device: destroy workqueue before freeing queue
  
  Another small correctness fix.

This snapshot contains commits from: Jason A. Donenfeld and Thomas 
Gschwantner.

As always, the source is available at https://git.zx2c4.com/WireGuard/ and
information about the project is available at https://www.wireguard.com/ .

This snapshot is available in compressed tarball form here:
  https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20180718.tar.xz
  SHA2-256: 083c093a6948c8d38f92e7ea5533f9ff926019f24dc2612ea974851ed3e24705
  BLAKE2b-256: a716e4de536e7fa572ad84d038fb70063c32c93317f3cf053ef879d0ae4ebf06

A PGP signature of that file decompressed is available here:
  https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20180718.tar.asc
  Signing key: AB9942E6D4A4CFC3412620A749FC7012A5DE03AE

If you're a snapshot package maintainer, please bump your package version. If
you're a user, the WireGuard team welcomes any and all feedback on this latest
snapshot.

Finally, WireGuard development thrives on donations. By popular demand, we
have a webpage for this: https://www.wireguard.com/donations/

Thank you,
Jason Donenfeld


-----BEGIN PGP SIGNATURE-----
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=RQvN
-----END PGP SIGNATURE-----


More information about the WireGuard mailing list