[ANNOUNCE] WireGuard Snapshot `0.0.20181018` Available
Jason A. Donenfeld
Jason at zx2c4.com
Thu Oct 18 02:37:41 CEST 2018
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hello,
A new snapshot, `0.0.20181018`, has been tagged in the git repository.
Please note that this snapshot is, like the rest of the project at this point
in time, experimental, and does not consitute a real release that would be
considered secure and bug-free. WireGuard is generally thought to be fairly
stable, and most likely will not crash your computer (though it may).
However, as this is a pre-release snapshot, it comes with no guarantees, and
its security is not yet to be depended on; it is not applicable for CVEs.
With all that said, if you'd like to test this snapshot out, there are a
few relevant changes.
== Changes ==
* compat: don't output for grep errors
* compat: look in Kbuild and Makefile since they differ based on arch
* create-patch: blacklist instead of whitelist
This should solve the last of the compat issues introduced with the revamped
build system and upstream changes.
* qemu: kill after 20 minutes
Our test suite now accounts for hangs.
* global: prefix functions used in callbacks with wg_
* global: rename struct wireguard_ to struct wg_
* global: more nits
* timers: avoid using control statements in macro
* allowedips: remove control statement from macro by rewriting
* device: use textual error labels always
* global: give if statements brackets and other cleanups
* main: change module description
* main: get rid of unloaded debug message
Stylistic cleanups from upstream.
* netlink: do not stuff index into nla type
It's not used for anything, and LKML doesn't like the type being used as an
index value. Technically this changes UAPI, but in practice nobody used this,
and if they did use it for anything, that thing was probably broken anyway.
* allowedips: swap endianness early on
Otherwise if gcc's optimizer is able to look far in but not overly far
in, we wind up with "warning: 'key' may be used uninitialized in this
function [-Wmaybe-uninitialized]".
* tools: use libc's endianness macro if no compiler macro
* tools: compile on gnu99
This lets us be compiled with ancient gcc.
* tools: don't fail if a netlink interface dump is inconsistent
Netlink returns NLM_F_DUMP_INTR if the set of all tunnels changed
during the dump. That's unfortunate, but is pretty common on busy
systems that are adding and removing tunnels all the time. Rather
than retrying, potentially indefinitely, we just work with the
partial results.
* tools: wg-quick: wait for interface to disappear on freebsd
This should improve init scripts that restart tunnels using wg-quick.
This snapshot contains commits from: Jason A. Donenfeld, Davide Garberi, and
Arnd Bergmann.
As always, the source is available at https://git.zx2c4.com/WireGuard/ and
information about the project is available at https://www.wireguard.com/ .
This snapshot is available in compressed tarball form here:
https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20181018.tar.xz
SHA2-256: af05824211b27cbeeea2b8d6b76be29552c0d80bfe716471215e4e43d259e327
BLAKE2b-256: b4cf187d3448e577d8c47f114156ebc2ad183d058fa64f0ef9e431095237669f
A PGP signature of that file decompressed is available here:
https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20181018.tar.asc
Signing key: AB9942E6D4A4CFC3412620A749FC7012A5DE03AE
If you're a snapshot package maintainer, please bump your package version. If
you're a user, the WireGuard team welcomes any and all feedback on this latest
snapshot.
Finally, WireGuard development thrives on donations. By popular demand, we
have a webpage for this: https://www.wireguard.com/donations/
Thank you,
Jason Donenfeld
-----BEGIN PGP SIGNATURE-----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=LN/J
-----END PGP SIGNATURE-----
More information about the WireGuard
mailing list