wg-crypt-wg0 process

John Sager john at sager.me.uk
Wed Dec 30 10:29:11 CET 2020


The posted script works for me, Xubuntu 20.04 kernel 5.4.0-38-generic 
x86_64. The first time I ran it, it deleted both [wg-crypt-wg0] instances 
but left one kworker process: [kworker/0:0-wg-crypt-wg0]. I then ran it 
again and no wg kernel processes were left.

regards,

John

On 30/12/2020 08:19, Fatih USTA wrote:
> Hi
> 
> I'm playing wireguard with the namespace. I think I caught a litle problem.
> 
> If I delete netns directly, everything is removed, but wg-crypt-wg0 process 
> is still alive.
> 
> root      8127  0.0  0.0      0     0 ?        S<   07:26 0:00 [wg-crypt-wg0]
> root      8143  0.0  0.0      0     0 ?        S<   07:26 0:00 [wg-crypt-wg0]
> root      8449  0.0  0.0      0     0 ?        S<   07:26 0:00 [wg-crypt-wg0]
> root      8454  0.0  0.0      0     0 ?        S<   07:26 0:00 [wg-crypt-wg0]
> 
> If I delete first wireguard interface from the netns, everthing works fine.
> 
> wg_version:        1.0.20201221
> kernel_version:       3.16.85-1
> 
> #!/bin/bash
> 
> case $1 in
>      remove)
>          ip link del dev bridge0 || { echo "Please add first."; exit 1; }
>          ip link del dev veth1
>          ip link del dev veth2
>          #ip netns exec ns1 ip link del dev wg0
>          #ip netns exec ns2 ip link del dev wg0
>          ip netns del ns1
>          ip netns del ns2
>          iptables -D FORWARD -i bridge0 -o bridge0 -j ACCEPT
>          rm -f /tmp/private-ns1 /tmp/private-ns2 /tmp/public-ns1 
> /tmp/public-ns2
>      ;;
>      add)
>          ip link add name bridge0 type bridge || { echo "Please remove 
> first."; exit 1; }
>          ip link set dev bridge0 up
> 
>          ip netns add ns1
>          ip netns add ns2
>          ip link add name veth1 type veth peer name eth0 netns ns1
>          ip link add name veth2 type veth peer name eth0 netns ns2
>          ip link set dev veth1 up master bridge0
>          ip link set dev veth2 up master bridge0
> 
>          ip netns exec ns1 ip link set dev lo up
>          ip netns exec ns1 ip link set dev eth0 up
>          ip netns exec ns1 ip addr add 10.150.150.1/24 dev eth0
> 
>          ip netns exec ns2 ip link set dev lo up
>          ip netns exec ns2 ip link set dev eth0 up
>          ip netns exec ns2 ip addr add 10.150.150.2/24 dev eth0
> 
>          ( umask 0077;
>            wg genkey | \
>            tee /tmp/private-ns1 | \
>            wg pubkey > /tmp/public-ns1
> 
>            wg genkey | \
>            tee /tmp/private-ns2 | \
>            wg pubkey > /tmp/public-ns2
>          )
> 
>          ip netns exec ns1 ip link add name wg0 type wireguard
>          ip netns exec ns1 ip addr add 172.16.1.1/24 dev wg0
> 
>          ip netns exec ns2 ip link add name wg0 type wireguard
>          ip netns exec ns2 ip addr add 172.16.1.2/24 dev wg0
> 
>          ip netns exec ns1 wg set wg0 private-key /tmp/private-ns1 
> listen-port 51820
>          ip netns exec ns1 ip link set wg0 up
> 
>          ip netns exec ns2 wg set wg0 private-key /tmp/private-ns2 
> listen-port 51820
>          ip netns exec ns2 ip link set wg0 up
> 
>          ip netns exec ns1 wg set wg0 peer "$(</tmp/public-ns2)" allowed-ips 
> 172.16.1.0/24 endpoint 10.150.150.2:51820
>          ip netns exec ns2 wg set wg0 peer "$(</tmp/public-ns1)" allowed-ips 
> 172.16.1.0/24 endpoint 10.150.150.1:51820
> 
>          iptables -I FORWARD -i bridge0 -o bridge0 -j ACCEPT
> 
>          ip netns exec ns1 wg
>          ip netns exec ns2 wg
>          ip netns exec ns1 ping -i 0.3 -c 2 172.16.1.2 &>/dev/null && \
>                            echo -e "\n\nWorked" || \
>                            echo -e "\n\nFailed"
>      ;;
>      *)echo "$(basename $0) add|remove" ;;
> esac
> 
> 


More information about the WireGuard mailing list