2017-07-17

<NixOS_GitHub> [nixpkgs] aristidb pushed 1 new commit to wireguard-private-keys: https://git.io/vQNNu
<NixOS_GitHub> nixpkgs/wireguard-private-keys 8e0ed65 Aristid Breitkreuz: wireguard: implement review comments from zx2c4
<NixOS_GitHub> nixpkgs/wireguard-private-keys 04d7fc9 Aristid Breitkreuz: wireguard: improve phrasing of warning message as suggested by zx2c4
<NixOS_GitHub> nixpkgs/wireguard-private-keys 891256d Aristid Breitkreuz: wireguard: allow not storing private keys in world-readable /nix/store
<NixOS_GitHub> [nixpkgs] aristidb force-pushed wireguard-private-keys from 8cd0fe8 to 11ada20: https://git.io/vQNQb
<NixOS_GitHub> nixpkgs/wireguard-private-keys 8cd0fe8 Aristid Breitkreuz: wireguard: remove unnecessary usage of flatten inside flatten
<NixOS_GitHub> [nixpkgs] aristidb pushed 1 new commit to wireguard-private-keys: https://git.io/vQNSh
<NixOS_GitHub> nixpkgs/wireguard-private-keys 580607e Aristid Breitkreuz: wireguard: cannot use bashism in ExecStart
<NixOS_GitHub> [nixpkgs] aristidb pushed 1 new commit to wireguard-private-keys: https://git.io/vQNDy
<NixOS_GitHub> [nixpkgs] aristidb pushed 1 new commit to wireguard-private-keys: https://git.io/vQN1H
<NixOS_GitHub> nixpkgs/wireguard-private-keys 7cb69d6 Aristid Breitkreuz: wireguard: do not use '' quotes unnecessarily
<NixOS_GitHub> nixpkgs/wireguard-private-keys 4e2399a Aristid Breitkreuz: wireguard: reorganise according to review comments
<NixOS_GitHub> [nixpkgs] aristidb pushed 1 new commit to wireguard-private-keys: https://git.io/vQN1Z

2017-07-16

<NixOS_GitHub> nixpkgs/wireguard-private-keys d4e7c5f Aristid Breitkreuz: wireguard: improve phrasing of warning message as suggested by zx2c4
<NixOS_GitHub> [nixpkgs] aristidb pushed 1 new commit to wireguard-private-keys: https://git.io/vQFy7
<NixOS_GitHub> nixpkgs/wireguard-private-keys 26915ce Aristid Breitkreuz: wireguard: implement review comments from zx2c4
<NixOS_GitHub> [nixpkgs] aristidb pushed 1 new commit to wireguard-private-keys: https://git.io/vQFye
<aristid> ericsagnes: i mage an improvement to the wireguard module, would appreciate your input: https://github.com/NixOS/nixpkgs/pull/27433
<NixOS_GitHub> [nixpkgs] aristidb opened pull request #27433: wireguard: allow not storing private keys in world-readable /nix/store (master...wireguard-private-keys) https://git.io/vQF18
<NixOS_GitHub> [nixpkgs] aristidb created wireguard-private-keys (+1 new commit): https://git.io/vQFXd
<NixOS_GitHub> nixpkgs/wireguard-private-keys c3cb467 Aristid Breitkreuz: wireguard: allow not storing private keys in world-readable /nix/store

2017-07-10

<NixOS_GitHub> nixpkgs/release-17.03 a9b4f2d Jörg Thalheim: wireguard: 0.0.20170629 -> 0.0.20170706...
<NixOS_GitHub> nixpkgs/master 1532d56 Jörg Thalheim: wireguard: 0.0.20170629 -> 0.0.20170706

2017-07-09

<aristid> looks like the wireguard nixos module stores the private keys in the nix store /o\

2017-06-30

<NixOS_GitHub> nixpkgs/release-17.03 03a00c3 Jason A. Donenfeld: wireguard: 0.0.20170531 -> 0.0.20170613...
<NixOS_GitHub> nixpkgs/release-17.03 ce3a705 Jason A. Donenfeld: wireguard: 0.0.20170613 -> 0.0.20170629...
<NixOS_GitHub> nixpkgs/master 9ffccc7 Jason A. Donenfeld: wireguard: 0.0.20170613 -> 0.0.20170629...
<NixOS_GitHub> [nixpkgs] Mic92 closed pull request #26972: wireguard: 0.0.20170613 -> 0.0.20170629 (master...patch-5) https://git.io/vQ8Fy

2017-06-29

<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #26972: wireguard: 0.0.20170613 -> 0.0.20170629 (master...patch-5) https://git.io/vQ8Fy

2017-06-16

<wlhlm> zx2c4: Before this I've been using openvpn over namespaces and it's a lot more involved (https://schnouki.net/posts/2014/12/12/openvpn-for-a-single-application-on-linux/). wireguard remembering its orignal network namespace makes things a lot simpler. Thanks for that!
<wlhlm> MoreTea, zx2c4: I'm mostly just compiling the commands listed on the wireguard website. I'm using Mullvad for this - they offer a couple of experimental wireguard endpoints (https://www.mullvad.net/guides/wireguard-and-mullvad-vpn/).
<MoreTea> Could you not create wireguard interfaces, and bridge them to your private network devices? Not sure if that would be possible
<wlhlm> zx2c4: There is no package for the wireguard module specifically (only for the cli tools). I think the module is only installed if I add a wireguard interface in the nixos configuration, which I'm trying to avoid since I can't use it with netns that way.
<zx2c4> wlhlm: `modprobe wireguard` will insert the kernel module if its been installed
<wlhlm> Mic92, ericsagnes: Hi, I'm trying to use wireguard with network namespaces, which is currently not possible with the wireguard module in nixpkgs. The problem is that there seems to be no way to just install the kernel modules without having to configure network.wireguard.interfaces.*. Do you know how I could work around that?

2017-06-13

<NixOS_GitHub> [nixpkgs] Mic92 closed pull request #26553: wireguard: 0.0.20170531 -> 0.0.20170613 (master...patch-4) https://git.io/vHQwR
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #26553: wireguard: 0.0.20170531 -> 0.0.20170613 (master...patch-4) https://git.io/vHQwR

2017-06-03

<NixOS_GitHub> nixpkgs/release-17.03 9e0a260 Jörg Thalheim: wireguard: 0.0.20170409 -> 0.0.20170531...
<NixOS_GitHub> nixpkgs/master 0886c1b Jörg Thalheim: wireguard: 0.0.20170517 -> 0.0.20170531

2017-05-17

<NixOS_GitHub> nixpkgs/master 6e50243 Jason A. Donenfeld: wireguard: preshared-key is now an attribute of the peer...
<NixOS_GitHub> nixpkgs/master ef018d8 Jason A. Donenfeld: wireguard: 0.0.20170421 - 0.0.20170517...

2017-05-09

<zx2c4> in wireguard, the PQ resistance is just "hash in a 256-bit symmetric key". grover's theorem says that a quantum computer can _at best_ get a square root speed up, so that still leaves 128-bits, which means it's secure. this is the so called "poor man's PQ resistance", which always works. it is _not_, however, a key exchange (by virtue of being "preshared").
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #25646: wireguard: 0.0.20170409 -> ?? (master...wg-psk-change) https://git.io/v9iTg

2017-04-24

<NixOS_GitHub> nixpkgs/master 8deb0e1 Jörg Thalheim: wireguard: do not fail on warning for older kernel
<NixOS_GitHub> nixpkgs/master 600a2f2 Jörg Thalheim: wireguard: make myself maintainer
<NixOS_GitHub> nixpkgs/master 75608e1 Jason A. Donenfeld: wireguard: 0.0.20170409 -> 0.0.20170421

2017-04-22

<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #25127: wireguard: 0.0.20170409 -> 0.0.20170421 (master...patch-3) https://git.io/v9TuI

2017-04-10

<NixOS_GitHub> nixpkgs/release-17.03 4494103 Jörg Thalheim: wireguard: 0.0.20170320.1 -> 0.0.20170409...
<NixOS_GitHub> nixpkgs/master cbe0062 Jörg Thalheim: wireguard: 0.0.20170324 -> 0.0.20170409

2017-03-24

<NixOS_GitHub> nixpkgs/master 6948f79 Jason A. Donenfeld: wireguard: 0.0.20170320.1 -> 0.0.20170324
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #24270: wireguard: 0.0.20170320.1 -> 0.0.20170324 (master...patch-2) https://git.io/vSUfk

2017-03-21

<NixOS_GitHub> nixpkgs/release-17.03 a334a17 Jörg Thalheim: wireguard: 0.0.20170223 -> 0.0.20170320.1...
<NixOS_GitHub> nixpkgs/master 818a375 Jörg Thalheim: wireguard: 0.0.20170223 -> 0.0.20170320.1

2017-02-24

<Mic92> IITaudio: I followed the kernel parameter which was passed to the wireguard package

2017-02-23

<NixOS_GitHub> nixpkgs/master 67b4f72 Jason A. Donenfeld: wireguard: 0.0.20170214 -> 0.0.20170223...
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #23116: wireguard: 0.0.20170214 -> 0.0.20170223 (master...patch-1) https://git.io/vyvnS

2017-02-14

<gchristensen> btw zx2c4 when 17.03 is released, we will have a NixOS module for configuring wireguard, you may want to check it out: https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/services/networking/wireguard.nix
<NixOS_GitHub> nixpkgs/release-16.09 f88032f Eric Sagnes: wireguard: 2016-08-08 -> 2016-10-01...
<NixOS_GitHub> nixpkgs/release-16.09 8d799c6 Jörg Thalheim: wireguard: 2016-10-25 -> 0.0.20161110...
<NixOS_GitHub> nixpkgs/release-16.09 efdcb44 Franz Pletz: wireguard: 2016-10-01 -> 2016-10-25...
<NixOS_GitHub> nixpkgs/master 36d5097 Jason A. Donenfeld: wireguard: 0.0.20170213 -> 0.0.20170214...
<NixOS_GitHub> nixpkgs/master 1a9707d Graham Christensen: wireguard: update description to describe its current state
<gchristensen> zx2c4: what I'm thinking is updating the description of wireguard to indicate that it is a pre-prelease, is experimental and not to be depended upon for security, and then moving forward with regular backports to stable
<gchristensen> or rename it to wireguard-experimental (to reflect its upstream lack of historical support, it is a _stable_ release, and mandatory upgrades is a bit antithetical to that) or issue a warning
<zx2c4> wireguard simply isnt at the point where it makes sense to branch a certain snapshot and then "backport" particular fixes. it's very much a work in progress, albeit a fairly stable work in progress. it's pretty safe to just bump snapshots for all nix versions
<gchristensen> zx2c4: so we're just discussing how to handle wireguard for stable releases
<gchristensen> before we discuss that too far -- what should we do about the ancient wireguard package we have in 16.09?
<gchristensen> we could rename it wireguard-experimental
<fpletz> the thing is that wireguard is not finished yet - we should ask ourselves if we should even support it in a stable distribution (like those rc kernels that are available in stable but never updated \o/)
<gchristensen> hmm should we be more clearly denoting wireguard as experimental?
<gchristensen> ikwildrpepper: the author of wireguard is incredibly high-and-mighty
<gchristensen> Mic92: should these wireguard PRs be backported?
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #22786: wireguard: 0.0.20170213 -> 0.0.20170214 (master...patch-4) https://git.io/vDiUt

2017-02-13

<NixOS_GitHub> nixpkgs/master 2ad8fac Jason A. Donenfeld: wireguard: 0.0.20170115 -> 0.0.20170213 (#22759)
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #22759: wireguard: simple package bump (master...patch-4) https://git.io/vDK9J

2017-01-15

<NixOS_GitHub> nixpkgs/master 12b2830 Jörg Thalheim: wireguard: 0.0.20170105 -> 0.0.20170115

2017-01-05

<NixOS_GitHub> [nixpkgs] Mic92 closed pull request #21666: wireguard: 0.0.20161230 -> 0.0.20170105 (master...patch-3) https://git.io/vMsqh
<NixOS_GitHub> nixpkgs/master 1ba9a3c Jason A. Donenfeld: wireguard: 0.0.20161230 -> 0.0.20170105...
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #21666: wireguard: 0.0.20161230 -> 0.0.20170105 (master...patch-3) https://git.io/vMsqh

2017-01-01

<NixOS_GitHub> [nixpkgs] Mic92 closed pull request #21572: wireguard: 0.0.20161223 -> 0.0.20161230 (master...patch-2) https://git.io/vMqqu
<NixOS_GitHub> nixpkgs/master f305203 Jörg Thalheim: wireguard: 0.0.20161223 -> 0.0.20161230...
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #21572: wireguard: 0.0.20161223 -> 0.0.20161230 (master...patch-2) https://git.io/vMqqu

2016-12-24

<NixOS_GitHub> nixpkgs/master c98f3ff Jörg Thalheim: wireguard: 0.0.20161218 -> 0.0.20161223

2016-12-22

<Mic92> gchristensen: we most likely do not have to deal with him in future, when this module gets merged into linux and wireguard-tools gets merged into iproute2.
<NixOS_GitHub> nixpkgs/master 77588ca Jason A. Donenfeld: wireguard: 20161209 -> 20161218 (#21288)
<gchristensen> Mic92: that wireguard fellow is very difficult.

2016-12-19

<Mic92> gchristensen: the guy behind wireguard
<Mic92> gchristensen: I decided not do any wireguard maintance as long as this guy is lurking in the issue tracker.
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #21288: wireguard: 20161209 -> 20161218 (master...patch-1) https://github.com/NixOS/nixpkgs/pull/21288
<NixOS_GitHub> [nixpkgs] zx2c4 closed pull request #21282: wireguard: 20161209 -> 20161218 (master...patch-1) https://git.io/v1Fhg
<NixOS_GitHub> [nixpkgs] zx2c4 opened pull request #21282: wireguard: 20161209 -> 20161218 (master...patch-1) https://github.com/NixOS/nixpkgs/pull/21282
<NixOS_GitHub> [nixpkgs] Mic92 closed pull request #21277: wireguard: 0.0.20161209 -> 0.0.20161218 (master...wireguard) https://git.io/v1dAm
<NixOS_GitHub> [nixpkgs] Mic92 opened pull request #21277: wireguard: 0.0.20161209 -> 0.0.20161218 (master...wireguard) https://github.com/NixOS/nixpkgs/pull/21277

2016-12-16

<NixOS_GitHub> nixpkgs/master a4586f8 Franz Pletz: wireguard: 20161129 -> 20161209

2016-12-12

<NixOS_GitHub> nixpkgs/master 7c8d4cd Jörg Thalheim: wireguard: 0.0.20161116.1 -> 0.0.20161129

2016-12-01

<NixOS_GitHub> [nixpkgs] joachifm closed pull request #20825: wireguard: remove dependency on ip-up.target (master...wireguard-systemd-start) https://git.io/v1snv

2016-11-30

<NixOS_GitHub> [nixpkgs] lbonn opened pull request #20825: wireguard: remove dependency on ip-up.target (master...wireguard-systemd-start) https://git.io/v1snv