coders curfew: do what you love like you always do, but without FOMO

Hi @lain just read your encryption article after you mentioned it on Lobste.rs. I was wondering if you know about MLS. Something I stumbled upon last weekend and looks interesting. It's an IETF effort and focuses on scaling secure group chat: messaginglayersecurity.rocks/ There's also a reference implementation: github.com/openmls/openmls and an attempt at a federation draft (tools.ietf.org/html/draft-ietf), but it looks like the main focus is currently still on centralized systems.

Big thanks to Julian Assange and for their reliable track record of servicing the public at large with truthful and original information that deviates sharply with the official narrative and exposes war crimes, financial crimes and illegal spying. Don't shoot the messenger,

Running a pledged Nym mixnode on OpenBSD. 😎 First encounter with Rust, compile-times do not come cheap :O dashboard.nymtech.net

Whenever I go outside, I'm astonished by how hi-res everything looks! 😲

WireSep v0.11.3 is out, it contains quite a bunch reliability fixes, especially related to potential deadlocks on transient socket errors.

Thanks to the community in providing me with a macppc so I can now properly stress test from home with all the devices I have. :)

netsend.nl/wiresep

SHA256 (wiresep-0.11.3.tar.gz) = uvhWBE7V9C7Zqms7ApSiFODi7thN7jO+QM2BBtFFBK8=

I've been able to weed out some more bugs in WireSep related to client-only mode and macppc (having a machine with a connection fast enough to route all my traffic through really helps).

Help with testing the latest commits would be highly appreciated, also if you only use it as a server. I hope to release another bugfix release by tomorrow if all goes well..

Note that the project and repository are no longer at GitHub but are now located at netsend.nl/wiresep

Now is a good time to help testing WireSep so that it is as good as it can be for the upcoming OpenBSD 6.7 release.

If you're on a recent snapshot, just run `pkg_add wiresep` and it will install the latest version (which is 0.11.1) or download it from netsend.nl/wiresep

In the name of freedom and independence I've moved WireSep away from GitHub to my own domain. It's new home is netsend.nl/wiresep a simple static site hosted on OpenBSD. Now we can explore the project in peace without being tracked by Silicon Valley 😎

WireSep v0.11.0 is out!

WireSep is a privilege separated implementation of WireGuard for OpenBSD.

Some highlights:
* wiresep-keygen(1) now securely stores keys in a file so no more copy/pasting
* proper support for big-endian systems
* various other improvements and fixes

github.com/timkuijsten/wiresep

Note: when upgrading from a previous version, please rename your private key files:
# cd /etc/wiresep &&
for _f in `ls *.key`; do mv "$_f" ${_f%.key}.privkey; done

first steps in a sparc64 system, supercool! somehow feels as exciting as watching the "unix system" scene of Jurassic Park as a kid back in 1993 ;) @stsp big thanks for helping me out πŸ˜ƒ

who wants to be my sparc64 vdom friend? ;) (i'd like to test wiresep on it)

What would be the cheapest option to have an OpenBSD system on big-endian? I'd like to be able to test wiresep on it. I know about the EdgeRouter Lite, but I find EUR 100,- a bit expensive for something I don't really need personally.

And here is WireSep v0.10.1 already πŸ˜‚ While I was preparing a package for ports I saw it contained two patches for building on 32-bit archs that I've now upstreamed in this release.

Get the source here: github.com/timkuijsten/wiresep or wait until a nearby mirror gets the updated package 😎

WireSep v0.10.0 is here. WireSep is a privilege separated implementation of WireGuard for OpenBSD.

This release contains a major effort to clarify all log messages so that looking at the logs no longer makes your eyes bleed. Furthermore it contains some cleanups found with GCC 8 and Clang Static Analyzer.

Thanks to everyone reporting back issues.

ChangeLog: github.com/timkuijsten/wiresep

Show older
Mastodon

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!