• elevation an hour ago

    Wireguard exemplifies the superiority of a qualified independent developer over the fractal layers of ossified cruft that you get from industry efforts and compliance STIGS.

    So it feels wrong to see wireguard adapted for compliance purposes. If compliance orgs want superior technology, let their standards bodies approve/adopt wireguard without modifying it.

    • dmbche 38 minutes ago

      > fractal layers of ossified cruft

      Someone got a thesaurus in their coffee today! (Not a jab)

      • jmclnx 40 minutes ago

        Yes, but be aware, openvpn is much better if you live in a Country like China, Russia and a few others. That is due to a known design issue with wireguard.

        For most people, wireguard is fine.

        Edit: I should have said "choice" instead of "issue", but Firefox 140 is failing on this site so I could not correct the txt. I was able to edit this after reverting back to Firefox 128.

        • LunaSea 37 minutes ago

          Could you expand on the design flaw in question?

          • eptcyka 33 minutes ago

            OpenVPN looks like a regular tls stream - difficult to distinguish between that and a HTTPS connection. WireGuard looks like WireGuard. But you can wrap WireGuard in whatever headers you might want to obfuscate it and the perf will still be better.

            • tptacek 21 minutes ago

              It's trivial to make WireGuard look like a regular TLS stream. It's probably not worth a 15 year regression in security characteristics just to get that attribute; just write the proxy for it and be done with it. It was a 1 day project for us (we learned the hard way that a double digit percentage of our users simply couldn't speak UDP and had to fix that).

            • jmclnx 35 minutes ago

              It is not a design flaw, but a design choice.

              >OpenVPN does not store any of your private data, including IP addresses, on VPN servers, which is ideal.

              https://www.pcmag.com/comparisons/openvpn-vs-wireguard-which...

          • LtWorf an hour ago

            but wolfssl is in the business of selling FIPS compliance so…

        • AaronFriel 2 hours ago

          The conventional wisdom in cryptography is that if you don't know you need FIPS, if you don't have paper and a dollar figure telling you how much you need it, you don't need or want FIPS.

          • usui an hour ago

            I know software developers complain about forced compliance due to the security theatre aspects, but I would like to charitably ask from someone who has technical understanding of FIPS-compliant cryptography. Are there any actual security advantages on technical grounds for making WireGuard FIPS-compliant? Assume the goal is not to appease pencil pushers. I really want to know if this kind of effort has technical gains.

            • ongy 15 minutes ago

              Crypto wise, fips is outdated but not horrible.

              Actual fips compliant (certified) gives you confidence in some basic competence of the solution.

              Just fips compatible (i.e. picking algos that could be fips compliant) is generally neutral to negative.

              I'm not 100% up to date, so that might have changed, but AEAD used to be easier if you don't follow fips than fips compatible. Still possible, but more foot guns due to regulatory lag in techniques.

              Overall, IMO the other top-level comment of "only fips if you have pencil pusher benefit" applies.

              • briandw 44 minutes ago

                My limited understanding is that issues like being vulnerable to side channel attacks are very difficult to detect. So you have to have shown that the entire development process is safe. From the code to the compiler to the hardware to the microcode, it all needs to be checked. That said it does seem like compliance is a bigger priority than safety.

                • loeg an hour ago

                  There is no security advantages or technical grounds for using FIPS algorithms in a WireGuard clone instead of Chacha / Blake2. It's purely a compliance move. ChaPoly, Blake2, etc, are not known to be broken and we have every reason to believe they are strong.

                  • alfanick an hour ago

                    I presume it's a product strategy to provide a box of "compliant" libraries/services, so other companies can quickly tick and sign a checkbox saying "we use compliant VPN", because someone else is going to look whether the checkbox is ticked and signed, because someone else is going to...

                    • NewJazz an hour ago

                      You failed to answer the question. Why did you reply?

                    • tptacek 21 minutes ago

                      No, there are not.

                    • PunchyHamster an hour ago

                      So a step backward in security ?

                      • kstrauser an hour ago

                        In fairness, modern versions of FIPS are much less awful. AFAICT it's now possible to be FIPS compliant and meet reasonable crypto expectations, which was not always the case before.

                        • loeg 43 minutes ago

                          It's fine. None of the FIPS algorithms are known to be broken, either. The only risk here is implementation bugs doing the conversion and any maintenance burden incurred due to diverging from upstream wireguard.

                        • pphysch an hour ago

                          Can't you also get FIPS 140-3 WireGuard by compiling wireguard-go with the new native FIPS support in Go?

                          • inahga an hour ago

                            The ciphers used by WireGuard are not FIPS 140-3 certified. So you have to also change the ciphers, as is done in this project.

                            • loeg an hour ago

                              E.g., ChaPoly AEAD -> AES-GCM, Blake2s -> SHA2/3, that kind of thing.