/srv/irclogs.ubuntu.com/2022/08/22/#ubuntu-security.txt

luis220413amurray: Are you there?07:21
luis220413Is anyone from the Ubuntu Security Team here'08:00
luis220413Is anyone from the Ubuntu Security Team here?08:00
ebarrettoluis220413, yes08:02
luis220413ebarretto: I have completed testing for my updates in bug 1986627 (regression: incomplete fix for CVE-2020-11653) and bug 1982670. Alex Murray said he would look today in the morning but it is already 17:33 in his timezone.08:03
ubottuBug 1986627 in varnish (Ubuntu) "Incomplete fix for CVE-2020-11653" [Undecided, Confirmed] https://launchpad.net/bugs/198662708:03
ubottuBug 1982670 in jupyter-notebook (Debian) "Multiple vulnerabilities in Bionic, Focal, Jammy and Kinetic" [Unknown, Confirmed] https://launchpad.net/bugs/198267008:03
ubottuAn issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss. <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11653>08:03
ebarrettowe already have someone looking at the varnish issue 08:03
ebarrettojupyter-notebook we will get to it when we get to it, it is already queued up, please be patient 08:04
luis220413ebarretto: What are the priorities of the Ubuntu Security Team now?08:16
ebarrettoluis220413, we do way more than security patching. Everyone in the team is busy doing something.08:18
luis220413ebarretto: On Friday I requested two CVE status changes. I will repeat them but with an explanation.08:24
luis220413Can you set the status of CVE-2022-38150 for trusty/esm to not-affected (code not present) because it only affects Varnish >= 7.0, and of CVE-2021-32798 for jammy to not-affected (6.4.8-2) because this version includes the fix made upstream?08:25
ubottuIn Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1. <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38150>08:25
ubottuThe Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker t... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32798>08:25
ebarrettodone, thanks 08:30
luis220413ebarretto: Thanks for the status changes!08:38
luis220413What are your priority public updates right now and what else you do besides security patching and MIR review?08:41
luis220413By "you" and "your" I mean the Ubuntu Security Team.08:45
ebarrettowe do security reviews for other teams, apparmor development, snap reviews, certifications (fips, cis, stig), oval generation, cve triage, bug triage, improve our own infrastructure, deal with issues from cloud customers and lots of other tasks08:59
luis220413Thanks! What public updates do you have in the queue?09:07
ebarrettothat's not the kind of information we advertise. Keep an eye on USNs and you will know what we were working on for Ubuntu releases 09:19
mitya57Hi! Can someone please take a look at my proposed debdiff for jammy-security in bug 1981807 (comment #13)?11:17
ubottuBug 1981807 in qtbase-opensource-src (Ubuntu Jammy) "qt5-network openssl3 armhf does not support tls1.3" [Undecided, Confirmed] https://launchpad.net/bugs/198180711:17
luis220413mitya57: I will take a look. Can you update the debdiff to fix these CVEs? https://ubuntu.com/security/cves?q=&package=qtbase-opensource-src&priority=&version=jammy&status=11:45
mitya57luis220413: jammy package already has debian/patches/CVE-2021-38593.diff and debian/patches/CVE-2022-25255.diff11:51
ubottuQt 5.x before 5.15.6 and 6.x through 6.1.2 has an out-of-bounds write in QOutlineMapper::convertPath (called from QRasterPaintEngine::fill and QPaintEngineEx::stroke). <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38593>11:51
ubottuIn Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux and UNIX, QProcess could execute a binary from the current working directory when not found in the PATH. <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255>11:51
luis220413The binary packages built from this source package have 2096 reverse dependencies.11:55
luis220413in Ubuntu 22.04 amd6411:56
tewardluis220413: fwiw you are not Security team11:56
tewardmitya57: ^^11:56
tewardebarretto: because i was poking you earlier - see above11:56
tewardi also am interested because Qt is used by Lubuntu so it's on my radar as well now11:57
mitya57teward: ok, thanks11:57
tewardi'm not security team either ;)11:57
mitya57:))11:57
tewardluis220413: yes, Qt is a huge library set.  no TLS1.3 support sounds like it's  just a no change rebuild + patches, but i'll wait for ebarretto or amurray to confirm that for me11:58
teward(we had the same issue for NGINX with no TLS 1.3 support right when OpenSSL landed with it, a no chnage rebuild against the latest libssl in the repo at the time fixed that chaos)11:58
teward(but that wasn'ta sec issue)11:58
mitya57No rebuilds of reverse dependencies are needed. Just a fix in qtbase.11:59
tewardyep, but then a hard watch on all the autopkgtests to make sure it doesn't explode11:59
tewardcc tsimonq2 in case youre bored ^^11:59
teward(because Lubuntu)12:00
ebarrettoyes, that's more likely a bug fix that should go through SRU, it could go to the security pocket if we deem it worth it12:01
tewardebarretto: i'll handle that then, because it's on the Lubuntu radar (aka mine)12:08
tewardluis220413: ^^ since i can get this into the SRU process a bit faster ;)12:08
tewardcc also mitya57 because12:09
tsimonq2I'm curious, why?12:09
tewardtsimonq2: tls1.3 is good?12:09
tewardin case you're bored on the other stack of crap you ahve you might want to do an SRU ;)12:09
teward(qtbase affects our stuff too)12:09
tsimonq2(Why originally treat as an SRU?)12:09
tewardthat's an ebarretto question ;)12:10
mitya57I can do the SRU myself as well.12:10
tewardmitya57: oh, well then have fun :)12:10
tewardi'mma go back to stabbing Windows (which is evil) at FT job.  >.<12:11
teward(can anyone say with me, "Microsoft Exchange Sucks [CENSORED]"?12:11
teward)12:11
tsimonq2<teward> "cc Simon Quigley in case youre..." <- I'm very rarely bored these days unfortunately... but if you ping me here I make time ;)12:12
luis220413mitya57, teward: I only mentioned reverse dependencies to show the importance of this source package.12:16
tewardluis220413: helpful hint again from a seasoned dev: rdeps alone don't determine the importance of the package for an update/sru/etc.12:16
tewardthere's a ton of other factors12:16
tewardrdeps also can be a *hindrance* if we're doing an update that would break the entire stack;)12:17
luis220413teward: I know. Examples are actual usage, being seeded in Ubuntu flavors, and so on.12:17
ebarrettotsimonq2, it might go through the security pocket as I mentioned, it will depend on who reviews it more deeply, but I didn't review it, just glanced over the bug12:19
=== ChanServ changed the topic of #ubuntu-security to: Twitter: @ubuntu_sec || https://usn.ubuntu.com || https://wiki.ubuntu.com/SecurityTeam || https://wiki.ubuntu.com/Security/Features || Community: sbeattie
tsimonq2Ah, no worries then12:30
tsimonq2Not my first universe security update, I'll take a look at this either before or after $dayjob, but today. Expect pings before EOD US time :)12:30
luis220413ebarretto: Can you explain why CVE-2022-30067 was rated as low?12:51
ubottuGIMP 2.10.30 and 2.99.10 are vulnerable to Buffer Overflow. Through a crafted XCF file, the program will allocate for a huge amount of memory, resulting in insufficient memory or program crash. <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30067>12:51
ebarrettoluis220413, probably Steve set this as low because you need to have a crafted xcf file from an untrusted source and this will only cause a crash in the program12:54
ebarrettosorry but I am quite busy with other stuff right now and won't do much investigation 12:55
luis220413OK. But deeper investigation is needed and will be done at another time.12:56
luis220413OK. But deeper investigation is needed and will be done later.12:56
ebarrettonot by me, I trust my colleagues choice and if you think it otherwise then you should give us your reasoning. Do not that priority and severity are two different things 12:57
ebarrettonote*12:57
luis220413ebarretto: Can you mark qtbase-opensource-src in jammy as not vulnerable to CVE-2021-38593 and CVE-2022-25255 due to the message by mitya57?13:07
ubottuQt 5.x before 5.15.6 and 6.x through 6.1.2 has an out-of-bounds write in QOutlineMapper::convertPath (called from QRasterPaintEngine::fill and QPaintEngineEx::stroke). <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38593>13:07
ubottuIn Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux and UNIX, QProcess could execute a binary from the current working directory when not found in the PATH. <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255>13:07
luis220413Can anyone else patch these CVEs for Focal? https://ubuntu.com/security/cves?q=&package=qtbase-opensource-src&priority=&version=focal&status=13:09
luis220413mitya57: Does your bug affect Ubuntu 18.04 or 20.04 on any architecture? (qtbase-opensource-src is in main in Ubuntu 18.04.)13:09
luis220413I will return in 45 minutes but remain online.13:10
mitya57luis220413: It doesn't, because it happens only with openssl 3.13:13
luis220413I am back.14:02
luis220413I will return in 10 minutes but remain online.14:56
luis220413I am back.15:06
luis220413teward: Are autopkgtests run automatically for stable releases?15:14
luis220413tsimonq2: What security updates have you made to packages in the universe component?15:27
tewardluis220413: i would avoid bugging tsimonq2 on anything non urgent15:36
tewardfor reasons I'm not at liberty to disclose15:37
tewardas for 'stablereleases' yes autopkgtests still trigger for those updates, it's how additional regression testing happens.15:37
tewardbut that's not a security related question here ;)15:37
tewardi also strongly suggest you dial back the amount of pings you send people here, i tend to notice you like to ping people **a lot** - a lot more than you probably should be doing.15:38
trenchluis220413: we don't care if you are away ..15:49
luis220413OK17:08
luis220413teward: I always ping to send replies, but others do not do so in most or all replies. From now on, I will not ping when not appropriate in a reply, by modifying the nick of the target user (for example, "t_eward: ...").17:10
tsimonq2luis220413: Why do you need to know how many security updates I've done when a) the number is more than 5 and b) as a core developer in the Ubuntu project I'm stepping up and volunteering to do work that will benefit everyone. All that question does is create FUD17:29
tsimonq2Anyway, besides dealing with that, I'll hop on this later tonight and at least get something pushed to Bileto or similar by US EOD, if mitya57 hasn't already beat me to the punch (which he often does nowadays, thanks!! :) )17:31
Eickmeyer[m]luis220413: Once again, I need to remind you that Ubuntu is a meritocracy, and here you are, questioning the qualifications of seasoned developers and their contributions within the project when you haven't been contributing for very long and have been acting in a very demanding and outright rude manner toward those who have.17:38
Eickmeyer[m]luis220413: This is your final warning to stop this behavior before I go to the rest of the Ubuntu Community Council to recommend you be banned from contributing to Ubuntu. Do I make myself clear?17:38
luis220413tsimonq2: I did not expect that my question will create FUD. I would happily say that I have done 8.17:40
luis220413Anyway, thanks for your security updates for stable releases!17:40
tewardebarretto: can i borrow your hammer please?17:43
tsimonq2Keep on flexing dude, you're already on thin ice, there's nothing more I can say or do here :)17:43
tewardfor two reasons.17:43
luis220413Eickmeyer[m]: Yes.17:44
luis220413I will prepare the qtbase-opensource-src security update for Ubuntu 20.04.17:44
luis220413in this week17:45
tsimonq2Nope, sorry, someone already volunteered. There's plenty else to do, the Ubuntu Qt Team has this one under control.17:49
luis220413ebarretto: Can you mark CVE-2021-38593 for qtbase-opensource-src in Focal as released (5.12.8+dfsg-0ubuntu2.1)?18:00
ubottuQt 5.x before 5.15.6 and 6.x through 6.1.2 has an out-of-bounds write in QOutlineMapper::convertPath (called from QRasterPaintEngine::fill and QPaintEngineEx::stroke). <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38593>18:00
luis220413s/mark/set the status of/18:00
luis220413s/as released/to released/18:02
luis220413Bug 198733618:31
ubottuBug 1987336 in qtbase-opensource-src (Ubuntu) "Multiple vulnerabilities in Focal" [Undecided, New] https://launchpad.net/bugs/198733618:31
mitya57tsimonq2: I have just uploaded the SRU :)18:34
tsimonq2>:D18:35
tsimonq2Thank you!!!!!!!!!18:35
ahasenacksarnold: hm, I tried using netplan to configure wireguard, but that didn't work: https://discourse.ubuntu.com/t/netplan-with-wireguard/3016818:44
ahasenackfound a related bug in systemd-networkd, apparently fixed, but unclear if it needs an extra configuration (that netplan isn't doing) out of the box or not18:45
sarnoldhey! an html anchor to the netplan docs! i've wanted those for ages18:45
ahasenackI had to "view source" to find it...18:45
ahasenackI was dearly hoping there would be one18:45
sarnoldwell, dang, it's still not the granularity I was hoping for -- eg the `key` a bit lower down doesn't appear to have an anchor point :( oh well..18:46
ahasenackthe systemd docs say an extra route section is needed18:46
ahasenacklet me update my post with links to that18:46
sarnoldalright, back to netplan / wireguard, hehe18:46
ahasenackupdated18:48
ahasenackI'm about to file a bug with netplan18:48
ahasenacknow that I collected it all together in a post, it looks more and more like a bug18:49
ahasenackor unsupported feature18:49
ahasenackthing is, I can't even easily add the route myself in the .network file, because netplan would just rewrite it18:49
ahasenackso it would have to be something external18:49
sarnoldoh my goodness this systemd issue gets complex18:52
ahasenackin systemd, what doesn't :)18:52
ahasenackI still can't figure out dns resolver18:52
ahasenacksometimes it works as I think it should, sometimes it surprises me18:52
sarnoldwireguard seems simple, maybe even too simple, when you're configuring it via ip and wireguard commands, but translating all that into netplan configs to translate into systemd configs that then get executed .. oof18:52
ahasenackpersonally I have decided against netplan for wireguard, mainly because "netplan apply" disrupts everything18:53
ahasenacknot just the wg interface18:53
sarnoldnever mind that I never got the hang of the multiple routing tables business18:53
ahasenackat this point I'm considering not documenting netplan + wireguard, for now18:53
ahasenackmaybe just point at it, but "beware dragons"18:53
sarnoldhmm. I can appreciate trying to leave breadcrumbs behind for the adventurous folks who want to try it out; but my experience with the apparmor wiki, which documents *lots* of things that don't yet exist, is that people *will* find it, they *will* try it, and they *will* ask for help and file bug reports when it doesn't work perfectly18:54
ahasenacktrue18:55
ahasenackright now this isn't working out of the box, at least not for me18:56
ahasenacklet me just add the missing route manually, see if that is the only thing missing18:56
* ahasenack goes to this cheat sheet about ip route commands18:56
ahasenackroot@laptop-coffee-shop:~# telnet 10.10.10.90 2218:57
ahasenackTrying 10.10.10.90...18:57
ahasenackConnected to 10.10.10.90.18:57
ahasenackEscape character is '^]'.18:57
ahasenackSSH-2.0-OpenSSH_8.9p1 Ubuntu-318:57
ahasenackok, worked18:57
ahasenackhad to add `ip route add 10.10.10.0/24 via 10.10.11.2`18:57
ahasenackI'm on the "wireguard on the router" part of https://gist.github.com/panlinux/2bc62c10799284590e577de0640d276718:58
ahasenack(diagram-wise)18:58
sarnoldheh, I'm glad I'm not hte only one who needs the cheetsheets :) if it requires more than ip a ; ip l ; ip r   .. then help is required :)18:59
ahasenack"ip a show dev <nic>" is my strongest ip-foo that I know from memory18:59
ahasenackI also like "ip get route <ip>"18:59
ahasenackthat's very handy18:59
ahasenacker, ip route get19:00
* ahasenack blushes19:00
sarnoldahh, see, I never know the name of my nics any more ;( so it's hard to be confident there. ip route get <ip> is my headliner :)19:00
ahasenackwell, without tab-complete, I wouldn't know either :)19:05
sarnoldoh hey!19:06
sdezielahasenack: out of curiosity, howdid you end up with a wg0 MTU of 1378? The default is supposed to be 1420 IIRC19:14
sdezielpppoe should shave 8 bytes but still ;)19:14
ahasenackI didn't mess with any of that19:15
ahasenackwhere did you see that again?19:15
sdezielinteresting, so that might suggest PMTU going on.19:15
ahasenackI just checked `ip a` and the mtu on the home0 wg interface is 142019:15
ahasenackpmtu is working? *gasp*19:16
sdezielhttps://gist.github.com/panlinux/2bc62c10799284590e577de0640d2767#testing has "ip link set mtu 1378 up dev wg0"19:16
ahasenackhmmm19:16
ahasenackwg-quick?19:16
ahasenackindeed19:16
ahasenackmy other endpoing, which I brought up using wg-quickj, has an mtu of 137819:16
ahasenackthe one I brought up using netplan (via systemd-networkd), has an mtu of 142019:17
sdezielI use the systemd instance template (`wg-quick@%i`) and for those, the `[Interface]` section has to have a `MTU = XYZ` to no inherit the 1420 default19:18
sarnoldhmm why do you need to change it?19:18
ahasenacksdeziel: tjat19:19
ahasenacksdeziel: that's what I have at the other endpoint19:19
sdezielahasenack: OK, so no PMTU ;)19:19
ahasenacksdeziel: https://pastebin.ubuntu.com/p/xtPkB7mVr2/19:19
sdezielsarnold: I usually tweak it to 1440 when I'm 100% sure I won't tunnel stuff over IPv619:20
ahasenackjust the normal privatekey, listenport, address in [Interface]19:20
ahasenackbtw, via netplan/systemd one does not have the hooks options, afaik19:20
ahasenackPostUp and stuff19:21
sdezielahasenack: hmm, maybe your default route has a lower MTU itself?19:21
ahasenackoh, its nic does have a lower mtuy19:21
ahasenackmtu19:21
ahasenack145819:21
ahasenackit's an openstack vm19:21
ahasenack¯\_(ツ)_/¯19:22
sdezielahasenack: probably vxlan or geneve eating some MTU away19:22
ahasenackok, well, no netplan for wireguard for now19:23
sarnoldthanks for giving it a *really* good shot :)19:24
ahasenackI kept the text I wrote19:25
Unit193sarnold: But the systemd template is so easy. :319:25
ahasenackhttps://gist.github.com/panlinux/49444e54ab109fe8399912a43553e105 is where I stopepd19:26
ahasenackUnit193: yeah, it is19:26
ahasenackI struggled to find a scenario where someone wouldn't use it19:26
sarnoldUnit193: you mean the wg-quick@ thingy?19:26
ahasenackjust wrote "if for some reason you cannot install wireguard-tools, or don't want to, then  you can ...."19:27
ahasenackI do see this flexibility a nice point in favor of wireguard, though19:27
ahasenacknot that netplan or systemd-networkd are better, but just the fact you *could* use them, is something nice to have, and in favor of the design I think19:27
sarnoldyeah,it's just too bad it's not there yet19:28
ahasenackI could try network-manager next19:28
ahasenacklet's see how it is in jammy19:29
ahasenackhm, the integration isn't super nice, it doesn't show up in the top right network menu as one interface to activate or deactivate19:33
ahasenackpresumably it can only be driven via the nm cli19:33
Unit193It shows up as a VPN option.19:44
ahasenackI don't see it19:44
ahasenackmaybe I'm missing a package?19:44
ahasenackI had to use nm-connection-editor19:44
ahasenackthen I deactivated it with nmcli 19:45
ahasenackand now it doesn't show up in the nmcli devices list anymore, but is still in nm-connection-editor19:45
ahasenackit doesn't look like it's saving the private key19:46
ahasenackbut yeah, I don't see it in the network menu on the top right of gnome-shell desktop19:47
Unit193I use network-manager-gnome.19:54
ahasenackyeah, it's what I have. Do you see the wireguard connection in the top right menu, that one that shows the network status?19:54
ahasenackI see wired, wifi, openvpn, and bluetooth19:55
Unit193I specifically wanted to hide it, as it had the VPN locked icon when I use that VPN for vLAN instead.20:00
Unit193But it had the lock icon when activated and it was in the VPN submenu of the tray icon.20:00
ahasenackUnit193: which ubuntu release?20:02
Unit193It's Xfce, I didn't know GNOME still used network-manager-gnome even.20:03
ahasenackah, well, we are comparing different things then20:03
Unit193A bit, but nm does have it, and -gnome does expose it.  Weird that GNOME doesn't.20:05
ahasenackUnit193: what's the best practice to add another peer to an existing config without disrupting the existing connections? Write a config snippet with just the new [Peer] section, and use wg addconf, and then wg syncconf to merge it back to the main config?20:19
ahasenackor just update the main config with the new [Peer] and run wg setconf?20:19
ahasenackor something else?20:19
Unit193ahasenack: I'd do it just by adding it to the main config and systemctl reload wg-quick@wg020:30
ahasenackI just tested:20:33
ahasenacka) add the new [Peer] to the wg0.conf file20:33
ahasenackb) run wg-quick strip wgnet020:33
ahasenackwell, wg020:33
ahasenackthat shows the new peer20:33
ahasenackand then maybe some wg command to set it on the interface, live20:33
Unit193ExecReload=/bin/bash -c 'exec /usr/bin/wg syncconf %i <(exec /usr/bin/wg-quick strip %i)'20:33
ahasenackah, reload does that already20:34
Unit193Yes, that's why I said just reload. :>20:34
Unit193I poked zx2c4 about adding that a while ago.20:35
ahasenackand here I was doubting it would all work out of the box20:35
ahasenacknice packaging20:35
sarnold:D20:35
ahasenackcool, I had `watch wg` running elsewhere, and the reload action added the new peer20:36
ahasenackand the existing one still shows "latest handshake" about 48min ago, so it wasn't disrupted20:37
Unit193The goal is kinda to make it easy enough anyone can use it.  Looking at WireGuard and OpenVPN, the former is seemingly faster and seems easier to me, so why not? :320:37
Unit193I know an IRC network that links it's servers over WireGuard, sooo...there's that.20:37
ahasenackindeed, nobody likes netsplits20:37
Unit193sarnold: No, not Libera either. :P20:38
sarnoldhehe, I was going through that in my mind .. "on the one hand it's pretty cool, on the other hand, that's a lot of host keys to juggle"20:39
Unit193You say that as if the TLS certs aren't already that.20:39
sarnold"let acme sort it out"20:41
ahasenackwhat one could say is annoying is that the key has no metadata associated with it, at all20:43
ahasenackso unless you organize yourself, just inspecting the key won't tell you who it belongs to20:43
ahasenackwhich can be a plus too20:43
Unit193Yeah, adding an alias in the config for it to show in `wg` output would be nice.20:43
ahasenackcompounded with the fact that you don't use files for the keys in the config20:44
ahasenackjust the content itself20:44
ahasenackyeah, a Description= or Name= field in the config20:44
ahasenackwhich, if present, would be shown in the wg output20:44
sarnoldsticking keys in the config feels pretty dangerous imho; people pastebin configs *all the time* and remembering to strip out the keys first is asking for trouble20:45
sarnoldor throw configs in git..20:45
Unit193wg | grep -c peer: → 11 :(20:46
sarnoldwow :)20:46
ahasenackUnit193: I was just reminded in #wireguard that the systemd reload action won't create any routes, for example, like wg-quick would when bringing the interface up from scratch20:47
ahasenackUnit193: yeah, good point, I'll add that to the doc20:48
Unit193Good point?  What point?20:48
ahasenackabout the private key being in the config file, and people pasting the config thinking it has only config, not secrets20:49
Unit193And yeah that's noteworthy indeed.  I wouldn't say I'm a WireGuard expert, btw.  I only use it.20:49
Unit193...If I can take credit for sarnold's ideas, I'm going to look *so* much smarter very quickly. :D20:49
sarnoldonly if I can offload the doozies, too!20:50
ahasenackoops, true20:50
ahasenacksorry sarnold 20:50
sdezielahasenack: re private keys in config files, I instead do: `PostUp = wg set %i private-key /etc/wireguard/%i.key` and the .key file is root accessible only20:53
ahasenackgood point, I've seen that in some config examples20:54
sdezielthat still leaves PresharedKey directly under each [Peer] though...20:54
ahasenackthe same trick doesn't apply?20:55
ahasenack[preshared-key <file path>]20:55
ahasenacklooks like it can be uset with "wg set" too, same command line, just one more parameter?20:55
sdezielyou can possibly load it but then it's harder because you don't have the `%i` trick20:55
ahasenackah, it's under a peer20:56
ahasenackofc20:56
sdezielyeah :/20:56
ahasenackand `wg showconf <interface>` strips out the wg-quick bits (it doesn't know about them)20:58
ahasenackthis overloading of wg and wg-quick configs is a bit odd20:59
ahasenacks/overloading/mixing up/20:59
sarnoldit certainly confuses me, heh21:01
ahasenackit's what allowed all these other tools to exist21:02
ahasenackwg-quick does what systemd-networkd does, netplan, network-manager, cloud-init even21:02
Unit193ifupdown!21:02
ahasenackactually, I don't know what tool cloud-init does, I doubt it interacts directly with the kernel21:02
ahasenackhehe21:02
ahasenackoh yeah, debian21:02
ahasenackjust checked, cloud-init is relying on wg-quick@<if>21:03
sarnoldifupdown2!21:04
ahasenackand just saw something we could make better: https://github.com/canonical/cloud-init/pull/1570/files#diff-2bd8283d4911d29b15ad597ad65cf85e585b9ff285df6b766d0708fad8d8d4acR4221:04
ubottuPull 1570 in canonical/cloud-init "Feature: Wireguard" [Merged]21:04
ahasenackthey are sayhing to install resolvconf, but we can use resolvectl in postup hooks21:04

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!