WireGuard Is Two Things

(proxylity.com)

62 points | by mlhpdx 10 hours ago ago

27 comments

  • tptacek 9 hours ago

    This is almost true, but not quite. WireGuard is a protocol, but it's also the Linux kernel implementation of that protocol; there are design decisions in the protocol that specifically support software security goals of the kernel implementation. For instance, it's designed to be possible to implement WireGuard without demand dynamic allocation.

    • mlhpdx 2 hours ago

      It would have been interesting if WireGuard had been implemented as a transport, but I was speaking conceptually.

      The fact I had to write the library speaks to how conflated they are, on the other hand.

      Edit: Making it allocation free sounds like an interesting challenge.

    • Cyphase 9 hours ago

      This is why WireGuard has continued to work even when a peer is otherwise unusable from low free memory. :)

    • zekica 9 hours ago

      Minor nitpick: dynamic memory allocation is not used when processing packets, but is when adding/removing clients via netlink.

  • josh3736 8 hours ago

    This is a clever reuse of WireGuard's cryptographic design, and may indeed make sense as a way to slap some low-overhead encryption on top of your app's existing UDP packets.

    However, it's definitely not a replacement for TCP in the way the article implies. WireGuard-the-VPN works because the TCP inside of it handles retransmission and flow control. Going raw WireGuard means that's now entirely up to you.

    So this might be a good choice if you're doing something realtime where a small number of dropped packets don't particularly matter (such as the sensor updates the article illustrates).

    But if you still need all your packets in order, this is probably a bad idea. Instead, I'd consider using QUIC (HTTP/3's UDP protocol), which brings many of the benefits here (including migration of connections across source IP address and no head-of-line-blocking between streams multiplexed inside the connection) without sacrificing TCP's reliability guarantees. And as the protocol powering 75% of web browsing¹, is a pretty safe choice of transport.

    ¹ https://blog.apnic.net/2025/06/17/a-quic-progress-report/

    • mlhpdx 2 hours ago

      > However, it's definitely not a replacement for TCP in the way the article implies.

      UDP isn’t TCP and that’s kind of the point. For a large number of use cases the pain TLS imparts isn’t worth it.

      QUIC is flexible and fabulous, but heavyweight and not fit for light hardware. it also begs the question “If the browser supported raw UDP what percent of traffic would use it?”

      • 2 hours ago
        [deleted]
  • viceconsole 9 hours ago

    The post mentions the deficiencies of TCP for mobile devices over unreliable links, but I've had nothing but trouble with Wireguard when connecting from phones via mobile data.

    I suspect it's due to my mobile operator doing traffic shaping / QoS that deprioritizes UDP VPN.

    In contrast, connecting to OpenVPN over TCP was a huge improvement. Not at all what I expected.

    • Cyphase 9 hours ago

      Counter-anecdote: I've been using WireGuard on Android for years with no particular issues to speak of. 0.0.0.0/0 to my home network. I often forget to enable WiFi at home and don't notice (I often have it disabled when out).

    • bradley13 8 hours ago

      I suspect ya you're right - nothing to do with Wireguard. I set it up do I could VPN into my home network from my phone. More than once, I have forgotten to turn it off. Everything worked, and I only noticed days later. Very robust, in my anecdotal experience.

    • wakeywakeywakey 9 hours ago

      You probably just need to lower your MTU if your phone is getting an ip6 address.

      • viceconsole 8 hours ago

        Even with the minimum of 1280 for IPv6, nothing improved.

        • josh3736 8 hours ago

          The much more likely culprit is your VPN server's port. If it's running on some no-name port (such as the default 51820), that's likely to get throttled.

          I'd bet that switching your VPN server port to 443 would solve the problem, since HTTP/3 runs on 443/udp.

  • laughinghan 8 hours ago

    Does it bother anyone else when an article is so clearly written by an LLM? Other than being 3x longer than it needs to be the content is fine as far as I can tell, but I find the voice it’s written in extremely irritating.

    I think it’s specifically the resemblance to the clickbaity writing style that Twitter threads and LinkedIn and Facebook influencer posts are written in, presumably optimized for engagement/social media virality. I’m not totally sure what I want instead, I’m pretty sure I’ve seen the same tactics used in writing I admired, but probably much more sparingly?

    What is it that makes tptacek’s writing or Cloudflare’s blog etc so much more readable by comparison? Is it just variety? Maybe these tactics should be reserved for intro paragraphs (of the article but also of individual sections/chapters might be fine too) to motivate you to read on, whereas the meat of the article (or section) should have more substance and less clickbaiting hooks?

    • laughinghan 8 hours ago

      Specifically there’s a lot of clickbaity constructions like: “setup: payoff” or “sentence fragment, similar fragment, maybe another similar fragment”.

      This paragraph has both:

      > The symptom is familiar: a stream that occasionally "locks up" briefly before catching up, jitter in audio or video, or a latency spike that appears to come from nowhere, a "hang" in the application when it gets blocked waiting for a packet. It comes from a single packet forcing the entire pipeline to pause. The underlying network recovered quickly; TCP's ordering guarantee is what made it visible.

      So does this!

      > WireGuard's protocol is a fundamentally different design point. It's stateless — there's no connection to establish upfront, no session to track, and no certificate authority in the picture. Two keys, a compact handshake, and you're encrypting. And unlike TLS, WireGuard's cryptographic choices are fixed: Noise_IKpsk2 for key exchange, ChaCha20-Poly1305 for authenticated encryption. There's nothing to misconfigure.

      • mlhpdx 7 hours ago

        Everything I write is thought to be LLM generated by someone. Sorry my style is irritating you, but that’s just me.

        • laughinghan 6 hours ago

          Are you pretending you didn’t even have an LLM help you reword it before publishing? Because that would be an obvious lie. If you were to propose a sufficiently trustworthy way to prove one way or another, I’d bet $1,000 on it.

          • mlhpdx 2 hours ago

            Of course I did, and does it matter?

    • mlhpdx 2 hours ago

      I’d prefer purely technical writing; if it were as effective. The audience is broad.

  • extr 9 hours ago

    Hard to read due to LLM generated prose.

    • nake89 8 hours ago

      Yeah, it's quite bad. Just some of the classics:

      - "Why This Matters"

      - "That's accurate, but it's only half the answer — and the less interesting half"

      - "this isn't an edge case. It's routine."

      I'm at the point, I would just rather read something somebody actually wrote even if it's not grammatically perfect and has lots of spelling mistakes.

      • mlhpdx 7 hours ago

        Unfortately the expectation of readers, and algorithms, at large is perfection.

        • Fnoord an hour ago

          If this contained various grammer mystaeks, but interesting content, it wouldn't have been flagged. As usual with LLM, it is based on other content. Show me the source, we used to say to binaries... ¿Que pasa?

        • seanhunter an hour ago

          No. It’s authenticity instead of llm-generated blogvertising.

    • peddling-brink 8 hours ago

      You're absolutely right!

  • Hamuko 8 hours ago

    For a moment I thought that Tunnelblick had added WireGuard support. But no, it's probably just an AI hallucination.

  • bingo777 9 hours ago

    [dead]