top | item 33700136

Show HN: Wiretap – Transparent WireGuard proxy server without root

118 points| sleepyink | 3 years ago |github.com

17 comments

order

learndeeply|3 years ago

Hilarious name for an open source project released by a government lab.

pfundstein|3 years ago

Based on the name initially I thought Wiretap was a MITM proxy for Wireguard.

jordemort|3 years ago

Wireproxy can do similar stuff: https://github.com/octeep/wireproxy

(Disclaimer: I am a contributor to Wireproxy)

omgtehlion|3 years ago

Thanks for the link! IIUIC, wireproxy is not similar, but complementary: you can run wiretap on the server-side and wireproxy on the client and have a complete user-space solution.

pfundstein|3 years ago

Much better name. Initially I thought Wiretap was a MITM proxy for Wireguard.

lorenzo95|3 years ago

The focus here is on the fact that it runs in userspace. Tailscale in userspace does something similar where it receives packet "meta-data" and then just creates the packet that came through the tunnel and sends it out the lan interface. Is this what happens here? I do like the docker option ;)

sleepyink|3 years ago

Yes! It’s very similar to what Tailscale does in userspace mode, written as more of a standalone utility

random021|3 years ago

I’m not sure to understand what makes it different from WireGuard. Could someone eli5 ?

sleepyink|3 years ago

Vanilla WireGuard doesn't provide a way to run a peer in userspace that can proxy traffic between another peer and an endpoint such as a web server because you need to be privileged to do things like work with raw packets. However, https://github.com/WireGuard/wireguard-go is a userspace implementation of WireGuard and has recently incorporated Google's userspace networking stack. This project uses these two userspace tools to "fake" a privileged WireGuard peer that proxies TCP, UDP, and (a small subset of) ICMP. It was written as a pentesting/red team utility for my team but it can also serve as a general makeshift VPN when you don't have privileges on a box you want to proxy through.

Edit: typo

stevefan1999|3 years ago

Userspace capability. Especially when running inside containers.

omgtehlion|3 years ago

this replaces WG + some iptables config in a single user-space solution (no root required)

luch|3 years ago

Cool project, but AV are gonna flag the shit out of it.

ssf and other tunneling techno are already abused by a lot of threat actors ...