START sys/net/wg 2025-03-08T02:55:30Z ==== ifconfig ==== openssl rand -base64 32 -out 11.key rm -f 11.pub.tmp ifconfig wg11 create || true ifconfig wg11 wgkey "`cat 11.key`" ifconfig wg11 | awk '/wgpubkey/{print $2}' >11.pub.tmp mv 11.pub.tmp 11.pub openssl rand -base64 32 -out 12.key rm -f 12.pub.tmp ifconfig wg12 create || true ifconfig wg12 wgkey "`cat 12.key`" ifconfig wg12 | awk '/wgpubkey/{print $2}' >12.pub.tmp mv 12.pub.tmp 12.pub openssl rand -base64 32 -out 13.key rm -f 13.pub.tmp ifconfig wg13 create || true ifconfig wg13 wgkey "`cat 13.key`" ifconfig wg13 | awk '/wgpubkey/{print $2}' >13.pub.tmp mv 13.pub.tmp 13.pub openssl rand -base64 32 -out 14.key rm -f 14.pub.tmp ifconfig wg14 create || true ifconfig wg14 wgkey "`cat 14.key`" ifconfig wg14 | awk '/wgpubkey/{print $2}' >14.pub.tmp mv 14.pub.tmp 14.pub # destroy WireGuard and routing domain loopback interfaces ifconfig wg11 destroy ifconfig lo11 destroy ifconfig: lo11: SIOCIFDESTROY: Device not configured *** Error 1 in target 'unconfig' (ignored) ifconfig wg12 destroy ifconfig lo12 destroy ifconfig: lo12: SIOCIFDESTROY: Device not configured *** Error 1 in target 'unconfig' (ignored) ifconfig wg13 destroy ifconfig lo13 destroy ifconfig: lo13: SIOCIFDESTROY: Device not configured *** Error 1 in target 'unconfig' (ignored) ifconfig wg14 destroy ifconfig lo14 destroy ifconfig: lo14: SIOCIFDESTROY: Device not configured *** Error 1 in target 'unconfig' (ignored) # create and configure WireGuard interfaces ifconfig wg11 create wgport 211 wgkey "`cat 11.key`" rdomain 11 ifconfig wg12 create wgport 212 wgkey "`cat 12.key`" rdomain 12 ifconfig wg13 create wgport 213 wgkey "`cat 13.key`" rdomain 13 ifconfig wg14 create wgport 214 wgkey "`cat 14.key`" rdomain 14 # local SRC, foreign DST, tunnel 4 ifconfig wg11 wgpeer "`cat 12.pub`" wgendpoint 127.0.0.1 212 wgaip 10.188.44.2/32 wgaip fdd7:e83e:66bc:46::2/128 # local SRC, foreign DST, tunnel 6 ifconfig wg13 wgpeer "`cat 14.pub`" wgendpoint ::1 214 wgaip 10.188.64.2/32 wgaip fdd7:e83e:66bc:66::2/128 # local SRC, foreign DST, tunnel 4 ifconfig wg11 inet 10.188.44.1/24 alias ifconfig wg11 inet6 fdd7:e83e:66bc:46::1/64 alias # local SRC, foreign DST, tunnel 6 ifconfig wg13 inet 10.188.64.1/24 alias ifconfig wg13 inet6 fdd7:e83e:66bc:66::1/64 alias # local DST, foreign SRC, tunnel 4 ifconfig wg12 wgpeer "`cat 11.pub`" wgendpoint 127.0.0.1 211 wgaip 10.188.44.1/32 wgaip fdd7:e83e:66bc:46::1/128 # local DST, foreign SRC, tunnel 6 ifconfig wg14 wgpeer "`cat 13.pub`" wgendpoint ::1 213 wgaip 10.188.64.1/32 wgaip fdd7:e83e:66bc:66::1/128 # local DST, foreign SRC, tunnel 4 ifconfig wg12 inet 10.188.44.2/24 alias ifconfig wg12 inet6 fdd7:e83e:66bc:46::2/64 alias # local DST, foreign SRC, tunnel 6 ifconfig wg14 inet 10.188.64.2/24 alias ifconfig wg14 inet6 fdd7:e83e:66bc:66::2/64 alias sleep 1 # Wait until DAD for inet6 tunnel addresses has finished. ==== run-route-tunnel4-addr4-src-dst ==== # Get route to local address. /sbin/route -n -T 11 get 10.188.44.1 | grep 'interface: wg11$' interface: wg11 /sbin/route -n -T 11 get 10.188.44.1 | grep 'flags: .*,LOCAL' flags: # Get route to foreign address. /sbin/route -n -T 11 get 10.188.44.2 | grep 'interface: wg11$' interface: wg11 /sbin/route -n -T 11 get 10.188.44.2 | grep 'flags: .*,CLON' flags: ==== run-ping-tunnel4-addr4-src-dst ==== # Ping local address. /sbin/ping -n -w 1 -c 1 -V 11 10.188.44.1 PING 10.188.44.1 (10.188.44.1): 56 data bytes 64 bytes from 10.188.44.1: icmp_seq=0 ttl=255 time=0.029 ms --- 10.188.44.1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.029/0.029/0.029/0.000 ms # Ping foreign address. tcpdump -ni lo0 -w wg.pcap ip and udp port 211 or 212 or 213 or 214 or 0 & sleep 1 # Wait until tcpdump is up. tcpdump: listening on lo0, link-type LOOP /sbin/ping -n -w 1 -c 1 -V 11 10.188.44.2 PING 10.188.44.2 (10.188.44.2): 56 data bytes 64 bytes from 10.188.44.2: icmp_seq=0 ttl=255 time=1.126 ms --- 10.188.44.2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.126/1.126/1.126/0.000 ms sleep 1 # Wait until tcpdump has captured traffic. pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*' 5 packets received by filter 0 packets dropped by kernel # Check WireGuard encrypted traffic /usr/sbin/tcpdump -n -r wg.pcap | fgrep ': [wg] data ' 03:55:32.664362 127.0.0.1.211 > 127.0.0.1.212: [wg] data length 96 to 0xef6cb3c4 nonce 0 03:55:32.664446 127.0.0.1.212 > 127.0.0.1.211: [wg] data length 96 to 0x56dbdbf4 nonce 1 ==== run-badkey-tunnel4-addr4-src-dst ==== openssl rand -base64 32 -out bad.key # Ping foreign address with bad key. ifconfig wg11 wgkey "`cat bad.key`" ! /sbin/ping -n -w 1 -c 1 -V 11 10.188.44.2 PING 10.188.44.2 (10.188.44.2): 56 data bytes --- 10.188.44.2 ping statistics --- 1 packets transmitted, 0 packets received, 100.0% packet loss # Restore key and test it. ifconfig wg11 wgkey "`cat 11.key`" /sbin/ping -n -w 1 -c 1 -V 11 10.188.44.2 PING 10.188.44.2 (10.188.44.2): 56 data bytes 64 bytes from 10.188.44.2: icmp_seq=0 ttl=255 time=0.973 ms --- 10.188.44.2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.973/0.973/0.973/0.000 ms ==== run-route-tunnel4-addr4-dst-src ==== # Get route to local address. /sbin/route -n -T 12 get 10.188.44.2 | grep 'interface: wg12$' interface: wg12 /sbin/route -n -T 12 get 10.188.44.2 | grep 'flags: .*,LOCAL' flags: # Get route to foreign address. /sbin/route -n -T 12 get 10.188.44.1 | grep 'interface: wg12$' interface: wg12 /sbin/route -n -T 12 get 10.188.44.1 | grep 'flags: .*,CLON' flags: ==== run-ping-tunnel4-addr4-dst-src ==== # Ping local address. /sbin/ping -n -w 1 -c 1 -V 12 10.188.44.2 PING 10.188.44.2 (10.188.44.2): 56 data bytes 64 bytes from 10.188.44.2: icmp_seq=0 ttl=255 time=0.025 ms --- 10.188.44.2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.025/0.025/0.025/0.000 ms # Ping foreign address. tcpdump -ni lo0 -w wg.pcap ip and udp port 211 or 212 or 213 or 214 or 0 & sleep 1 # Wait until tcpdump is up. tcpdump: listening on lo0, link-type LOOP /sbin/ping -n -w 1 -c 1 -V 12 10.188.44.1 PING 10.188.44.1 (10.188.44.1): 56 data bytes 64 bytes from 10.188.44.1: icmp_seq=0 ttl=255 time=0.103 ms --- 10.188.44.1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.103/0.103/0.103/0.000 ms sleep 1 # Wait until tcpdump has captured traffic. pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*' 2 packets received by filter 0 packets dropped by kernel # Check WireGuard encrypted traffic /usr/sbin/tcpdump -n -r wg.pcap | fgrep ': [wg] data ' 03:55:36.793290 127.0.0.1.212 > 127.0.0.1.211: [wg] data length 96 to 0x8718f9a2 nonce 3 03:55:36.793324 127.0.0.1.211 > 127.0.0.1.212: [wg] data length 96 to 0x8f979180 nonce 2 ==== run-badkey-tunnel4-addr4-dst-src ==== # Ping foreign address with bad key. ifconfig wg12 wgkey "`cat bad.key`" ! /sbin/ping -n -w 1 -c 1 -V 12 10.188.44.1 PING 10.188.44.1 (10.188.44.1): 56 data bytes --- 10.188.44.1 ping statistics --- 1 packets transmitted, 0 packets received, 100.0% packet loss # Restore key and test it. ifconfig wg12 wgkey "`cat 12.key`" /sbin/ping -n -w 1 -c 1 -V 12 10.188.44.1 PING 10.188.44.1 (10.188.44.1): 56 data bytes 64 bytes from 10.188.44.1: icmp_seq=0 ttl=255 time=0.979 ms --- 10.188.44.1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.979/0.979/0.979/0.000 ms ==== run-route-tunnel4-addr6-src-dst ==== # Get route to local address. /sbin/route -n -T 11 get fdd7:e83e:66bc:46::1 | grep 'interface: wg11$' interface: wg11 /sbin/route -n -T 11 get fdd7:e83e:66bc:46::1 | grep 'flags: .*,LOCAL' flags: # Get route to foreign address. /sbin/route -n -T 11 get fdd7:e83e:66bc:46::2 | grep 'interface: wg11$' interface: wg11 /sbin/route -n -T 11 get fdd7:e83e:66bc:46::2 | grep 'flags: .*,CLON' flags: ==== run-ping-tunnel4-addr6-src-dst ==== # Ping local address. /sbin/ping6 -n -w 1 -c 1 -V 11 fdd7:e83e:66bc:46::1 PING fdd7:e83e:66bc:46::1 (fdd7:e83e:66bc:46::1): 56 data bytes 64 bytes from fdd7:e83e:66bc:46::1: icmp_seq=0 hlim=64 time=0.033 ms --- fdd7:e83e:66bc:46::1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.033/0.033/0.033/0.000 ms # Ping foreign address. tcpdump -ni lo0 -w wg.pcap ip and udp port 211 or 212 or 213 or 214 or 0 & sleep 1 # Wait until tcpdump is up. tcpdump: listening on lo0, link-type LOOP /sbin/ping6 -n -w 1 -c 1 -V 11 fdd7:e83e:66bc:46::2 PING fdd7:e83e:66bc:46::2 (fdd7:e83e:66bc:46::2): 56 data bytes 64 bytes from fdd7:e83e:66bc:46::2: icmp_seq=0 hlim=64 time=0.223 ms --- fdd7:e83e:66bc:46::2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.223/0.223/0.223/0.000 ms sleep 1 # Wait until tcpdump has captured traffic. pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*' 2 packets received by filter 0 packets dropped by kernel # Check WireGuard encrypted traffic /usr/sbin/tcpdump -n -r wg.pcap | fgrep ': [wg] data ' 03:55:40.934642 127.0.0.1.211 > 127.0.0.1.212: [wg] data length 112 to 0x6a371246 nonce 3 03:55:40.934741 127.0.0.1.212 > 127.0.0.1.211: [wg] data length 112 to 0x71ebe7d4 nonce 2 ==== run-badkey-tunnel4-addr6-src-dst ==== # Ping foreign address with bad key. ifconfig wg11 wgkey "`cat bad.key`" ! /sbin/ping6 -n -w 1 -c 1 -V 11 fdd7:e83e:66bc:46::2 PING fdd7:e83e:66bc:46::2 (fdd7:e83e:66bc:46::2): 56 data bytes --- fdd7:e83e:66bc:46::2 ping statistics --- 1 packets transmitted, 0 packets received, 100.0% packet loss # Restore key and test it. ifconfig wg11 wgkey "`cat 11.key`" /sbin/ping6 -n -w 1 -c 1 -V 11 fdd7:e83e:66bc:46::2 PING fdd7:e83e:66bc:46::2 (fdd7:e83e:66bc:46::2): 56 data bytes 64 bytes from fdd7:e83e:66bc:46::2: icmp_seq=0 hlim=64 time=0.989 ms --- fdd7:e83e:66bc:46::2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.989/0.989/0.989/0.000 ms ==== run-route-tunnel4-addr6-dst-src ==== # Get route to local address. /sbin/route -n -T 12 get fdd7:e83e:66bc:46::2 | grep 'interface: wg12$' interface: wg12 /sbin/route -n -T 12 get fdd7:e83e:66bc:46::2 | grep 'flags: .*,LOCAL' flags: # Get route to foreign address. /sbin/route -n -T 12 get fdd7:e83e:66bc:46::1 | grep 'interface: wg12$' interface: wg12 /sbin/route -n -T 12 get fdd7:e83e:66bc:46::1 | grep 'flags: .*,CLON' flags: ==== run-ping-tunnel4-addr6-dst-src ==== # Ping local address. /sbin/ping6 -n -w 1 -c 1 -V 12 fdd7:e83e:66bc:46::2 PING fdd7:e83e:66bc:46::2 (fdd7:e83e:66bc:46::2): 56 data bytes 64 bytes from fdd7:e83e:66bc:46::2: icmp_seq=0 hlim=64 time=0.031 ms --- fdd7:e83e:66bc:46::2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.031/0.031/0.031/0.000 ms # Ping foreign address. tcpdump -ni lo0 -w wg.pcap ip and udp port 211 or 212 or 213 or 214 or 0 & sleep 1 # Wait until tcpdump is up. tcpdump: listening on lo0, link-type LOOP /sbin/ping6 -n -w 1 -c 1 -V 12 fdd7:e83e:66bc:46::1 PING fdd7:e83e:66bc:46::1 (fdd7:e83e:66bc:46::1): 56 data bytes 64 bytes from fdd7:e83e:66bc:46::1: icmp_seq=0 hlim=64 time=0.146 ms --- fdd7:e83e:66bc:46::1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.146/0.146/0.146/0.000 ms sleep 1 # Wait until tcpdump has captured traffic. pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*' 2 packets received by filter 0 packets dropped by kernel # Check WireGuard encrypted traffic /usr/sbin/tcpdump -n -r wg.pcap | fgrep ': [wg] data ' 03:55:45.074456 127.0.0.1.212 > 127.0.0.1.211: [wg] data length 112 to 0x2cbdbde5 nonce 3 03:55:45.074507 127.0.0.1.211 > 127.0.0.1.212: [wg] data length 112 to 0xadede019 nonce 2 ==== run-badkey-tunnel4-addr6-dst-src ==== # Ping foreign address with bad key. ifconfig wg12 wgkey "`cat bad.key`" ! /sbin/ping6 -n -w 1 -c 1 -V 12 fdd7:e83e:66bc:46::1 PING fdd7:e83e:66bc:46::1 (fdd7:e83e:66bc:46::1): 56 data bytes --- fdd7:e83e:66bc:46::1 ping statistics --- 1 packets transmitted, 0 packets received, 100.0% packet loss # Restore key and test it. ifconfig wg12 wgkey "`cat 12.key`" /sbin/ping6 -n -w 1 -c 1 -V 12 fdd7:e83e:66bc:46::1 PING fdd7:e83e:66bc:46::1 (fdd7:e83e:66bc:46::1): 56 data bytes 64 bytes from fdd7:e83e:66bc:46::1: icmp_seq=0 hlim=64 time=0.990 ms --- fdd7:e83e:66bc:46::1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.990/0.990/0.990/0.000 ms ==== run-route-tunnel6-addr4-src-dst ==== # Get route to local address. /sbin/route -n -T 13 get 10.188.64.1 | grep 'interface: wg13$' interface: wg13 /sbin/route -n -T 13 get 10.188.64.1 | grep 'flags: .*,LOCAL' flags: # Get route to foreign address. /sbin/route -n -T 13 get 10.188.64.2 | grep 'interface: wg13$' interface: wg13 /sbin/route -n -T 13 get 10.188.64.2 | grep 'flags: .*,CLON' flags: ==== run-ping-tunnel6-addr4-src-dst ==== # Ping local address. /sbin/ping -n -w 1 -c 1 -V 13 10.188.64.1 PING 10.188.64.1 (10.188.64.1): 56 data bytes 64 bytes from 10.188.64.1: icmp_seq=0 ttl=255 time=0.025 ms --- 10.188.64.1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.025/0.025/0.025/0.000 ms # Ping foreign address. tcpdump -ni lo0 -w wg.pcap ip6 and udp port 211 or 212 or 213 or 214 or 0 & sleep 1 # Wait until tcpdump is up. tcpdump: listening on lo0, link-type LOOP /sbin/ping -n -w 1 -c 1 -V 13 10.188.64.2 PING 10.188.64.2 (10.188.64.2): 56 data bytes 64 bytes from 10.188.64.2: icmp_seq=0 ttl=255 time=1.088 ms --- 10.188.64.2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.088/1.088/1.088/0.000 ms sleep 1 # Wait until tcpdump has captured traffic. pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*' 5 packets received by filter 0 packets dropped by kernel # Check WireGuard encrypted traffic /usr/sbin/tcpdump -n -r wg.pcap | fgrep ': [wg] data ' 03:55:49.214203 ::1.213 > ::1.214: [wg] data length 96 to 0x16404882 nonce 0 03:55:49.214302 ::1.214 > ::1.213: [wg] data length 96 to 0xd091af62 nonce 1 ==== run-badkey-tunnel6-addr4-src-dst ==== # Ping foreign address with bad key. ifconfig wg13 wgkey "`cat bad.key`" ! /sbin/ping -n -w 1 -c 1 -V 13 10.188.64.2 PING 10.188.64.2 (10.188.64.2): 56 data bytes --- 10.188.64.2 ping statistics --- 1 packets transmitted, 0 packets received, 100.0% packet loss # Restore key and test it. ifconfig wg13 wgkey "`cat 13.key`" /sbin/ping -n -w 1 -c 1 -V 13 10.188.64.2 PING 10.188.64.2 (10.188.64.2): 56 data bytes 64 bytes from 10.188.64.2: icmp_seq=0 ttl=255 time=0.986 ms --- 10.188.64.2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.986/0.986/0.986/0.000 ms ==== run-route-tunnel6-addr4-dst-src ==== # Get route to local address. /sbin/route -n -T 14 get 10.188.64.2 | grep 'interface: wg14$' interface: wg14 /sbin/route -n -T 14 get 10.188.64.2 | grep 'flags: .*,LOCAL' flags: # Get route to foreign address. /sbin/route -n -T 14 get 10.188.64.1 | grep 'interface: wg14$' interface: wg14 /sbin/route -n -T 14 get 10.188.64.1 | grep 'flags: .*,CLON' flags: ==== run-ping-tunnel6-addr4-dst-src ==== # Ping local address. /sbin/ping -n -w 1 -c 1 -V 14 10.188.64.2 PING 10.188.64.2 (10.188.64.2): 56 data bytes 64 bytes from 10.188.64.2: icmp_seq=0 ttl=255 time=0.025 ms --- 10.188.64.2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.025/0.025/0.025/0.000 ms # Ping foreign address. tcpdump -ni lo0 -w wg.pcap ip6 and udp port 211 or 212 or 213 or 214 or 0 & sleep 1 # Wait until tcpdump is up. tcpdump: listening on lo0, link-type LOOP /sbin/ping -n -w 1 -c 1 -V 14 10.188.64.1 PING 10.188.64.1 (10.188.64.1): 56 data bytes 64 bytes from 10.188.64.1: icmp_seq=0 ttl=255 time=0.165 ms --- 10.188.64.1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.165/0.165/0.165/0.000 ms sleep 1 # Wait until tcpdump has captured traffic. pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*' 2 packets received by filter 0 packets dropped by kernel # Check WireGuard encrypted traffic /usr/sbin/tcpdump -n -r wg.pcap | fgrep ': [wg] data ' 03:55:53.343248 ::1.214 > ::1.213: [wg] data length 96 to 0x4924ba15 nonce 3 03:55:53.343332 ::1.213 > ::1.214: [wg] data length 96 to 0x4d818480 nonce 2 ==== run-badkey-tunnel6-addr4-dst-src ==== # Ping foreign address with bad key. ifconfig wg14 wgkey "`cat bad.key`" ! /sbin/ping -n -w 1 -c 1 -V 14 10.188.64.1 PING 10.188.64.1 (10.188.64.1): 56 data bytes --- 10.188.64.1 ping statistics --- 1 packets transmitted, 0 packets received, 100.0% packet loss # Restore key and test it. ifconfig wg14 wgkey "`cat 14.key`" /sbin/ping -n -w 1 -c 1 -V 14 10.188.64.1 PING 10.188.64.1 (10.188.64.1): 56 data bytes 64 bytes from 10.188.64.1: icmp_seq=0 ttl=255 time=0.985 ms --- 10.188.64.1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.985/0.985/0.985/0.000 ms ==== run-route-tunnel6-addr6-src-dst ==== # Get route to local address. /sbin/route -n -T 13 get fdd7:e83e:66bc:66::1 | grep 'interface: wg13$' interface: wg13 /sbin/route -n -T 13 get fdd7:e83e:66bc:66::1 | grep 'flags: .*,LOCAL' flags: # Get route to foreign address. /sbin/route -n -T 13 get fdd7:e83e:66bc:66::2 | grep 'interface: wg13$' interface: wg13 /sbin/route -n -T 13 get fdd7:e83e:66bc:66::2 | grep 'flags: .*,CLON' flags: ==== run-ping-tunnel6-addr6-src-dst ==== # Ping local address. /sbin/ping6 -n -w 1 -c 1 -V 13 fdd7:e83e:66bc:66::1 PING fdd7:e83e:66bc:66::1 (fdd7:e83e:66bc:66::1): 56 data bytes 64 bytes from fdd7:e83e:66bc:66::1: icmp_seq=0 hlim=64 time=0.032 ms --- fdd7:e83e:66bc:66::1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.032/0.032/0.032/0.000 ms # Ping foreign address. tcpdump -ni lo0 -w wg.pcap ip6 and udp port 211 or 212 or 213 or 214 or 0 & sleep 1 # Wait until tcpdump is up. tcpdump: listening on lo0, link-type LOOP /sbin/ping6 -n -w 1 -c 1 -V 13 fdd7:e83e:66bc:66::2 PING fdd7:e83e:66bc:66::2 (fdd7:e83e:66bc:66::2): 56 data bytes 64 bytes from fdd7:e83e:66bc:66::2: icmp_seq=0 hlim=64 time=0.183 ms --- fdd7:e83e:66bc:66::2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.183/0.183/0.183/0.000 ms sleep 1 # Wait until tcpdump has captured traffic. pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*' 3 packets received by filter 0 packets dropped by kernel # Check WireGuard encrypted traffic /usr/sbin/tcpdump -n -r wg.pcap | fgrep ': [wg] data ' 03:55:57.484608 ::1.213 > ::1.214: [wg] data length 112 to 0xc44ae58b nonce 3 03:55:57.484701 ::1.214 > ::1.213: [wg] data length 112 to 0x0a7f6d09 nonce 2 ==== run-badkey-tunnel6-addr6-src-dst ==== # Ping foreign address with bad key. ifconfig wg13 wgkey "`cat bad.key`" ! /sbin/ping6 -n -w 1 -c 1 -V 13 fdd7:e83e:66bc:66::2 PING fdd7:e83e:66bc:66::2 (fdd7:e83e:66bc:66::2): 56 data bytes --- fdd7:e83e:66bc:66::2 ping statistics --- 1 packets transmitted, 0 packets received, 100.0% packet loss # Restore key and test it. ifconfig wg13 wgkey "`cat 13.key`" /sbin/ping6 -n -w 1 -c 1 -V 13 fdd7:e83e:66bc:66::2 PING fdd7:e83e:66bc:66::2 (fdd7:e83e:66bc:66::2): 56 data bytes 64 bytes from fdd7:e83e:66bc:66::2: icmp_seq=0 hlim=64 time=1.001 ms --- fdd7:e83e:66bc:66::2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 1.001/1.001/1.001/0.000 ms ==== run-route-tunnel6-addr6-dst-src ==== # Get route to local address. /sbin/route -n -T 14 get fdd7:e83e:66bc:66::2 | grep 'interface: wg14$' interface: wg14 /sbin/route -n -T 14 get fdd7:e83e:66bc:66::2 | grep 'flags: .*,LOCAL' flags: # Get route to foreign address. /sbin/route -n -T 14 get fdd7:e83e:66bc:66::1 | grep 'interface: wg14$' interface: wg14 /sbin/route -n -T 14 get fdd7:e83e:66bc:66::1 | grep 'flags: .*,CLON' flags: ==== run-ping-tunnel6-addr6-dst-src ==== # Ping local address. /sbin/ping6 -n -w 1 -c 1 -V 14 fdd7:e83e:66bc:66::2 PING fdd7:e83e:66bc:66::2 (fdd7:e83e:66bc:66::2): 56 data bytes 64 bytes from fdd7:e83e:66bc:66::2: icmp_seq=0 hlim=64 time=0.031 ms --- fdd7:e83e:66bc:66::2 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.031/0.031/0.031/0.000 ms # Ping foreign address. tcpdump -ni lo0 -w wg.pcap ip6 and udp port 211 or 212 or 213 or 214 or 0 & sleep 1 # Wait until tcpdump is up. tcpdump: listening on lo0, link-type LOOP /sbin/ping6 -n -w 1 -c 1 -V 14 fdd7:e83e:66bc:66::1 PING fdd7:e83e:66bc:66::1 (fdd7:e83e:66bc:66::1): 56 data bytes 64 bytes from fdd7:e83e:66bc:66::1: icmp_seq=0 hlim=64 time=0.163 ms --- fdd7:e83e:66bc:66::1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.163/0.163/0.163/0.000 ms sleep 1 # Wait until tcpdump has captured traffic. pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*' 2 packets received by filter 0 packets dropped by kernel # Check WireGuard encrypted traffic /usr/sbin/tcpdump -n -r wg.pcap | fgrep ': [wg] data ' 03:56:01.614217 ::1.214 > ::1.213: [wg] data length 112 to 0x03e50bff nonce 3 03:56:01.614295 ::1.213 > ::1.214: [wg] data length 112 to 0xc271ea78 nonce 2 ==== run-badkey-tunnel6-addr6-dst-src ==== # Ping foreign address with bad key. ifconfig wg14 wgkey "`cat bad.key`" ! /sbin/ping6 -n -w 1 -c 1 -V 14 fdd7:e83e:66bc:66::1 PING fdd7:e83e:66bc:66::1 (fdd7:e83e:66bc:66::1): 56 data bytes --- fdd7:e83e:66bc:66::1 ping statistics --- 1 packets transmitted, 0 packets received, 100.0% packet loss # Restore key and test it. ifconfig wg14 wgkey "`cat 14.key`" /sbin/ping6 -n -w 1 -c 1 -V 14 fdd7:e83e:66bc:66::1 PING fdd7:e83e:66bc:66::1 (fdd7:e83e:66bc:66::1): 56 data bytes 64 bytes from fdd7:e83e:66bc:66::1: icmp_seq=0 hlim=64 time=0.998 ms --- fdd7:e83e:66bc:66::1 ping statistics --- 1 packets transmitted, 1 packets received, 0.0% packet loss round-trip min/avg/max/std-dev = 0.998/0.998/0.998/0.000 ms ==== unconfig ==== # destroy WireGuard and routing domain loopback interfaces ifconfig wg11 destroy ifconfig lo11 destroy ifconfig wg12 destroy ifconfig lo12 destroy ifconfig wg13 destroy ifconfig lo13 destroy ifconfig wg14 destroy ifconfig lo14 destroy PASS sys/net/wg Duration 0m35.46s