Table of contents:
WireGuard is a VPN protocol.
WireGuard was initially started by Jason A. Donenfield in 2015 as a Linux kernel module. As of January 2020, it has been accepted for Linux v5.6. Support for other platforms (macOS, Android, iOS, BSD, and Windows) is provided by a cross-platform wireguard-go implementation.
- UDP: WireGuard uses UDP as its transport protocol. There is no standard port and typically WireGuard is detected through heuristics.
WireGuard dissection and decryption support was added in Wireshark 3.0 (Bug 15011).
As of Wireshark 3.2, decryption secrets can be embedded in a pcapng file (Bug 15571).
WireGuard static keys (wg.keys): A table of long-term static keys to enable WireGuard peer identification or partial decryption
Dissect transport data (wg.dissect_packet): Whether the IP dissector should dissect decrypted transport data.
Key log filename (wg.keylog_file): The path to the file which contains a list of secrets (see Key Log Format)
The test suite contains two capture samples:
Screenshot (with decryption keys configured): https://twitter.com/Lekensteyn/status/1027938328203669505
A complete list of WireGuard display filter fields can be found in the display filter reference.
The protocol name is
To filter WireGuard traffic while capturing, you can use:
udp[8:1] >= 1 and udp[8:1] <= 4 and udp[9:1] == 0 and udp[10:2] == 0
This filter works like the WireGuard heuristics. It tests the first byte for a valid message type (1, 2, 3, or 4) and checks that the next three reserved bytes are zero.
Alternatively if you know the UDP port number, you can filter it like this:
udp port 51820
Decryption can be enabled by supplying a key log file. This text file must follow the following format:
Every line consists of the key type, equals sign ('='), and the base64-encoded 32-byte key with optional spaces before and in between. The key type is one of
PRESHARED_KEY. This matches the output of extract-handshakes.sh
PRESHARED_KEY line is linked to a session matched by a previous
LOCAL_STATIC_PRIVATE_KEY and potentially
PRESHARED_KEY are long-term secrets, users SHOULD only store non-production keys, or ensure proper protection of the pcapng file.
Wireshark can decrypt WireGuard traffic when appropriate keys are configured.
On Linux, one can use kprobes to tap into the WireGuard kernel module and extract keys for new sessions from memory.
Assuming that your WireGuard traffic goes over the wlan0 interface using port 51820:
sudo /path/to/extract-handshakes.sh > wg.keys & tshark -i wlan0 -owg.keylog_file:wg.keys -f 'udp port 51820'
Note that the extract-handshake.sh requires a special offsets file which is specific to a kernel configuration.
Step-by-step instructions for these are not yet available for the version merged in Linux v5.6. What you basically have to do is to build offset-finder.c with the headers from drivers/net/wireguard/ and kernel headers and config matching your current kernel.
- https://www.wireguard.com/ - Official website
Imported from https://wiki.wireshark.org/WireGuard on 2020-08-11 23:27:32 UTC