zlacker

[parent] [thread] 7 comments
1. heavys+(OP)[view] [source] 2026-01-12 06:40:12
Someone would need your 256-bit key to do anything to an exposed Wireguard port.
replies(1): >>eqvino+Mf
2. eqvino+Mf[view] [source] 2026-01-12 09:00:39
>>heavys+(OP)
In theory.

In the same theory, someone would need your EC SSH key to do anything with an exposed SSH port.

Practice is a separate question.

replies(2): >>bjt123+RI >>JasonA+UJ
◧◩
3. bjt123+RI[view] [source] [discussion] 2026-01-12 12:43:42
>>eqvino+Mf
SSH is TCP though and the outside world can initiate a handshake, the point being that wireguard silently discards unauthenticated traffic - there's no way they can know the port is open for listening.
replies(1): >>eqvino+9J3
◧◩
4. JasonA+UJ[view] [source] [discussion] 2026-01-12 12:51:12
>>eqvino+Mf
Not even remotely comparable.

Wireguard is explicitly designed to not allow unauthenticated users to do anything, whereas SSH is explicitly designed to allow unauthenticated users to do a whole lot of things.

replies(1): >>eqvino+fJ3
◧◩◪
5. eqvino+9J3[view] [source] [discussion] 2026-01-13 10:24:35
>>bjt123+RI
Uh, you know you can scan UDP ports just fine, right? Hosts reply with an ICMP destination unreachable / port unreachable (3/3 in IPv4, 1/4 in IPv6) if the port is closed. Discarding packets won't send that ICMP error.

It's slow to scan due to ICMP ratelimiting, but you can parallelize.

(Sure, you can disable / firewall drop that ICMP error… but then you can do the same thing with TCP RSTs.)

replies(1): >>apstls+vf6
◧◩◪
6. eqvino+fJ3[view] [source] [discussion] 2026-01-13 10:25:19
>>JasonA+UJ
> SSH is explicitly designed to allow unauthenticated users to do a whole lot of things

I'm sorry, what?

◧◩◪◨
7. apstls+vf6[view] [source] [discussion] 2026-01-13 22:03:04
>>eqvino+9J3
That's why you discard ICMP errors.
replies(1): >>eqvino+hc7
◧◩◪◨⬒
8. eqvino+hc7[view] [source] [discussion] 2026-01-14 05:09:16
>>apstls+vf6
If anything, that's why you discard ICMP port unreachable, which I assume you meant.

If you're blanket dropping all ICMP errors, you're breaking PMTUD. There's a special place reserved in hell for that.

(And if you're firewalling your ICMP, why aren't you firewalling TCP?)

[go to top]