-
Notifications
You must be signed in to change notification settings - Fork 415
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is this project dead/abandoned? #407
Comments
I doubt it tbh, Cloudflare uses BoringTun pretty extensively within CF I think. My guess is just that BoringTun is "done" and doesn't really need much else |
Have you ever seen done project that is not gone? (I would expect at least some security patches.) |
This seems to be a pattern with the official Wireguard project too:
My guess is that Wireguard is a simpler protocol, so needs less maintenance, considering that the official implementation apparently only uses around 4,000 lines of code |
There are plenty of open issues and pull requests for boringtun, |
I created a fork, altuntun, https://github.com/cableguard/altuntun/blob/main/README.md with several PRs applied for better performance, support of namespaces and refactored variable names for readability. I want to add credits to the authors of the PRs (todo this week) and carry on improving wireguard in Rust, and work closely with the main wireguard maintainers in the near future. Looking forward for active collaborations if you are interested. |
@cableguard the fork is a good start while seemingly no one at cloudflare is responding… could be something to do with them moving to MASQUE for warp but it would be nice to have… something |
+1 on the need for communication from Cloudflare on what is going on here |
Is there a particular reason why you did not retain the git history of this project when creating your fork? I would like to switch to a more maintained version of boringtun but I don't want to re-audit your implementation. It would have been great to just audit your improvements. |
Hi @thomaseizinger The reason is that I created a fork that implemented very extensive changes in the way boringtun performs authentication, using NEAR Protocol non fungible tokens, I worked on this for a year and a half more or less, and I had to change the names of a large proportion of variables in order to understand and modify the code. As I could see, some people where unhappy about the maintenance of this project, so I removed all the NFT authentication code and revert it to a "vanilla wireguard" implementation, also I added all patches that were long standing and I found useful. So unfortunately I can't guarantee is flaw free, what I can guarantee is that nothing has been changed in a malicious way. |
I see, thanks for laying this out! We'll probably maintain our own fork then in the hope that some things can actually be upstreamed. |
The last commit is currently 7 months old: f672bb6
The last status update (I have found) is 12 months old: #344 (comment)
The text was updated successfully, but these errors were encountered: