Matsar goyon bayan WireGuard VPN zuwa Android core

Google kara da cewa cikin babbar lambar codebase ta Android tare da ginanniyar tallafin VPN WireGuard. Lambar WireGuard ta koma canji Linux 5.4 kernels, ana haɓakawa don sakin dandali na Android 12 na gaba, daga babban kernel na Linux 5.6, wanda asali ya haɗa yarda WireGuard. Tallafin WireGuard na matakin Kernel kunna ta tsoho.

Har yanzu, masu haɓaka WireGuard don Android shawarar aikace-aikacen wayar hannu wanda ya riga ya kasance an share ta Google daga kasidar Google Play saboda hanyar haɗi zuwa shafin karɓar gudummawar a gidan yanar gizon aikin, wanda ya saba wa ka'idojin biyan kuɗi (ana yiwa gudummawar da alama ba za a karɓa ba idan ƙungiyar masu zaman kansu ta musamman rajista ba ta tattara su ba).

Bari mu tunatar da ku cewa VPN WireGuard ana aiwatar da shi bisa ga hanyoyin ɓoye na zamani, yana ba da babban aiki sosai, yana da sauƙin amfani, ba tare da rikitarwa ba kuma ya tabbatar da kansa a cikin manyan abubuwan jigilar kayayyaki waɗanda ke aiwatar da manyan hanyoyin zirga-zirga. Aikin yana tasowa tun 2015, an duba shi kuma tabbaci na yau da kullun hanyoyin ɓoyewa da aka yi amfani da su. WireGuard yana amfani da manufar kewayawa maɓallin ɓoyewa, wanda ya haɗa da haɗa maɓalli na sirri zuwa kowane cibiyar sadarwa da amfani da shi don ɗaure maɓallan jama'a.

Ana musayar maɓallai na jama'a don kafa haɗi ta hanya mai kama da SSH. Don yin shawarwari da maɓallai da haɗawa ba tare da gudanar da wani daemon daban ba a cikin sarari mai amfani, hanyar Noise_IK daga Tsare-tsaren Tsare-tsare na Noise Protocolkama da kiyaye maɓallai masu izini a cikin SSH. Ana yin watsa bayanai ta hanyar ɓoyewa a cikin fakitin UDP. Yana goyan bayan canza adireshin IP na uwar garken VPN (yawo) ba tare da cire haɗin haɗin tare da sake daidaita abokin ciniki ta atomatik ba.

Don boye-boye ana amfani dashi magudanar ruwa ChaCha20 da kuma tabbatar da saƙon algorithm (MAC) Poly1305, wanda Daniel Bernstein ya tsara (Daniel J. Bernstein), Tanya Lange
(Tanja Lange) da kuma Peter Schwabe. ChaCha20 da Poly1305 an sanya su azaman mafi sauri da aminci analogues na AES-256-CTR da HMAC, aiwatar da software wanda ke ba da damar cimma ƙayyadadden lokacin aiwatarwa ba tare da amfani da tallafin kayan aiki na musamman ba. Don samar da maɓallin sirrin da aka raba, ana amfani da ka'idar Diffie-Hellman a cikin aiwatarwa. Kwana25519, kuma Daniel Bernstein ya gabatar. Algorithm da ake amfani dashi don hashing shine BLAKE2s (RFC7693).

source: budenet.ru

Add a comment