==== ifconfig ====
openssl rand -base64 32 -out 29.key
rm -f 29.pub.tmp
doas -n ifconfig wg29 create || true
doas -n ifconfig wg29 wgkey "`cat 29.key`"
doas -n ifconfig wg29 | awk '/wgpubkey/{print $2}' >29.pub.tmp
mv 29.pub.tmp 29.pub
openssl rand -base64 32 -out 30.key
rm -f 30.pub.tmp
doas -n ifconfig wg30 create || true
doas -n ifconfig wg30 wgkey "`cat 30.key`"
doas -n ifconfig wg30 | awk '/wgpubkey/{print $2}' >30.pub.tmp
mv 30.pub.tmp 30.pub
openssl rand -base64 32 -out 31.key
rm -f 31.pub.tmp
doas -n ifconfig wg31 create || true
doas -n ifconfig wg31 wgkey "`cat 31.key`"
doas -n ifconfig wg31 | awk '/wgpubkey/{print $2}' >31.pub.tmp
mv 31.pub.tmp 31.pub
openssl rand -base64 32 -out 32.key
rm -f 32.pub.tmp
doas -n ifconfig wg32 create || true
doas -n ifconfig wg32 wgkey "`cat 32.key`"
doas -n ifconfig wg32 | awk '/wgpubkey/{print $2}' >32.pub.tmp
mv 32.pub.tmp 32.pub
# destroy WireGuard and routing domain loopback interfaces
doas -n ifconfig wg29 destroy
doas -n ifconfig lo29 destroy
ifconfig: lo29: SIOCIFDESTROY: Device not configured
*** Error 1 in target 'unconfig' (ignored)
doas -n ifconfig wg30 destroy
doas -n ifconfig lo30 destroy
ifconfig: lo30: SIOCIFDESTROY: Device not configured
*** Error 1 in target 'unconfig' (ignored)
doas -n ifconfig wg31 destroy
doas -n ifconfig lo31 destroy
ifconfig: lo31: SIOCIFDESTROY: Device not configured
*** Error 1 in target 'unconfig' (ignored)
doas -n ifconfig wg32 destroy
doas -n ifconfig lo32 destroy
ifconfig: lo32: SIOCIFDESTROY: Device not configured
*** Error 1 in target 'unconfig' (ignored)
# create and configure WireGuard interfaces
doas -n ifconfig wg29  create  wgport 229  wgkey "`cat 29.key`"  rdomain 29
doas -n ifconfig wg30  create  wgport 230  wgkey "`cat 30.key`"  rdomain 30
doas -n ifconfig wg31  create  wgport 231  wgkey "`cat 31.key`"  rdomain 31
doas -n ifconfig wg32  create  wgport 232  wgkey "`cat 32.key`"  rdomain 32
# local SRC, foreign DST, tunnel 4
doas -n ifconfig wg29  wgpeer "`cat 30.pub`"  wgendpoint 127.0.0.1 230  wgaip 10.188.44.2/32  wgaip fdd7:e83e:66bc:46::2/128
# local SRC, foreign DST, tunnel 6
doas -n ifconfig wg31  wgpeer "`cat 32.pub`"  wgendpoint ::1 232  wgaip 10.188.64.2/32  wgaip fdd7:e83e:66bc:66::2/128
# local SRC, foreign DST, tunnel 4
doas -n ifconfig wg29  inet 10.188.44.1/24 alias
doas -n ifconfig wg29  inet6 fdd7:e83e:66bc:46::1/64 alias
# local SRC, foreign DST, tunnel 6
doas -n ifconfig wg31  inet 10.188.64.1/24 alias
doas -n ifconfig wg31  inet6 fdd7:e83e:66bc:66::1/64 alias
# local DST, foreign SRC, tunnel 4
doas -n ifconfig wg30  wgpeer "`cat 29.pub`"  wgendpoint 127.0.0.1 229  wgaip 10.188.44.1/32  wgaip fdd7:e83e:66bc:46::1/128
# local DST, foreign SRC, tunnel 6
doas -n ifconfig wg32  wgpeer "`cat 31.pub`"  wgendpoint ::1 231  wgaip 10.188.64.1/32  wgaip fdd7:e83e:66bc:66::1/128
# local DST, foreign SRC, tunnel 4
doas -n ifconfig wg30  inet 10.188.44.2/24 alias
doas -n ifconfig wg30  inet6 fdd7:e83e:66bc:46::2/64 alias
# local DST, foreign SRC, tunnel 6
doas -n ifconfig wg32  inet 10.188.64.2/24 alias
doas -n ifconfig wg32  inet6 fdd7:e83e:66bc:66::2/64 alias
sleep 1  # Wait until DAD for inet6 tunnel addresses has finished.

==== run-route-tunnel4-addr4-src-dst ====
# Get route to local address.
/sbin/route -n -T 29 get 10.188.44.1 |  grep 'interface: wg29$'
  interface: wg29
/sbin/route -n -T 29 get 10.188.44.1 |  grep 'flags: .*,LOCAL'
      flags: <UP,HOST,DONE,LLINFO,LOCAL>
# Get route to foreign address.
/sbin/route -n -T 29 get 10.188.44.2 |  grep 'interface: wg29$'
  interface: wg29
/sbin/route -n -T 29 get 10.188.44.2 |  grep 'flags: .*,CLON'
      flags: <UP,DONE,CLONING,CONNECTED>

==== run-ping-tunnel4-addr4-src-dst ====
# Ping local address.
/sbin/ping -n -w 1 -c 1 -V 29 10.188.44.1
PING 10.188.44.1 (10.188.44.1): 56 data bytes
64 bytes from 10.188.44.1: icmp_seq=0 ttl=255 time=5.125 ms

--- 10.188.44.1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 5.125/5.125/5.125/0.000 ms
# Ping foreign address.
doas -n tcpdump -ni lo0 -w wg.pcap  ip and udp port 229 or 230 or 231 or 232 or 0 &
sleep 1  # Wait until tcpdump is up.
tcpdump: listening on lo0, link-type LOOP
/sbin/ping -n -w 1 -c 1 -V 29 10.188.44.2
PING 10.188.44.2 (10.188.44.2): 56 data bytes
64 bytes from 10.188.44.2: icmp_seq=0 ttl=255 time=10.604 ms

--- 10.188.44.2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 10.604/10.604/10.604/0.000 ms
sleep 1  # Wait until tcpdump has captured traffic.
doas -n pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*'

5 packets received by filter
0 packets dropped by kernel
# Check WireGuard encrypted traffic
/usr/sbin/tcpdump -n -r wg.pcap |  fgrep ': [wg] data '
02:54:54.048880 127.0.0.1.229 > 127.0.0.1.230: [wg] data length 96 to 0x553d71e5 nonce 0
02:54:54.050388 127.0.0.1.230 > 127.0.0.1.229: [wg] data length 96 to 0x714e6849 nonce 1

==== run-badkey-tunnel4-addr4-src-dst ====
openssl rand -base64 32 -out bad.key
# Ping foreign address with bad key.
doas -n ifconfig wg29  wgkey "`cat bad.key`"
! /sbin/ping -n -w 1 -c 1 -V 29 10.188.44.2
PING 10.188.44.2 (10.188.44.2): 56 data bytes

--- 10.188.44.2 ping statistics ---
1 packets transmitted, 0 packets received, 100.0% packet loss
# Restore key and test it.
doas -n ifconfig wg29  wgkey "`cat 29.key`"
/sbin/ping -n -w 1 -c 1 -V 29 10.188.44.2
PING 10.188.44.2 (10.188.44.2): 56 data bytes
64 bytes from 10.188.44.2: icmp_seq=0 ttl=255 time=10.295 ms

--- 10.188.44.2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 10.295/10.295/10.295/0.000 ms

==== run-route-tunnel4-addr4-dst-src ====
# Get route to local address.
/sbin/route -n -T 30 get 10.188.44.2 |  grep 'interface: wg30$'
  interface: wg30
/sbin/route -n -T 30 get 10.188.44.2 |  grep 'flags: .*,LOCAL'
      flags: <UP,HOST,DONE,LLINFO,LOCAL>
# Get route to foreign address.
/sbin/route -n -T 30 get 10.188.44.1 |  grep 'interface: wg30$'
  interface: wg30
/sbin/route -n -T 30 get 10.188.44.1 |  grep 'flags: .*,CLON'
      flags: <UP,HOST,DONE,CLONED>

==== run-ping-tunnel4-addr4-dst-src ====
# Ping local address.
/sbin/ping -n -w 1 -c 1 -V 30 10.188.44.2
PING 10.188.44.2 (10.188.44.2): 56 data bytes
64 bytes from 10.188.44.2: icmp_seq=0 ttl=255 time=1.982 ms

--- 10.188.44.2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.982/1.982/1.982/0.000 ms
# Ping foreign address.
doas -n tcpdump -ni lo0 -w wg.pcap  ip and udp port 229 or 230 or 231 or 232 or 0 &
sleep 1  # Wait until tcpdump is up.
tcpdump: listening on lo0, link-type LOOP
/sbin/ping -n -w 1 -c 1 -V 30 10.188.44.1
PING 10.188.44.1 (10.188.44.1): 56 data bytes
64 bytes from 10.188.44.1: icmp_seq=0 ttl=255 time=1.113 ms

--- 10.188.44.1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.113/1.113/1.113/0.000 ms
sleep 1  # Wait until tcpdump has captured traffic.
doas -n pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*'

2 packets received by filter
0 packets dropped by kernel
# Check WireGuard encrypted traffic
/usr/sbin/tcpdump -n -r wg.pcap |  fgrep ': [wg] data '
02:54:58.541289 127.0.0.1.230 > 127.0.0.1.229: [wg] data length 96 to 0x0bc5fb46 nonce 3
02:54:58.541830 127.0.0.1.229 > 127.0.0.1.230: [wg] data length 96 to 0xd6888184 nonce 2

==== run-badkey-tunnel4-addr4-dst-src ====
# Ping foreign address with bad key.
doas -n ifconfig wg30  wgkey "`cat bad.key`"
! /sbin/ping -n -w 1 -c 1 -V 30 10.188.44.1
PING 10.188.44.1 (10.188.44.1): 56 data bytes

--- 10.188.44.1 ping statistics ---
1 packets transmitted, 0 packets received, 100.0% packet loss
# Restore key and test it.
doas -n ifconfig wg30  wgkey "`cat 30.key`"
/sbin/ping -n -w 1 -c 1 -V 30 10.188.44.1
PING 10.188.44.1 (10.188.44.1): 56 data bytes
64 bytes from 10.188.44.1: icmp_seq=0 ttl=255 time=9.760 ms

--- 10.188.44.1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 9.760/9.760/9.760/0.000 ms

==== run-route-tunnel4-addr6-src-dst ====
# Get route to local address.
/sbin/route -n -T 29 get fdd7:e83e:66bc:46::1 |  grep 'interface: wg29$'
  interface: wg29
/sbin/route -n -T 29 get fdd7:e83e:66bc:46::1 |  grep 'flags: .*,LOCAL'
      flags: <UP,HOST,DONE,LLINFO,LOCAL>
# Get route to foreign address.
/sbin/route -n -T 29 get fdd7:e83e:66bc:46::2 |  grep 'interface: wg29$'
  interface: wg29
/sbin/route -n -T 29 get fdd7:e83e:66bc:46::2 |  grep 'flags: .*,CLON'
      flags: <UP,DONE,CLONING,CONNECTED>

==== run-ping-tunnel4-addr6-src-dst ====
# Ping local address.
/sbin/ping6 -n -w 1 -c 1 -V 29 fdd7:e83e:66bc:46::1
PING fdd7:e83e:66bc:46::1 (fdd7:e83e:66bc:46::1): 56 data bytes
64 bytes from fdd7:e83e:66bc:46::1: icmp_seq=0 hlim=64 time=1.068 ms

--- fdd7:e83e:66bc:46::1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.068/1.068/1.068/0.000 ms
# Ping foreign address.
doas -n tcpdump -ni lo0 -w wg.pcap  ip and udp port 229 or 230 or 231 or 232 or 0 &
sleep 1  # Wait until tcpdump is up.
tcpdump: listening on lo0, link-type LOOP
/sbin/ping6 -n -w 1 -c 1 -V 29 fdd7:e83e:66bc:46::2
PING fdd7:e83e:66bc:46::2 (fdd7:e83e:66bc:46::2): 56 data bytes
64 bytes from fdd7:e83e:66bc:46::2: icmp_seq=0 hlim=64 time=1.135 ms

--- fdd7:e83e:66bc:46::2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 1.135/1.135/1.135/0.000 ms
sleep 1  # Wait until tcpdump has captured traffic.
doas -n pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*'

2 packets received by filter
0 packets dropped by kernel
# Check WireGuard encrypted traffic
/usr/sbin/tcpdump -n -r wg.pcap |  fgrep ': [wg] data '
02:55:03.014184 127.0.0.1.229 > 127.0.0.1.230: [wg] data length 112 to 0x9486ed8f nonce 3
02:55:03.014767 127.0.0.1.230 > 127.0.0.1.229: [wg] data length 112 to 0xc963748d nonce 2

==== run-badkey-tunnel4-addr6-src-dst ====
# Ping foreign address with bad key.
doas -n ifconfig wg29  wgkey "`cat bad.key`"
! /sbin/ping6 -n -w 1 -c 1 -V 29 fdd7:e83e:66bc:46::2
PING fdd7:e83e:66bc:46::2 (fdd7:e83e:66bc:46::2): 56 data bytes

--- fdd7:e83e:66bc:46::2 ping statistics ---
1 packets transmitted, 0 packets received, 100.0% packet loss
# Restore key and test it.
doas -n ifconfig wg29  wgkey "`cat 29.key`"
/sbin/ping6 -n -w 1 -c 1 -V 29 fdd7:e83e:66bc:46::2
PING fdd7:e83e:66bc:46::2 (fdd7:e83e:66bc:46::2): 56 data bytes
64 bytes from fdd7:e83e:66bc:46::2: icmp_seq=0 hlim=64 time=10.503 ms

--- fdd7:e83e:66bc:46::2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 10.503/10.503/10.503/0.000 ms

==== run-route-tunnel4-addr6-dst-src ====
# Get route to local address.
/sbin/route -n -T 30 get fdd7:e83e:66bc:46::2 |  grep 'interface: wg30$'
  interface: wg30
/sbin/route -n -T 30 get fdd7:e83e:66bc:46::2 |  grep 'flags: .*,LOCAL'
      flags: <UP,HOST,DONE,LLINFO,LOCAL>
# Get route to foreign address.
/sbin/route -n -T 30 get fdd7:e83e:66bc:46::1 |  grep 'interface: wg30$'
  interface: wg30
/sbin/route -n -T 30 get fdd7:e83e:66bc:46::1 |  grep 'flags: .*,CLON'
      flags: <UP,HOST,DONE,CLONED>

==== run-ping-tunnel4-addr6-dst-src ====
# Ping local address.
/sbin/ping6 -n -w 1 -c 1 -V 30 fdd7:e83e:66bc:46::2
PING fdd7:e83e:66bc:46::2 (fdd7:e83e:66bc:46::2): 56 data bytes
64 bytes from fdd7:e83e:66bc:46::2: icmp_seq=0 hlim=64 time=0.778 ms

--- fdd7:e83e:66bc:46::2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.778/0.778/0.778/0.000 ms
# Ping foreign address.
doas -n tcpdump -ni lo0 -w wg.pcap  ip and udp port 229 or 230 or 231 or 232 or 0 &
sleep 1  # Wait until tcpdump is up.
tcpdump: listening on lo0, link-type LOOP
/sbin/ping6 -n -w 1 -c 1 -V 30 fdd7:e83e:66bc:46::1
PING fdd7:e83e:66bc:46::1 (fdd7:e83e:66bc:46::1): 56 data bytes
64 bytes from fdd7:e83e:66bc:46::1: icmp_seq=0 hlim=64 time=2.495 ms

--- fdd7:e83e:66bc:46::1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 2.495/2.495/2.495/0.000 ms
sleep 1  # Wait until tcpdump has captured traffic.
doas -n pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*'

2 packets received by filter
0 packets dropped by kernel
# Check WireGuard encrypted traffic
/usr/sbin/tcpdump -n -r wg.pcap |  fgrep ': [wg] data '
02:55:07.516359 127.0.0.1.230 > 127.0.0.1.229: [wg] data length 112 to 0x4ad15b08 nonce 3
02:55:07.517870 127.0.0.1.229 > 127.0.0.1.230: [wg] data length 112 to 0x314c1851 nonce 2

==== run-badkey-tunnel4-addr6-dst-src ====
# Ping foreign address with bad key.
doas -n ifconfig wg30  wgkey "`cat bad.key`"
! /sbin/ping6 -n -w 1 -c 1 -V 30 fdd7:e83e:66bc:46::1
PING fdd7:e83e:66bc:46::1 (fdd7:e83e:66bc:46::1): 56 data bytes

--- fdd7:e83e:66bc:46::1 ping statistics ---
1 packets transmitted, 0 packets received, 100.0% packet loss
# Restore key and test it.
doas -n ifconfig wg30  wgkey "`cat 30.key`"
/sbin/ping6 -n -w 1 -c 1 -V 30 fdd7:e83e:66bc:46::1
PING fdd7:e83e:66bc:46::1 (fdd7:e83e:66bc:46::1): 56 data bytes
64 bytes from fdd7:e83e:66bc:46::1: icmp_seq=0 hlim=64 time=13.205 ms

--- fdd7:e83e:66bc:46::1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 13.205/13.205/13.205/0.000 ms

==== run-route-tunnel6-addr4-src-dst ====
# Get route to local address.
/sbin/route -n -T 31 get 10.188.64.1 |  grep 'interface: wg31$'
  interface: wg31
/sbin/route -n -T 31 get 10.188.64.1 |  grep 'flags: .*,LOCAL'
      flags: <UP,HOST,DONE,LLINFO,LOCAL>
# Get route to foreign address.
/sbin/route -n -T 31 get 10.188.64.2 |  grep 'interface: wg31$'
  interface: wg31
/sbin/route -n -T 31 get 10.188.64.2 |  grep 'flags: .*,CLON'
      flags: <UP,DONE,CLONING,CONNECTED>

==== run-ping-tunnel6-addr4-src-dst ====
# Ping local address.
/sbin/ping -n -w 1 -c 1 -V 31 10.188.64.1
PING 10.188.64.1 (10.188.64.1): 56 data bytes
64 bytes from 10.188.64.1: icmp_seq=0 ttl=255 time=3.634 ms

--- 10.188.64.1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 3.634/3.634/3.634/0.000 ms
# Ping foreign address.
doas -n tcpdump -ni lo0 -w wg.pcap  ip6 and udp port 229 or 230 or 231 or 232 or 0 &
sleep 1  # Wait until tcpdump is up.
tcpdump: listening on lo0, link-type LOOP
/sbin/ping -n -w 1 -c 1 -V 31 10.188.64.2
PING 10.188.64.2 (10.188.64.2): 56 data bytes
64 bytes from 10.188.64.2: icmp_seq=0 ttl=255 time=18.238 ms

--- 10.188.64.2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 18.238/18.238/18.238/0.000 ms
sleep 1  # Wait until tcpdump has captured traffic.
doas -n pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*'

5 packets received by filter
0 packets dropped by kernel
# Check WireGuard encrypted traffic
/usr/sbin/tcpdump -n -r wg.pcap |  fgrep ': [wg] data '
02:55:12.051665 ::1.231 > ::1.232: [wg] data length 96 to 0xeb473e5e nonce 0
02:55:12.056625 ::1.232 > ::1.231: [wg] data length 96 to 0xe01b892e nonce 1

==== run-badkey-tunnel6-addr4-src-dst ====
# Ping foreign address with bad key.
doas -n ifconfig wg31  wgkey "`cat bad.key`"
! /sbin/ping -n -w 1 -c 1 -V 31 10.188.64.2
PING 10.188.64.2 (10.188.64.2): 56 data bytes

--- 10.188.64.2 ping statistics ---
1 packets transmitted, 0 packets received, 100.0% packet loss
# Restore key and test it.
doas -n ifconfig wg31  wgkey "`cat 31.key`"
/sbin/ping -n -w 1 -c 1 -V 31 10.188.64.2
PING 10.188.64.2 (10.188.64.2): 56 data bytes
64 bytes from 10.188.64.2: icmp_seq=0 ttl=255 time=7.364 ms

--- 10.188.64.2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 7.364/7.364/7.364/0.000 ms

==== run-route-tunnel6-addr4-dst-src ====
# Get route to local address.
/sbin/route -n -T 32 get 10.188.64.2 |  grep 'interface: wg32$'
  interface: wg32
/sbin/route -n -T 32 get 10.188.64.2 |  grep 'flags: .*,LOCAL'
      flags: <UP,HOST,DONE,LLINFO,LOCAL>
# Get route to foreign address.
/sbin/route -n -T 32 get 10.188.64.1 |  grep 'interface: wg32$'
  interface: wg32
/sbin/route -n -T 32 get 10.188.64.1 |  grep 'flags: .*,CLON'
      flags: <UP,HOST,DONE,CLONED>

==== run-ping-tunnel6-addr4-dst-src ====
# Ping local address.
/sbin/ping -n -w 1 -c 1 -V 32 10.188.64.2
PING 10.188.64.2 (10.188.64.2): 56 data bytes
64 bytes from 10.188.64.2: icmp_seq=0 ttl=255 time=0.912 ms

--- 10.188.64.2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.912/0.912/0.912/0.000 ms
# Ping foreign address.
doas -n tcpdump -ni lo0 -w wg.pcap  ip6 and udp port 229 or 230 or 231 or 232 or 0 &
sleep 1  # Wait until tcpdump is up.
tcpdump: listening on lo0, link-type LOOP
/sbin/ping -n -w 1 -c 1 -V 32 10.188.64.1
PING 10.188.64.1 (10.188.64.1): 56 data bytes
64 bytes from 10.188.64.1: icmp_seq=0 ttl=255 time=4.798 ms

--- 10.188.64.1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 4.798/4.798/4.798/0.000 ms
sleep 1  # Wait until tcpdump has captured traffic.
doas -n pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*'

2 packets received by filter
0 packets dropped by kernel
# Check WireGuard encrypted traffic
/usr/sbin/tcpdump -n -r wg.pcap |  fgrep ': [wg] data '
02:55:16.551249 ::1.232 > ::1.231: [wg] data length 96 to 0x8785cff9 nonce 3
02:55:16.553666 ::1.231 > ::1.232: [wg] data length 96 to 0x31e04a04 nonce 2

==== run-badkey-tunnel6-addr4-dst-src ====
# Ping foreign address with bad key.
doas -n ifconfig wg32  wgkey "`cat bad.key`"
! /sbin/ping -n -w 1 -c 1 -V 32 10.188.64.1
PING 10.188.64.1 (10.188.64.1): 56 data bytes

--- 10.188.64.1 ping statistics ---
1 packets transmitted, 0 packets received, 100.0% packet loss
# Restore key and test it.
doas -n ifconfig wg32  wgkey "`cat 32.key`"
/sbin/ping -n -w 1 -c 1 -V 32 10.188.64.1
PING 10.188.64.1 (10.188.64.1): 56 data bytes
64 bytes from 10.188.64.1: icmp_seq=0 ttl=255 time=6.937 ms

--- 10.188.64.1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 6.937/6.937/6.937/0.000 ms

==== run-route-tunnel6-addr6-src-dst ====
# Get route to local address.
/sbin/route -n -T 31 get fdd7:e83e:66bc:66::1 |  grep 'interface: wg31$'
  interface: wg31
/sbin/route -n -T 31 get fdd7:e83e:66bc:66::1 |  grep 'flags: .*,LOCAL'
      flags: <UP,HOST,DONE,LLINFO,LOCAL>
# Get route to foreign address.
/sbin/route -n -T 31 get fdd7:e83e:66bc:66::2 |  grep 'interface: wg31$'
  interface: wg31
/sbin/route -n -T 31 get fdd7:e83e:66bc:66::2 |  grep 'flags: .*,CLON'
      flags: <UP,DONE,CLONING,CONNECTED>

==== run-ping-tunnel6-addr6-src-dst ====
# Ping local address.
/sbin/ping6 -n -w 1 -c 1 -V 31 fdd7:e83e:66bc:66::1
PING fdd7:e83e:66bc:66::1 (fdd7:e83e:66bc:66::1): 56 data bytes
64 bytes from fdd7:e83e:66bc:66::1: icmp_seq=0 hlim=64 time=0.638 ms

--- fdd7:e83e:66bc:66::1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.638/0.638/0.638/0.000 ms
# Ping foreign address.
doas -n tcpdump -ni lo0 -w wg.pcap  ip6 and udp port 229 or 230 or 231 or 232 or 0 &
sleep 1  # Wait until tcpdump is up.
tcpdump: listening on lo0, link-type LOOP
/sbin/ping6 -n -w 1 -c 1 -V 31 fdd7:e83e:66bc:66::2
PING fdd7:e83e:66bc:66::2 (fdd7:e83e:66bc:66::2): 56 data bytes
64 bytes from fdd7:e83e:66bc:66::2: icmp_seq=0 hlim=64 time=2.262 ms

--- fdd7:e83e:66bc:66::2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 2.262/2.262/2.262/0.000 ms
sleep 1  # Wait until tcpdump has captured traffic.
doas -n pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*'

3 packets received by filter
0 packets dropped by kernel
# Check WireGuard encrypted traffic
/usr/sbin/tcpdump -n -r wg.pcap |  fgrep ': [wg] data '
02:55:21.044552 ::1.231 > ::1.232: [wg] data length 112 to 0xd42394db nonce 3
02:55:21.045890 ::1.232 > ::1.231: [wg] data length 112 to 0x7ae0ba72 nonce 2

==== run-badkey-tunnel6-addr6-src-dst ====
# Ping foreign address with bad key.
doas -n ifconfig wg31  wgkey "`cat bad.key`"
! /sbin/ping6 -n -w 1 -c 1 -V 31 fdd7:e83e:66bc:66::2
PING fdd7:e83e:66bc:66::2 (fdd7:e83e:66bc:66::2): 56 data bytes

--- fdd7:e83e:66bc:66::2 ping statistics ---
1 packets transmitted, 0 packets received, 100.0% packet loss
# Restore key and test it.
doas -n ifconfig wg31  wgkey "`cat 31.key`"
/sbin/ping6 -n -w 1 -c 1 -V 31 fdd7:e83e:66bc:66::2
PING fdd7:e83e:66bc:66::2 (fdd7:e83e:66bc:66::2): 56 data bytes
64 bytes from fdd7:e83e:66bc:66::2: icmp_seq=0 hlim=64 time=10.687 ms

--- fdd7:e83e:66bc:66::2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 10.687/10.687/10.687/0.000 ms

==== run-route-tunnel6-addr6-dst-src ====
# Get route to local address.
/sbin/route -n -T 32 get fdd7:e83e:66bc:66::2 |  grep 'interface: wg32$'
  interface: wg32
/sbin/route -n -T 32 get fdd7:e83e:66bc:66::2 |  grep 'flags: .*,LOCAL'
      flags: <UP,HOST,DONE,LLINFO,LOCAL>
# Get route to foreign address.
/sbin/route -n -T 32 get fdd7:e83e:66bc:66::1 |  grep 'interface: wg32$'
  interface: wg32
/sbin/route -n -T 32 get fdd7:e83e:66bc:66::1 |  grep 'flags: .*,CLON'
      flags: <UP,HOST,DONE,CLONED>

==== run-ping-tunnel6-addr6-dst-src ====
# Ping local address.
/sbin/ping6 -n -w 1 -c 1 -V 32 fdd7:e83e:66bc:66::2
PING fdd7:e83e:66bc:66::2 (fdd7:e83e:66bc:66::2): 56 data bytes
64 bytes from fdd7:e83e:66bc:66::2: icmp_seq=0 hlim=64 time=0.964 ms

--- fdd7:e83e:66bc:66::2 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 0.964/0.964/0.964/0.000 ms
# Ping foreign address.
doas -n tcpdump -ni lo0 -w wg.pcap  ip6 and udp port 229 or 230 or 231 or 232 or 0 &
sleep 1  # Wait until tcpdump is up.
tcpdump: listening on lo0, link-type LOOP
/sbin/ping6 -n -w 1 -c 1 -V 32 fdd7:e83e:66bc:66::1
PING fdd7:e83e:66bc:66::1 (fdd7:e83e:66bc:66::1): 56 data bytes
64 bytes from fdd7:e83e:66bc:66::1: icmp_seq=0 hlim=64 time=2.233 ms

--- fdd7:e83e:66bc:66::1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 2.233/2.233/2.233/0.000 ms
sleep 1  # Wait until tcpdump has captured traffic.
doas -n pkill -xf 'tcpdump -ni lo0 -w wg.pcap .*'

2 packets received by filter
0 packets dropped by kernel
# Check WireGuard encrypted traffic
/usr/sbin/tcpdump -n -r wg.pcap |  fgrep ': [wg] data '
02:55:25.546867 ::1.232 > ::1.231: [wg] data length 112 to 0x8d12d38e nonce 3
02:55:25.547913 ::1.231 > ::1.232: [wg] data length 112 to 0xab9d7a62 nonce 2

==== run-badkey-tunnel6-addr6-dst-src ====
# Ping foreign address with bad key.
doas -n ifconfig wg32  wgkey "`cat bad.key`"
! /sbin/ping6 -n -w 1 -c 1 -V 32 fdd7:e83e:66bc:66::1
PING fdd7:e83e:66bc:66::1 (fdd7:e83e:66bc:66::1): 56 data bytes

--- fdd7:e83e:66bc:66::1 ping statistics ---
1 packets transmitted, 0 packets received, 100.0% packet loss
# Restore key and test it.
doas -n ifconfig wg32  wgkey "`cat 32.key`"
/sbin/ping6 -n -w 1 -c 1 -V 32 fdd7:e83e:66bc:66::1
PING fdd7:e83e:66bc:66::1 (fdd7:e83e:66bc:66::1): 56 data bytes
64 bytes from fdd7:e83e:66bc:66::1: icmp_seq=0 hlim=64 time=5.599 ms

--- fdd7:e83e:66bc:66::1 ping statistics ---
1 packets transmitted, 1 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 5.599/5.599/5.599/0.000 ms

==== unconfig ====
# destroy WireGuard and routing domain loopback interfaces
doas -n ifconfig wg29 destroy
doas -n ifconfig lo29 destroy
doas -n ifconfig wg30 destroy
doas -n ifconfig lo30 destroy
doas -n ifconfig wg31 destroy
doas -n ifconfig lo31 destroy
doas -n ifconfig wg32 destroy
doas -n ifconfig lo32 destroy