Replies: 7 comments
-
Hello! Is your instruction 100% correct? I have no luck with it... Even AI can't help to convert secret key from reg.json to correct size key. I got only very short key and different errors. So for now I can't enroll Team with Usque... |
Beta Was this translation helpful? Give feedback.
-
I just tested it again, works as described. I ran the key conversion on Debian 11, if that makes a difference. Openssl version is 1.1.1w (11 Sep 2023). BTW, just updating the id- and access_token-parameter in config.json and leaving everything else unchanged, and running |
Beta Was this translation helpful? Give feedback.
-
Hello again. Secret key from reg.json has length only 44, the secret key from target config.json for usque is 164. |
Beta Was this translation helpful? Give feedback.
-
Hi, let's do an example from an actual [secret_key] from
This last key is the one that corresponds to [secret_key_new] from the first post and has to be the new private_key value in the config.json file for usque. Hope that helps. |
Beta Was this translation helpful? Give feedback.
-
Thank you for detailed explanation! Now I see the difference: my secret key is....smth different: Don't know why but it's so strange. Will find different way than... |
Beta Was this translation helpful? Give feedback.
-
Hello |
Beta Was this translation helpful? Give feedback.
-
Hey there, Thanks for the great tutorial! I’ll investigate the issue with the documented method—it was working fine for me a few weeks ago, so if something has changed, a fix would be appropriate. Since this isn’t a direct bug or issue, I’m moving the conversation to the Discussions tab for further follow-up. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Thank you for this great project, its very exciting to have MASQUE tunnel available on OpenWRT!
Not sure exactly where to write this, but maybe others also want to run/test usque with ZeroTrust instead of regular Warp. This is how i made it work:
setup warp-cli with your ZeroTrust account on a linux machine. After you can successfully connect, continue.
sudo cat /var/lib/cloudflare-warp/reg.json
[registration_id], [api_token] and [secret_key] is what we need.
[secret_key] needs to be converted into a different format:
echo "[secret_key]" | base64 -d > pkcs8.key
openssl pkcs8 -inform DER -in pkcs8.key -out ec_private_key.pem -nocrypt
openssl ec -in ec_private_key.pem -outform DER -out ec_private_key.der
base64 ec_private_key.der
This will output [secret_key_new] which we will need in a moment.
create a new config.json if not already present:
usque register
edit config.json like this:
{
"private_key": "[secret_key_new]",
"endpoint_v4": "162.159.197.1",
"endpoint_pub_key": "-----BEGIN PUBLIC KEY-----\nMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEIaU7MToJm9NKp8YfGxR6r+/h4mcG\n7SxI8tsW8OR1A5tv/zCzVbCRRh2t87/kxnP6lAy0lkr7qYwu+ox+k3dr6w==\n-----END PUBLIC KEY-----\n",
"id": "[registration_id]",
"access_token": "[api_token]",
"ipv4": "172.16.0.2",
"ipv6": "..."
}
now you have a config.json that will work with your ZeroTrust account. Start usque with this config file in the mode you prefer and add
-s zt-masque.cloudflareclient.com
at the end, for example:usque -c .usque/config.json nativetun -s zt-masque.cloudflareclient.com
Verify usque with ZeroTrust is properly working:
curl --interface tun0 https://cloudflare.com/cdn-cgi/trace
should show
warp=plus
Hope that helps.
Beta Was this translation helpful? Give feedback.
All reactions