Difference between revisions of "WireGuard"
Jump to navigation
Jump to search
↑ https://www.wireguard.com/papers/wireguard.pdf
↑ https://www.wireguard.com/papers/wireguard.pdf
(2 intermediate revisions by the same user not shown) | |||
Line 4: | Line 4: | ||
Technical features: | Technical features: | ||
* WireGuard is invisible to illegitimate peers and network scanners <ref>https://www.wireguard.com/papers/wireguard.pdf</ref> | * WireGuard is invisible to illegitimate peers and network scanners <ref>https://www.wireguard.com/papers/wireguard.pdf</ref> | ||
− | * WireGuard uses only [[UDP]] protocol (port 41414). | + | * WireGuard uses only [[UDP]] protocol (port [[41414]]). |
* [[Connection-less]] protocol | * [[Connection-less]] protocol | ||
Line 12: | Line 12: | ||
− | * <code>sudo [[apt install wireguard]]</code> | + | * Linux: <code>sudo [[apt install wireguard]]</code> |
+ | * macOS: <code>[[brew install wireguard-go]]</code> | ||
Included in March [[2020]] into the [[Linux Kernel changelog|Linux Kernel 5.6]] , available in Ubuntu since [[Ubuntu 20.10]] | Included in March [[2020]] into the [[Linux Kernel changelog|Linux Kernel 5.6]] , available in Ubuntu since [[Ubuntu 20.10]] | ||
Line 48: | Line 49: | ||
* <code>wg-watchdog.sh</code> https://gist.github.com/mattkasun/9a0e90d9d31b2c935d3f6d6e71dbece9 | * <code>wg-watchdog.sh</code> https://gist.github.com/mattkasun/9a0e90d9d31b2c935d3f6d6e71dbece9 | ||
* <code>[[pritunl]]</code> | * <code>[[pritunl]]</code> | ||
+ | * [[Tailscale]] | ||
== See also == | == See also == |
Latest revision as of 08:28, 3 July 2024
wikipedia:WireGuard is a free and open-source software application and communication protocol that implements virtual private network techniques to create secure point-to-point connections in routed or bridged configurations. It use Noise protocol framework, Curve25519, ChaCha20, Poly1305, BLAKE2, SipHash24 and HKDF.
Technical features:
- WireGuard is invisible to illegitimate peers and network scanners [1]
- WireGuard uses only UDP protocol (port 41414).
- Connection-less protocol
- Curve25519 used for identified peers, using their public key, a 32-byte Curve25519 point
- Linux:
sudo apt install wireguard
- macOS:
brew install wireguard-go
Included in March 2020 into the Linux Kernel 5.6 , available in Ubuntu since Ubuntu 20.10
WireGuard's encryption speed claims to be faster that IPsec group protocols.
- Debian packages:
wireguard, wireguard-dkms, wireguard-tools
Commands[edit]
wireguard-go wg0
ip link add wg0 type wireguard
wg
Configuration[edit]
Author: Jason A. Donenfeld. Advisors: Trevor Perrin, Jean-Philippe Aumasson, Steven M. Bellovin, and Greg Kroah-Hartman[2]
Activities[edit]
Related terms[edit]
sysctl -w net.ipv4.ip_forward=1
sysctl -w net.ipv6.conf.all.forwarding=1
- 4G
- Clients behind NAT can keep the VPN established using an optional
keepalive
parameter; it defaults to no keepalive wg-watchdog.sh
https://gist.github.com/mattkasun/9a0e90d9d31b2c935d3f6d6e71dbece9pritunl
- Tailscale
See also[edit]
wg
,wg-quick
[up
| down | strip ],wg genkey
,wg show
- WireGuard,
wg
,wg-quick
, Curve25519,wireguard-tools
, Pritunl - VPN: IPsec (Openswan), OpenVPN, Forticlient, GlobalProtect (PAN-OS), WireGuard (Linux Kernel), Tailscale, PulseSecure, WebVPN, SoftEther, ESP, IKE, AWS VPN, Zerotier, VPN client, Pritunl, GCP Cloud VPN, Mesh virtual private network, Mullvad
- Edge Security LLC
Advertising: