Difference between revisions of "WireGuard"

From wikieduonline
Jump to navigation Jump to search
Tags: Mobile web edit, Mobile edit
 
(8 intermediate revisions by the same user not shown)
Line 4: Line 4:
 
Technical features:
 
Technical features:
 
* WireGuard is invisible to illegitimate peers and network scanners <ref>https://www.wireguard.com/papers/wireguard.pdf</ref>
 
* WireGuard is invisible to illegitimate peers and network scanners <ref>https://www.wireguard.com/papers/wireguard.pdf</ref>
* WireGuard uses only [[UDP]] protocol (port 41414).
+
* WireGuard uses only [[UDP]] protocol (port [[41414]]).
 
* [[Connection-less]] protocol
 
* [[Connection-less]] protocol
  
Line 12: Line 12:
  
  
* <code>sudo [[apt install wireguard]]</code>
+
* Linux: <code>sudo [[apt install wireguard]]</code>
 +
* macOS: <code>[[brew install wireguard-go]]</code>
  
 
Included in March [[2020]] into the [[Linux Kernel changelog|Linux Kernel 5.6]] , available in Ubuntu since [[Ubuntu 20.10]]
 
Included in March [[2020]] into the [[Linux Kernel changelog|Linux Kernel 5.6]] , available in Ubuntu since [[Ubuntu 20.10]]
Line 33: Line 34:
 
== Configuration ==
 
== Configuration ==
 
* <code>[[/etc/wireguard/]]</code>
 
* <code>[[/etc/wireguard/]]</code>
 
+
* <code>[[/etc/wireguard/wg0.conf]]</code>
  
  
Line 42: Line 43:
  
 
== Related terms ==
 
== Related terms ==
* <code>[[sysctl]] -w net.ipv4.[[ip_forward]]=1</code>
+
* <code>[[sysctl]] -w [[net.ipv4]].[[ip_forward]]=1</code>
 
* <code>sysctl -w net.ipv6.conf.all.forwarding=1</code>
 
* <code>sysctl -w net.ipv6.conf.all.forwarding=1</code>
 
* [[4G]]
 
* [[4G]]
 
* Clients behind [[NAT]] can keep the VPN established using an optional <code>keepalive</code> parameter; it defaults to no keepalive
 
* Clients behind [[NAT]] can keep the VPN established using an optional <code>keepalive</code> parameter; it defaults to no keepalive
 
* <code>wg-watchdog.sh</code> https://gist.github.com/mattkasun/9a0e90d9d31b2c935d3f6d6e71dbece9
 
* <code>wg-watchdog.sh</code> https://gist.github.com/mattkasun/9a0e90d9d31b2c935d3f6d6e71dbece9
 +
* <code>[[pritunl]]</code>
 +
* [[Tailscale]]
  
 
== See also ==
 
== See also ==
Line 59: Line 62:
 
[[Category:WireGuard]]
 
[[Category:WireGuard]]
 
[[Category:Tunneling protocols]]
 
[[Category:Tunneling protocols]]
 +
[[Category:Virtual private networks]]

Latest revision as of 08:28, 3 July 2024

wikipedia:WireGuard is a free and open-source software application and communication protocol that implements virtual private network techniques to create secure point-to-point connections in routed or bridged configurations. It use Noise protocol framework, Curve25519, ChaCha20, Poly1305, BLAKE2, SipHash24 and HKDF.


Technical features:

  • WireGuard is invisible to illegitimate peers and network scanners [1]
  • WireGuard uses only UDP protocol (port 41414).
  • Connection-less protocol


  • Curve25519 used for identified peers, using their public key, a 32-byte Curve25519 point


Included in March 2020 into the Linux Kernel 5.6 , available in Ubuntu since Ubuntu 20.10

WireGuard's encryption speed claims to be faster that IPsec group protocols.


  • MacOS: brew install wireguard-tools
  • iOS: allows auto activation on WiFI based on SSID.

Commands[edit]

Configuration[edit]


Author: Jason A. Donenfeld. Advisors: Trevor Perrin, Jean-Philippe Aumasson, Steven M. Bellovin, and Greg Kroah-Hartman[2]

Activities[edit]

Related terms[edit]

See also[edit]

  • https://www.wireguard.com/papers/wireguard.pdf
  • https://www.wireguard.com/papers/wireguard.pdf
  • Advertising: