Hey Colin,
On Wed, Mar 20, 2019 at 4:46 PM Colin Finck wrote:
>
> This prevents an "Unknown interface 'wg0': No such device" error on the
> command line.
Your patch seems basic and reasonable enough. However, I don't know
how to reproduce the error you're getting. Usually resolvconf doesn't
Hello,
I'm quite new to Wireguard and new to this list.
I have a feature suggestion / request for the Android app (probably also
valid for other clients). Is this the right place to post it, or is
there a different channel for this?
Thanks in advance,
NoddingDog
--
---
https://git.zx2c4.com/wireguard-ios/commit/?id=1d768d4e9d9e0e2002b73cac35f21f43c10ba894
This is released on the app stores now.
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
https://lists.zx2c4.com/mailman/listinfo/wireguard
Dear team,
I’m trying to make Wireguard use CPU’s hardware crypto engine . The hardware
crypto engine can be driven by linux kernel. And it has registered the
algorithms which it supports to the linux kernel as I can see those by “cat
/proc/crypto”. Unfortunately , there’s no CHACHA
Hi Scott,
>From experience, I can tell you I was able to get my Gbit saturated over
Wireguard to a server in a datacenter.
You need to have good routing, obviously.
Greetings,
Christopher Bachner
On Fri, Mar 8, 2019 at 4:41 PM Scott Lipcon wrote:
> Thanks for the suggestions - I'll need to
I'd like this too. Please feel free to submit patches.
We already have basic infrastructure for it: when you run without
arguments, it opens various things, and then starts a new process,
passing those things to it. The goal would be to run that second
process as non-root and with various
Hi everyone,
I've set up a Wireguard server on a Mac Mini and can remotely connect
with no problems. However, all attempts to access anything else on my
server's LAN while connected have been unsuccessful.
Most guides and documentation I've found to get this routing working are
written with the
This prevents an "Unknown interface 'wg0': No such device" error on the command
line.
Signed-off-by: Colin Finck
---
src/tools/wg-quick/freebsd.bash | 2 +-
src/tools/wg-quick/linux.bash | 2 +-
src/tools/wg-quick/openbsd.bash | 2 +-
3 files changed, 3 insertions(+), 3 deletions(-)
diff
Hi Jason, all.
I have detected some issues with iOS push notifications with WG while
the device is in sleep mode (screen turned off).
First of all, in spite of having KeepAlive set to 10-30 seconds, iOS
devices don't send keepalive packets at all while the screen is turned
off. The only
---
src/crypto/zinc/blake2s/blake2s.c | 17 +
src/socket.c | 7 +++
2 files changed, 24 insertions(+)
diff --git a/src/crypto/zinc/blake2s/blake2s.c
b/src/crypto/zinc/blake2s/blake2s.c
index b881db0..60b7763 100644
--- a/src/crypto/zinc/blake2s/blake2s.c
Hi all,
Just a suggestion, I would really love to run Wireguard-go (in OpenBSD)
with root privilege dropped. Any chance this get implemented?
I also tried to simply start wireguard-go on OpenBSD with a normal user.
However it won't start due to the fact that it is trying to set the
Tunnel MTU
While fiddling with wg-quick on macos, I've noticed that the DNS settings
coming from the configuration file persists after calling wg-quick down on
the same config. I'm guessing this is not the intended behaviour. If it is
please ignore the patch.
diff --git a/src/tools/wg-quick/darwin.bash
Hello,
I have setup a WireGuard VPN between my laptop running the client software and
the machine at home running the server software. I love the simplicity and
efficiency of WireGuard. Very nice job!
This client/server software made the design decision to build connections by
relying
Hi,
This came up when we tried to import our configuration files.
When the configuration file uses CRLF line ending instead of LF, importing
fails.
Regards
___
WireGuard mailing list
WireGuard@lists.zx2c4.com
Hi,
I have successfully set up a wireguard VPN between my notebook (Manjaro behind
NAT) and my virtual server (ubuntu 18.04). The only "issue" left is that I
can't connect to local devices on the client while using wireguard. Is there a
way to exclude an IP range from using wireguard?
my
Hello everyone
I am trying to set up wireguard on a Linux server (Ubuntu 18.04) and I am
having some issues. The configuration of the server:
[Interface]
Address = 192.168.20.1/24
ListenPort = 51820
PrivateKey = UbuntuPrivateKey
# the laptop I want to connect from
[Peer]
# this public key is
On Sun, 03 Mar 2019 08:56:12 +0100
XRP wrote:
> [#] ip link set mtu 1200 up dev wg1
> [#] ip route add fdb8:a70c:b109:9935::/64 dev wg1
> RTNETLINK answers: No such device
IPv6 cannot work with MTU less than 1280 on the device.
--
With respect,
Roman
On Wed, 2019-03-06 at 08:40 +, Arpit Gupta wrote:
> On my server my conf is
>
> [Interface]
> Address = 192.168.100.1/32
> PostUp = iptables -A FORWARD -i %i -j ACCEPT; iptables -A FORWARD -o
> %i -j
> ACCEPT; iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
> PostDown = iptables -D
Hi,
I can connect to my wg server on my Mac with this config
[Interface]
Address = 10.0.0.2
DNS = 8.8.8.8
PrivateKey =
[Peer]
Endpoint = :
PublicKey =
AllowedIPs = 0.0.0.0/0, ::/0
But once upload it as qr code to my iPhone, I can establish the vpn connection,
but can not access any
Hi,
I'm testing the official macOS application for Wireguard and seem to
have a problem in my setup. Is it to be expected to loose configured
tunnels when logging out? I have two users on my MacBook, one for work
and one for private use and always log out when switching users because
some
Hi Matthias,
On 21.02.2019 08:59, Matthias Urlichs wrote:
> On 19.02.19 16:45, Vincent Wiemann wrote:
>> A kernel VPN module should not depend
>> on a user space daemon for doing regular checks or a daemon running at
>> all.
>
> It doesn't. You only need userspace when the external IP address
Just to provide a followup, in case anyone is interested - The office
router is a Sonicwall TZ 500. Disabling DPI on the zone in question
caused the performance to dramatically increase 655Mbit for no VPN, and
about 600 via Wireguard thanks for the tip to look at the firewall.
Scott
I just set up wireguard on a cheap (70EUR) ZyXEL NBG6617 with current openwrt
snapshot, and the performance is impressive:
root@OpenWrt:~# iperf3 -R -t 30 -c 192.168.149.11
Connecting to host 192.168.149.11, port 5201
Reverse mode, remote host 192.168.149.11 is sending
[ 5] local 192.168.149.10
Wireguard fails to start when adding an IPv6 to AllowedIP.
Example Config:
[Interface]
PrivateKey = 0OpsgK/Wl7VJC2I49UiGL91wBlbqN+XP0R+bSH+VL2w=
MTU = 1200
Address = 10.0.0.5/24,fdb8:a70c:b109:9935::1/64
[Peer]
PublicKey = hk7hdCE2vKFu895RiCYhQTK6V9+zhnI+KI46VVSx1DA=
AllowedIPs =
Hi wireguard team and list,
I wanted to reach out and ask a question about using wireguard for
vulnerability scanning through a host onto a network. Similar to this:
https://www.kali.org/tutorials/wireguard-on-kali/
I am still new to wireguard in general, but I have heard about a lot of good
On 2019-03-14, Bruno Wolff III wrote:
> Sorry about the duplicates. I git confused trying to use git email-send.
For future reference, you want to send a patch series. The way I do it
is I first generate all of the patches:
% git format-patch
Which will then generate
26 matches
Mail list logo