Wireguard

Wireguard on Debian

Wireguard with Debian Grab a Fresh Debian which has Public Internet Access. Target is to build a WG Tunnel and assign a Public IP to the Server. Debian 11.6 apt-get install -y wireguard wireguard-tools Gen Key cd /etc/wireguard umask 077; wg genkey | tee privatekey | wg pubkey > publickey Set Vars myprivkey=$(cat privatekey) mypublicaddress="45.xx.xx.xx/28, 2a0e:xxxx:xxx::xxx/64" yourpubkey="3XK8xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx=" yourpubip="45.xxx.xxx.xxx" yourpubport="443" Config cat << EOF > wg0.conf [Interface] PrivateKey = ${myprivkey} Address = PUBLIC_IP_V4/xx, PUBLIC_IP_V6/xx [Peer] PublicKey = ${yourpubkey} Endpoint = ${yourpubip}:${yourpubport} AllowedIPs = 0.

Headscale - OpenBSD

Running Headscale Server on OpenBSD i like and widely use wireguard for my infrastructure. i’m also aware of it’s limitation and i know the tailscale project but never gave try. recently, i stumbled upon the headscale project, an opensource alternative to for the (closed) tailscale server. perfect, let’s give a try! and, of course, i’m gooing to implement this with OpenBSD, what else ;) Doku https://github.com/juanfont/headscale/blob/main/docs/running-headscale-openbsd.md https://zakaria.org/posts/headscale-setup.md on the Server compile and install server this is working on OpenBSD 7.

Wireguard with Public IP behind NAT

… or how to host a Dualstacked Public Website behind a IPv4 NAT Box without Reverse Proxy, Portforwarding and other ugly stuff … inspired by the following Post, i started a little project and redesigned the connectifity for my Hamster’s Webserver :) i wrote a mail to the guys from tetaneutral.net and asked them for the wireguard vpn service with public ipv4/ipv6 adresses for my server. as i didn’t get any feedback, i had to implement the “Server” on my own.

Wireguard Puffy to OPNsense

WG Tunnel between OpenBSD and OPNsense How to Setup an WG Tunnel between OpenBSD and OPNSense ? That’s quite simple … OpenBSD Install Packages pkg_add wireguard-tools-- Gen Key Onliner wg genkey | tee privatekey | wg pubkey > publickey Build Interface r=$(openssl rand -base64 32) remote_ip="1.2.3.4" remote_net="192.168.0.0/24" cat << 'EOF' > /etc/hostname.wg0 # WG Tunnel to OPNsense wgkey ${r} wgport 51820 wgpeer xxxxx - PUBLIC-KEY-OF-REMOTE-HOST - xxxxx= wgendpoint ${remote_ip} 51820 wgaip ${remote_net} inet 10.

Wireguard on (current | 6.8 and higher )

Wireguard on OpenBSD OpenBSD added wg to the Kernel a while ago … why not have a look into and do some speedtests … ? Setup CLIENT1 — WireGuard — CLIENT2 and running tcpbench between Client1 and Client2 Fireup VMs Stage 3 VM’s on my litte Proxmox Server (Intel NUC) host nic ip wg nic ip Client1 em0 192.168.108.7 wg0 10.0.0.1 WireGuard em0 192.168.108.8 wg0 10.0.0.2 Client2 em0 192.168.108.0 wg0 10.

Wireguard

WireGuard Stuff, 2019-09-18 Resourcen Also Check my new Post about Wireguard on Current … Using wireguard on OpenBSD OpenBSD Router: VPN Wireguard Server Packages pkg_add wireguard-go \ wireguard-tools \ libqrencode Config & Enable WG rcctl enable wireguard_go rcctl set wireguard_go flags tun2 Prepare Environment mkdir -p /etc/wireguard/{keys,config} cd /etc/wireguard Generate Keys wg genkey | tee keys/server-private.key | wg pubkey > keys/server-public.key wg genkey | tee keys/client001-private.key | wg pubkey > keys/client001-public.