Difference between revisions of "WireGuard"

From wikieduonline
Jump to navigation Jump to search
 
(19 intermediate revisions by the same user not shown)
Line 5: Line 5:
 
* WireGuard is invisible to illegitimate peers and network scanners <ref>https://www.wireguard.com/papers/wireguard.pdf</ref>
 
* WireGuard is invisible to illegitimate peers and network scanners <ref>https://www.wireguard.com/papers/wireguard.pdf</ref>
 
* WireGuard uses only [[UDP]] protocol (port 41414).
 
* WireGuard uses only [[UDP]] protocol (port 41414).
 +
* [[Connection-less]] protocol
 +
  
 
* [[Curve25519]] used for identified peers, using their public key, a 32-byte Curve25519 point
 
* [[Curve25519]] used for identified peers, using their public key, a 32-byte Curve25519 point
  
  $ sudo [[apt install wireguard]]
+
 
 +
 
 +
* Linux: <code>sudo [[apt install wireguard]]</code>
 +
* macOS: <code>[[brew install wireguard-go]]</code>
 +
 
 
Included in March [[2020]] into the [[Linux Kernel changelog|Linux Kernel 5.6]] , available in Ubuntu since [[Ubuntu 20.10]]
 
Included in March [[2020]] into the [[Linux Kernel changelog|Linux Kernel 5.6]] , available in Ubuntu since [[Ubuntu 20.10]]
  
Line 15: Line 21:
 
WireGuard's encryption speed claims to be faster that [[IPsec]] group protocols.
 
WireGuard's encryption speed claims to be faster that [[IPsec]] group protocols.
  
* [[Debian]] packages: <code>wireguard, wireguard-dkms, wireguard-tools</code>
+
* [[Debian]] packages: <code>wireguard, wireguard-dkms, [[wireguard-tools]]</code>
  
  
Line 28: Line 34:
 
== Configuration ==
 
== Configuration ==
 
* <code>[[/etc/wireguard/]]</code>
 
* <code>[[/etc/wireguard/]]</code>
 
+
* <code>[[/etc/wireguard/wg0.conf]]</code>
  
  
Line 35: Line 41:
 
== Activities ==
 
== Activities ==
 
* Read https://wiki.archlinux.org/index.php/WireGuard
 
* Read https://wiki.archlinux.org/index.php/WireGuard
 +
 +
== Related terms ==
 +
* <code>[[sysctl]] -w [[net.ipv4]].[[ip_forward]]=1</code>
 +
* <code>sysctl -w net.ipv6.conf.all.forwarding=1</code>
 +
* [[4G]]
 +
* Clients behind [[NAT]] can keep the VPN established using an optional <code>keepalive</code> parameter; it defaults to no keepalive
 +
* <code>wg-watchdog.sh</code> https://gist.github.com/mattkasun/9a0e90d9d31b2c935d3f6d6e71dbece9
 +
* <code>[[pritunl]]</code>
  
 
== See also ==
 
== See also ==
 +
* {{wg}}
 +
* {{WireGuard}}
 
* {{VPN}}
 
* {{VPN}}
 
* [[Edge Security LLC]]
 
* [[Edge Security LLC]]
Line 43: Line 59:
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Networking]]
 
[[Category:Networking]]
 +
[[Category:WireGuard]]
 +
[[Category:Tunneling protocols]]
 +
[[Category:Virtual private networks]]

Latest revision as of 12:56, 25 January 2024

wikipedia:WireGuard is a free and open-source software application and communication protocol that implements virtual private network techniques to create secure point-to-point connections in routed or bridged configurations. It use Noise protocol framework, Curve25519, ChaCha20, Poly1305, BLAKE2, SipHash24 and HKDF.


Technical features:

  • WireGuard is invisible to illegitimate peers and network scanners [1]
  • WireGuard uses only UDP protocol (port 41414).
  • Connection-less protocol


  • Curve25519 used for identified peers, using their public key, a 32-byte Curve25519 point


Included in March 2020 into the Linux Kernel 5.6 , available in Ubuntu since Ubuntu 20.10

WireGuard's encryption speed claims to be faster that IPsec group protocols.


  • MacOS: brew install wireguard-tools
  • iOS: allows auto activation on WiFI based on SSID.

Commands[edit]

Configuration[edit]


Author: Jason A. Donenfeld. Advisors: Trevor Perrin, Jean-Philippe Aumasson, Steven M. Bellovin, and Greg Kroah-Hartman[2]

Activities[edit]

Related terms[edit]

See also[edit]

  • https://www.wireguard.com/papers/wireguard.pdf
  • https://www.wireguard.com/papers/wireguard.pdf
  • Advertising: