I had been using wireguard-go (macports) on the Mac for a few months now and I'm simply amazed by the performance. Also using it on my phone. Weirdly enough when it's on my connection is more stable, probably because it bypasses the traffic shaping by my ISP through its UDP use.<p>I couldn't find any information on whether or not this uses wireguard-go internally? Or maybe even the Rust implementation?<p>p.s. the snow on <a href="https://data.zx2c4.com/wireguard-for-macos-screenshots-february-2019/" rel="nofollow">https://data.zx2c4.com/wireguard-for-macos-screenshots-febru...</a> is pretty hilarious
I've had a great experience deploying Wireguard using Streisand [1]. I'm excited to migrate to this GUI client, instead of using `wg-quick` in the macOS terminal.<p>With Streisand, I only needed to choose some options and input a few credentials. 20 minutes later, Streisand had created a locked-down, self-updating box dedicated to hosting nothing but Wireguard. I deployed to a $5/month Digital Ocean droplet.<p>[1]: <a href="https://github.com/StreisandEffect/streisand" rel="nofollow">https://github.com/StreisandEffect/streisand</a><p>Streisand previously on HN: <a href="https://news.ycombinator.com/item?id=18903780" rel="nofollow">https://news.ycombinator.com/item?id=18903780</a>, <a href="https://news.ycombinator.com/item?id=8082444" rel="nofollow">https://news.ycombinator.com/item?id=8082444</a>
I'm excited to hear that they are making a new TUN infrastructure for Windows. After the website redesign, OpenVPN doesn't even ship builds of Windows-TAP anymore and it is quite a pain to build, plus you have to sign it yourself. One of my current projects will need a TUN and we've decided to make it Linux only because its just too much work to support Windows. There is a new VPN provider API only accessible to UWP apps, but there is literally zero documentation or examples beyond the auto generated .NET API docs.
It works great. As a user, I love that it's being distributed via the Mac App Store. The one and only nitpick I have is the lack of bulk import support of the config files, but that's something I can live without.<p>I'm looking forward to the Windows version. Thank you for taking the long and careful route with it.
Jason, thank you for Wireguard. It is just awesome!<p>Which hosting provider is recommended for running your own wireguard server? I have tried various cloud providers like (digital ocean, google, aws etc)
I noticed that Apple ID and app store does not work when traffic exits via these cloud instances. Has anyone else faced this issue? Any solutions?
I love the screenshot page, funny! Comic Sans and over-the-top JavaScript effects.<p><a href="https://data.zx2c4.com/wireguard-for-macos-screenshots-february-2019/" rel="nofollow">https://data.zx2c4.com/wireguard-for-macos-screenshots-febru...</a><p>Brings me back to the days of JavaScript Kit and Dynamic Drive
This looks amazing. I currently use OpenVPN to tunnel into a Kubernetes cluster, it's great how simple debugging distributed apps has become due to being able to do that.<p>I wonder if I could use WireGuard to do the same, it appears to be much easier to set up.
Funny how the developer doesn't respond to [1] from a VPN provider about improving security...DO NOT USE if you want to actually be secure!<p>[1]:<a href="https://lists.zx2c4.com/pipermail/wireguard/2019-January/003777.html" rel="nofollow">https://lists.zx2c4.com/pipermail/wireguard/2019-January/003...</a>
Question: how many of you uses a crypted VPN Tunnel daily?
We all know that privacy is important and it will became more and more important in the next few years.
Does tools like WireGuard help in these cases? Or I miss the main focus? Should we all used a private VPN tunnel?
So I use Mullvad, that have WireGuard servers setup. Downloaded the config files (which work perfectly on Linux) and I can't get WireGuard for iOS to work at all. I get the VPN icon in the top left but I have no actual internet connection (on either WiFi or 4G).<p>Downloaded the TunSafe Client and the very same config files work perfectly. Obviously I'd prefer to use the WireGuard app though, but I cannot get it to work at all sadly.
Thanks for this, have been following the project for a while.<p>A minor annoyance, right now the usual option that allows to forward all traffic through the vpn is missing (the os and others put everything in an advance options pane accessible via button on the main screen) and route have to be configured manually each time... please keep this in mind for the next release ;)
I look forward to solutions to solve autoconfiguration. I love how with say OpenConnect, I just enter a server address and my address and auth methods are all configured automatically. Otherwise very much a fan of WG!
Looks great. I've been using WireGuard on the command line with my work MacBook and it's been solid despite the massive warnings about alpha software. I'll have to look into switching to this next week.
I'm using Wireguard in combination with Pi-Hole on a cheap VPS as a VPN on my iPhone, it's blazingly fast and super stable. Will be trying this on my Mac as well now.
how would I go about implementing a killswitch for this? I'd like for it wait until I said its OK to either try to reconnect or allow network without WireGuard connection. I was very happy with how Tunnelblick would do this for shitty internet scenarios. Is something like that even necessary in this situation?<p>also: i do have connect on demand on.<p>apologies if stupid question