TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

WireGuard 1.0 for Linux 5.6

768 pointsby zx2c4about 5 years ago

30 comments

newscrackerabout 5 years ago
For anyone wanting to try it, WireGuard with Algo VPN [1] to set it up on a server is a great combination. I found it quite easy to setup and use.<p>Algo has built-in support for various cloud providers, where, when you run it from, day, your desktop, it can setup the VPN server for you based on answers to some questions (with sensible defaults) and some information on connecting to the provider (like an API key, for example). You also get QR code images that you can use to install a VPN profile on your phone.<p>You can also run Algo from within a server and have it setup the VPN for you.<p>[1]: <a href="https:&#x2F;&#x2F;github.com&#x2F;trailofbits&#x2F;algo" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;trailofbits&#x2F;algo</a>
评论 #22728206 未加载
评论 #22730546 未加载
评论 #22730836 未加载
评论 #22727762 未加载
评论 #22730649 未加载
kaylynbabout 5 years ago
WireGuard is great, but I think it&#x27;s really undersold when it&#x27;s described as being just a vpn. It&#x27;s really an encrypted tunnel that is configured like a network adapter in the Linux network stack.<p>This lets you configure it with stuff like systemd-networkd and unit files, or easily spin up a tunnel with a few `ip` commands, and setup some simple nftables rules to do all sorts of stuff.<p>I do use it as a vpn as well, but it&#x27;s so much easier to setup than, say, OpenVPN, where you need to create tun&#x2F;br interfaces and then tie them together with a service, etc. That said, OpenVPN and other actual VPN software does more than just a tunnel (like pushing routes, config settings, etc), so WireGuard cannot replace everything by itself.<p>The documentation is rather sparse, but there isn&#x27;t much to it either. The manpages have what you need to know and the rest is just general Linux network stack knowledge.
评论 #22733460 未加载
exabrialabout 5 years ago
One thing I wish for wireguard: the ability to look up keys&#x2F;ips in an external system like LDAP. I moved an entire call center [50+ people] fully remote last week. We&#x27;re using wireguard. Key management stinks, and that is my only complaint! It is an incredible piece of software and I&#x27;m very thankful for it.
评论 #22727860 未加载
评论 #22728397 未加载
评论 #22727876 未加载
评论 #22733120 未加载
评论 #22732193 未加载
评论 #22727913 未加载
twicabout 5 years ago
I&#x27;m a bit baffled by WireGuard. From 10 000 feet, the protocol is similar to IPSec - encrypt packets, and send them over the internet using a connectionless protocol.<p>So why is it so much better?<p>Is it because it&#x27;s a new and simpler <i>implementation</i> than what we have for IPSec?<p>Is it because the protocol, being newer, is simpler and cleaner than IPSec?<p>Is it because, being newer, it can use a modern ciphersuite?<p>Are there fundamental advances in the design?<p>One of the nice things about IPSec is that it&#x27;s a standard. There&#x27;s a reasonable chance that two endpoints written by separate parties will be able to communicate. Introducing a whole new protocol whose main implementation is its definition seems like a step backwards.
评论 #22736220 未加载
评论 #22736515 未加载
评论 #22736391 未加载
评论 #22736537 未加载
xalabout 5 years ago
Given the occasion, could someone write a paragraph about what downstream effects are expected by wireguard existing? So far I’ve seen mostly technical arguments for it. VPNs have become a more important piece of infrastructure now. The most significant approachability increase really came from mobile based solutions and auto pilot systems like Google’s Outline.<p>Will WG make a marked difference in stability, speed, approachability for normal users, or what can we expect?
评论 #22727667 未加载
评论 #22727817 未加载
评论 #22727672 未加载
liftyabout 5 years ago
I really hope WireGuard becomes a standard and get&#x27;s included in the macOS&#x2F;iOS and Windows kernels as well. Key management and and other fancy features could be left to userspace applications but having the basic wg capability in the kernel would be great.
评论 #22729696 未加载
评论 #22729259 未加载
place1about 5 years ago
I&#x27;m a big fan of Wireguard. I wrote wg-access-server [1] as an all-in-one wireguard VPN solution. I recently added some docs [2] and support for deploying with Helm. I&#x27;d love some feedback on here or on github. Give it a try.<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;place1&#x2F;wg-access-server" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;place1&#x2F;wg-access-server</a> [2] <a href="https:&#x2F;&#x2F;place1.github.io&#x2F;wg-access-server&#x2F;" rel="nofollow">https:&#x2F;&#x2F;place1.github.io&#x2F;wg-access-server&#x2F;</a>
评论 #22747685 未加载
评论 #22738706 未加载
djsumdogabout 5 years ago
I recently setup WireGuard on my new dedicated server and it is amazingly easier compared to OpenVPN. I&#x27;ve setup several site-to-site and client-to-site VPNs on OpenVPN so maybe I&#x27;m just use to all the iptables&#x2F;route gotchas, but not needing to do the whole CA&#x2F;easyrsa stuff is a huge bonus.<p>I like how their official tutorial video shows all the raw ip commands and then shows their wg-quick configuration script. That way you understand what the script is doing and what commands its running.<p>One big limitation is that it cannot bind to a specific IP address. The author states it shouldn&#x27;t matter because it won&#x27;t respond without the right auth key (and it doesn&#x27;t support TCP so people can&#x27;t tell if it&#x27;s sitting there listening) but I found I did get into weird routing loops where packets will come in on one IP and go out on another one. The primary outgoing IP is what shows up when you run `wg show`.<p>It is super weird to implement a brand new service and have a config option for the port, but not the IP address(es) to listen on.
评论 #22731015 未加载
peterwwillisabout 5 years ago
I like the idea of WireGuard as a simple tunnel, but I wish people would stop comparing it with VPNs. VPNs have lots of extra functionality that is necessary to support a variety of use cases, both functionally (like pushing routes or scripts to clients) and security-wise (like real key management and SSO).<p>I literally can&#x27;t replace any VPN I currently use with Wireguard because I would lose needed functionality. I could maybe replace the tunnel to a bastion host, but even then I would actually be worse off security wise, because I&#x27;d be losing cert-based key management. (ex. <a href="https:&#x2F;&#x2F;smallstep.com&#x2F;blog&#x2F;use-ssh-certificates&#x2F;" rel="nofollow">https:&#x2F;&#x2F;smallstep.com&#x2F;blog&#x2F;use-ssh-certificates&#x2F;</a>)
评论 #22739572 未加载
rasenganabout 5 years ago
We have all been waiting for this. Congratulations to Jason and the whole WireGuard team and community! And, thank you Linus!
willis936about 5 years ago
Now I really want to know when raspbian will get linux kernel 5.6. The most recent version of raspbian came out in February 2020 and uses linux kernel 4.19, which came out in late 2018.<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Linux_kernel_version_history" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Linux_kernel_version_history</a>
评论 #22728906 未加载
评论 #22730147 未加载
评论 #22728900 未加载
terrywangabout 5 years ago
Very exciting news, indeed! Finally WireGuard is in the Linux kernel 5.6 onwoards (will arrive soon in the next few days for those who are on rolling releases).<p>I&#x27;ve been using WireGuard to replace IPsec (strongSwan - the whole stack is way too complex, plus client configuration issues, outweighs the benefits) and OpenVPN (latency, bandwidth &#x2F; performance is the biggest complaint) for remote access and mainly encrypting traffic from&#x2F;to terminal devices when accessing the Internet via unknown hops&#x2F;routes&#x2F;path.<p>On the other hand, WireGuard is simple (cryptokey routing), modern, elegant, easy to configure &amp; use, fast, and most importantly, reliable over the past 2.5 years, now even better without DKMS headaches ;-)<p>WireGuard clients for iOS (works as good as strongSwan for Android - which I missed a while ago) in terms of 1. on-demand 2. roaming between networks 3. power consumption &#x2F; overhead. macOS and Windows ones also work very well.<p>Problems: WireGuard does not scale well when used for global overlay network use cases (nebula does a much better job for this purpose). Another issue for VPN providers: each client has a static IP configuration, which contradicts with privacy and surveillance, curious to see how Cloudflare&#x27;s 1.1.1.1 solves the problem.<p>Last but not least: WireGuard protocol is easy to block. Therefore, I look forward to seeing obfuscation plugins &#x2F; extensions for WireGuard, it will serve a much bigger purpose for people who live under censorship&#x2F;surveillance (e.g. inside GFW) so as to protect privacy and get back their rights to access the `real` Internet.<p>Many thanks to Jason and the WireGuard team behind the scene!
评论 #22735687 未加载
GolDDranksabout 5 years ago
Any ideas how to get a client-server style VPN setup with WireGuard working with IPv6 so that it keeps working even if the public IP address of your VPN server changes? The configurations I&#x27;ve seen assign a statically configured IP address to a client. This works fine with NATted IPv4, but with IPv6, addresses are &quot;public&quot;, so the client must basically know the prefix of the server to be able to configure a sane address, and if that changes, the configuration must be changed by hand.
评论 #22736534 未加载
kertisabout 5 years ago
My congratulations to Jason and team! I am very happy that your 6 years effort led to merging in mainline.
tjoffabout 5 years ago
Does anyone know of a decent bash-script (or even self-hosted page) that one could use to administer wireguard?<p>Could go very far with trivial functionality, such as listing, adding, removing users and download a config file&#x2F;qr-code.
评论 #22731748 未加载
评论 #22731285 未加载
评论 #22737158 未加载
评论 #22732098 未加载
评论 #22735632 未加载
laktakabout 5 years ago
I use WireGuard and it works perfectly fine as it is.<p>Can someone explain why we need&#x2F;want to put it into the Linux kernel?
评论 #22729666 未加载
评论 #22730434 未加载
评论 #22729899 未加载
评论 #22729014 未加载
评论 #22729075 未加载
borplkabout 5 years ago
Could WireGuard be a good choice for server-to-server encryption instead of TLS? (for example between a TLS terminating load balancer to the application servers)
评论 #22734467 未加载
评论 #22742057 未加载
pkruminsabout 5 years ago
Very exciting! Does anyone know a good howto or a tutorial about it?
评论 #22727600 未加载
评论 #22727637 未加载
评论 #22727631 未加载
评论 #22727754 未加载
评论 #22737163 未加载
评论 #22727726 未加载
评论 #22728824 未加载
ur-whaleabout 5 years ago
This is <i>really</i> good news.<p>I&#x27;ve used a ton of VPN over the years, even some I wrote myself, and I&#x27;ve never seen anything that comes close to wireguard in terms of: ease of use, speed, cleanliness of code.<p>The world just got a whole lot secure and flexible.
samgranieriabout 5 years ago
Congratulations Jason! Wireguard is a joy to use.
huijzerabout 5 years ago
For anyone wanting to set up WireGuard with the Pi-hole DNS blocker: I would advise <a href="https:&#x2F;&#x2F;github.com&#x2F;racbart&#x2F;wireguard-pihole" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;racbart&#x2F;wireguard-pihole</a>. Just a simple shell script. No Docker or Kubernetes required. I installed it on the cheapest DigitalOcean VPS, and it has been running without issues for over a month now. (About 6 phones of me and my friends, and a few desktops are using it.)
dangabout 5 years ago
<a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;gadgets&#x2F;2020&#x2F;03&#x2F;wireguard-vpn-makes-it-to-1-0-0-and-into-the-next-linux-kernel&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;gadgets&#x2F;2020&#x2F;03&#x2F;wireguard-vpn-makes-...</a> is a related article.<p>(Via <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22731279" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22731279</a>, but no comments there.)
tomcooksabout 5 years ago
Should you want to try it on a cheap VPS and fail at it, make sure that your shared host has tun-tap and wireguard modules installed (open a ticket)
评论 #22730130 未加载
sirtoffskiabout 5 years ago
Congratulations and big thanks to all of the project developers and contributors!
2OEH8eoCRo0about 5 years ago
This is good to hear. There is a lot of trendy junk that people seem to want in the linux kernel. I&#x27;ve been waiting for WireGuard to prove itself before I give it a shot.
jannesabout 5 years ago
Unfortunately not in time for Ubuntu 20.04 which will be shipping with a 5.4 kernel. Can&#x27;t wait for Ubuntu to have this builtin!
评论 #22729054 未加载
tandavabout 5 years ago
still no good tutorial for complete beginners
评论 #22729935 未加载
pierreprinettiabout 5 years ago
Congratulations!
Hamukoabout 5 years ago
Has the codebase been audited now?
评论 #22732368 未加载
评论 #22733544 未加载
Glossterabout 5 years ago
Do I understand correctly? You use WireGuard to set up your own VPN servers? Doing this is a lot more expensive than buying a VPN subscription, but it can be more secure if you know what you&#x27;re doing, right?
评论 #22731498 未加载
评论 #22730207 未加载
评论 #22730193 未加载