WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes **state-of-the-art cryptography**. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.
-**More information may be found at [WireGuard.io](https://www.wireguard.io/).**
+**More information may be found at [WireGuard.com](https://www.wireguard.com/).**
## License
StaticKeypair: noise.DHKey{Private: ourPrivate, Public: ourPublic},
PeerStatic: theirPublic,
})
- conn, err := net.Dial("udp", "demo.wireguard.io:12913")
+ conn, err := net.Dial("udp", "demo.wireguard.com:12913")
if err != nil {
log.Fatalf("error dialing udp socket: %s", err)
}
main :: IO ()
main = do
- let ip = "demo.wireguard.io"
+ let ip = "demo.wireguard.com"
port = "12913"
myKeyB64 = "WAmgVYXkbT2bCtdcDwolI88/iVi/aV3/PHcUBTQSYmo=" -- private key
serverKeyB64 = "qRCwZSKInrMAq5sepfCdaCsRJaoLe5jhtzfiw7CjbwM=" -- public key
use std::net::*;
use std::str::FromStr;
-static TEST_SERVER: &'static str = "demo.wireguard.io:12913";
+static TEST_SERVER: &'static str = "demo.wireguard.com:12913";
fn memcpy(out: &mut [u8], data: &[u8]) {
out[..data.len()].copy_from_slice(data);
const char *server = argv[1], *interface = argv[2];
if (argc < 3) {
- fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.io wg0\n", argv[0], argv[0]);
+ fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.com wg0\n", argv[0], argv[0]);
return EINVAL;
}
darn easy WireGuard can be.
Disclaimer:
- The `demo.wireguard.io` server in client.sh is for testing
+ The `demo.wireguard.com` server in client.sh is for testing
purposes only. You may not use this server for abusive or
illegal purposes.
[[ $UID == 0 ]] || { echo "You must be root to run this."; exit 1; }
umask 077
trap 'rm -f /tmp/wg_private_key' EXIT INT TERM
-exec 3<>/dev/tcp/demo.wireguard.io/42912
+exec 3<>/dev/tcp/demo.wireguard.com/42912
wg genkey | tee /tmp/wg_private_key | wg pubkey >&3
IFS=: read -r status server_pubkey server_port internal_ip <&3
[[ $status == OK ]]
ip link del dev wg0 2>/dev/null || true
ip link add dev wg0 type wireguard
-wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.io:$server_port" persistent-keepalive 25
+wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.com:$server_port" persistent-keepalive 25
ip address add "$internal_ip"/24 dev wg0
ip link set up dev wg0
if [ "$1" == "default-route" ]; then
.br
AllowedIPs = 0.0.0.0/0
.br
- Endpoint = demo.wireguard.io:51820
+ Endpoint = demo.wireguard.com:51820
.br
Notice that the `PostUp` and `PostDown` commands are used here to configure DNS using
Jason A. Donenfeld
.ME .
For updates and more information, a project page is available on the
-.UR https://\:www.wireguard.io/
+.UR https://\:www.wireguard.com/
World Wide Web
.UE .
Wants=network-online.target
Documentation=man:wg-quick(8)
Documentation=man:wg(8)
-Documentation=https://www.wireguard.io/
-Documentation=https://www.wireguard.io/quickstart/
+Documentation=https://www.wireguard.com/
+Documentation=https://www.wireguard.com/quickstart/
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg-quick.8
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg.8
.br
PublicKey = gN65BkIKy1eCE9pP1wdc8ROUtkHLF2PfAqYdyYBz6EA=
.br
- Endpoint = test.wireguard.io:18981
+ Endpoint = test.wireguard.com:18981
.br
AllowedIPs = 10.10.10.230/32
Jason A. Donenfeld
.ME .
For updates and more information, a project page is available on the
-.UR https://\:www.wireguard.io/
+.UR https://\:www.wireguard.com/
World Wide Web
.UE .