Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


WireGuard automated installer | Ubuntu, Debian, CentOS, Fedora - Page 4
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

WireGuard automated installer | Ubuntu, Debian, CentOS, Fedora

1246789

Comments

  • NyrNyr Community Contributor, Veteran

    theblackesthat said: Does this keep any logs by default? How can I make sure it keeps ZERO logs?

    WireGuard doesn't include logging capabilities by default.

    Iroshan464 said: And nordvpn has modified the code to use it on their servers.

    It doesn't matter if the server itself saves logs or not, a VPN is not a tool to provide anonymity. Nord keeps logs too, and they'll never publish an independent audit proving the opposite, only marketing speak. Logs are needed to run their business, same as any other hosting service, and are needed so they don't get shut down when someone makes a bomb threat or uploads child porn.

    Anyway commercial VPN providers use upstream ISPs which also keep logs of what's going in their network, so even in the very rare case of a VPN provider which really doesn't log their customer's activities, whoever did something bad will be identified anyway.

    "something bad" != "downloading a torrrent"

  • Iroshan464Iroshan464 Member
    edited May 2020

    @Nyr
    Yeah. May be you're right.
    I just looked in my nordvpn and they call it nordlynx.
    https://nordvpn.com/blog/nordlynx-protocol-wireguard/

    The WireGuard protocol alone can’t ensure complete privacy. Here’s why. It can’t dynamically assign IP addresses to everyone connected to a server. Therefore, the server must contain a local static IP address table to know where internet packets are traveling from and to whom they should return. It means that the user's identity must be stored on the server and linked to an internal IP address assigned by the VPN.

    How we made it work
    We needed to find a way for the WireGuard protocol to work without posing a risk to our customers’ privacy.

    And we found it. We developed something called a double NAT (Network Address Translation) system.

    To put it simply, the double NAT system creates two local network interfaces for each user. The first interface assigns a local IP address to all users connected to a server. Unlike in the original WireGuard protocol, each user gets the same IP address.>

  • NyrNyr Community Contributor, Veteran

    Iroshan464 said: I just looked in my nordvpn and they call it nordlynx.

    I see. Again, it's mostly PR speak:

    The WireGuard protocol alone can’t ensure complete privacy. Here’s why. It can’t dynamically assign IP addresses to everyone connected to a server. Therefore, the server must contain a local static IP address table to know where internet packets are traveling from and to whom they should return. It means that the user's identity must be stored on the server and linked to an internal IP address assigned by the VPN.

    "the user's identity". That's very vague. I wouldn't say that an internal IP address is "the user's identity". The only information which a WireGuard server stores is:

    • Private IP address assigned to the client
    • Public key of the client
    • Optionally, a pre-shared key

    They are maybe referring to the fact that one website could, using some tricks, obtain the internal IP address of a VPN-connected client. One could argue that this can be used to fingerprint their customers.

    In personal my opinion, this just serves as a reason to push their proprietary "NordLynx" protocol which is not compatible with standard WireGuard clients and never will be.

    Thanked by 2vimalware mtsbatalha
  • I just wanted to say, @Nyr I've used this many times in the past (I discovered it off Github, not here) and it's great. Thanks for taking the time to maintain and write this package.

    Thanked by 1Nyr
  • hacktekhacktek Member
    edited May 2020

    I implemented it with the pihole docker. It works fine. As a suggestion, can you allow manually selecting what DNS server you want to use? I had to edit the client config to point it to the pihole docker internal IP because the tunnel would not come up with 127.0.0.1 as the DNS (which is what was set when I selected the "Current system resolvers" option)

  • NyrNyr Community Contributor, Veteran

    hacktek said: I implemented it with the pihole docker. It works fine. As a suggestion, can you allow manually selecting what DNS server you want to use? I had to edit the client config to point it to the pihole docker internal IP because the tunnel would not come up with 127.0.0.1 as the DNS (which is what was set when I selected the "Current system resolvers" option.

    The "current system resolvers" option selects just that, the resolver which is present in the system's resolv.conf. Letting the user provide a custom resolver requires a little bit of work on the input validation part, but it's something which I'll consider, so thanks for the feedback.

  • sonicsonic Veteran

    Hi @Nyr , does this script work on Nat IPv6 VPS?

  • NyrNyr Community Contributor, Veteran

    @sonic said:
    Hi @Nyr , does this script work on Nat IPv6 VPS?

    Yes, but not in OpenVZ, yet.

    Container support is coming very soon, probably will be released during next week :)

    Thanked by 2sonic ThracianDog
  • That's awesome.
    So I can install this on all my Nat vps too. :))

  • I would recommend PiVPN (supports wireguard and openvpn) for distros that use apt as package manager, running it myself at the moment over at Netcup, management of the configs is also pretty easy with PiVPN.

  • @mtsbatalha said:

    Nyr said: Using a Raspberry Pî as a server, right?

    No my friend. I'm using Debian 10 (online.net server).

    After run script the ouput says for install kernel, but the kernel requested is already installed.

    Edit: wireguard-install.sh: line 407: modprobe: command not found
    Warning!
    Installation was finished, but the WireGuard kernel module could not load.
    Upgrade the kernel with "apt-get install linux-image-amd64" and restart

    https://linuxconfig.org/command-not-found-missing-path-to-sbin-on-debian-gnu-linux

    I fixed this by logging into root using su -l instead of just su

  • NyrNyr Community Contributor, Veteran

    OpenVZ support is here!


    FAQ:

    Does it work with other container technologies?
    Very likely, as long as they have full iptables/nftables support.

    Does it work with just 128 MB of RAM?
    Yes but avoid CentOS if you don't have SWAP, because yum/dnf are memory hungry.

    Does it work with NAT servers?
    Yes.

    Why are you using BoringTun instead of wireguard-go?
    It is the best WireGuard user space implementation currently available. I have my "political" opinions and you can too, but at this time BoringTun is technically a great choice and I see no reason to avoid it.

    Why aren't you signing the binaries?
    Because Cloudflare is not going to, and when they make them available I'd like to use their official binaries instead of my own. They are a modern company with great engineers for new and shiny languages, but it seems like GPG is too old school for them. My initial idea was to provide full deb and rpm repositories for the community, but that ended up being an unattainable ammount of work if I wanted to do it properly.

    Code quality could be better/cleaner
    That's not a question, but I know. I wanted to get working OpenVZ support out and then polish the minor stuff. I have a limited amount of time available and the implementation is working correctly, so no need to wait.

  • Would help if you an also list some good VPN client apps for Windows / Mac / Android & iOS.

    Also mentioning how we can use setup split tunneling if possible with WireGuard. It is helpful in many occasions.

    Thanks

  • NanoG6NanoG6 Member

    Working PERFECTLY, many thanks @Nyr!

    Thanked by 1Nyr
  • For Android and windows official apps work perfectly.
    On Android you could activate magisk modeule too.
    Always better to use the official software. In this case, they are very good.

    Thanked by 1mehargags
  • NyrNyr Community Contributor, Veteran

    theblackesthat said: I fixed this by logging into root using su -l instead of just su

    I've added a check for this.

    mehargags said: Would help if you an also list some good VPN client apps for Windows / Mac / Android & iOS.

    To tell the truth, I still didn't move to WireGuard myself, so can't speak from experience.

    There are official clients with different grades of maturity for almost any platform and then there is TunSafe too which was a promising alternative developed by the creator of uTorrent, but seems to be getting abandoned.

    For most platforms I'd probably go with the official client based on what I've seen, but ask me in two weeks if you are curious about what I ended up using.

    mehargags said: Also mentioning how we can use setup split tunneling if possible with WireGuard. It is helpful in many occasions.

    Can be configured client-side with the AllowedIPs directive.

  • Naming something BoringTun sounds like they want to pick a fight with Musk.

  • NyrNyr Community Contributor, Veteran

    TimboJones said: Naming something BoringTun sounds like they want to pick a fight with Musk.

    It is actually an homage to BoringSSL IIRC

  • NyrNyr Community Contributor, Veteran

    Due to a bug in BoringTun, adding users after the first one would result in WireGuard breaking for those using the script in OpenVZ.

    I have addressed that on my side with the latest commit. Affected users can download and use the latest version, no need to reinstall.

    Non-container installations are not affected.

    Thanks @NanoG6 and @ThracianDog for reporting this.

  • @Nyr can i request a feature please. Can we get the ability to choose our own DNS resolver IP instead of only being able to select the one given

  • @Iroshan464 said:
    For Android and windows official apps work perfectly.

    for windows i prever tunsafe

  • NyrNyr Community Contributor, Veteran

    dazzsser said: can i request a feature please. Can we get the ability to choose our own DNS resolver IP instead of only being able to select the one given

    Yes, this is something which I'm seriously considering. Probably will be implemented soon.

    hyperblast said: for windows i prever tunsafe

    Been using it for the last day and I do too. More performant and feature complete at this time. A shame that it hasn't seen a release in more than a year and is starting to look abandoned.

    Thanked by 1Iroshan464
  • It works great!
    I am wondering Is there any way to add a client with one command? For example: using preset (or random) username and default dns, instead of echoing option 1, then type in username and then select dns. It would be great in the case of creating multiple users.
    Thank you!

  • NyrNyr Community Contributor, Veteran

    trungkien said: I am wondering Is there any way to add a client with one command? For example: using preset (or random) username and default dns, instead of echoing option 1, then type in username and then select dns. It would be great in the case of creating multiple users.

    Not at the moment, sorry. Maybe if I have time in the future for this.

    Thanked by 1trungkien
  • DylanDylan Member

    Nyr said: A shame that it hasn't seen a release in more than a year and is starting to look abandoned.

    Yeah, I think the creator is done with it. Originally he didn't want to open-source TunSafe and hinted that he wanted to make money off it. Unsurprisingly, especially given what he did with μTorrent, he got a lot of flak for that. After the pushback he did open-source TunSafe, but seems to have not touched it since.

  • OujiOuji Member
    edited June 2020

    I was failing to install on Proxmox host, but I was able to do it using buster backports.

  • jcalebjcaleb Member

    @Nyr said: Lightweight WireGuard installer, written entirely in bash.

    Freakin good work boss. You the man. Thanks for the hard work and generously sharing in the community

    Thanked by 1Nyr
  • Can this script be used to link multiple servers into its own private lan?

  • I'm just beginning to educate myself on VPS management, so please forgive this basic question.

    After I start fresh with Ubuntu 20.04 on a VPS, I'll "apt update && apt upgrade". Then should I proceed to harden the VPS using one of the many online tutorials, and then run this wireguard script?

    Or, does the script not only install wireguard, but also harden the server so I don't have to do any of that server security such as ufw firewall, etc?

  • OujiOuji Member

    @WildDaisy said: Or, does the script not only install wireguard, but also harden the server so I don't have to do any of that server security such as ufw firewall, etc?

    The script only install wireguard and creates a client config. You have to harden the server yourself.

Sign In or Register to comment.