VPN

L4: /nw/proxy/

WireGuard - C

  • debug: https://www.wireguard.com/quickstart/#debug-info

  • Network Namespace: https://www.wireguard.com/netns/

  • uci: https://wiki.archlinux.org/title/WireGuard

  • docker: https://github.com/masipcat/wireguard-go-docker

  • auto: https://github.com/burghardt/easy-wg-quick

key

https://github.com/axllent/wireguard-vanity-keygen/releases

https://www.wireguard.com/protocol/

  • optional pre-shared key that is mixed into the public key cryptography, all-zeros if not in use

    wg genpsk > presharedkey

private-key file: https://ubuntu.com/server/docs/security-tips-for-wireguard-vpn#preventing-accidental-leakage-of-private-keys

wg-quick

https://github.com/WireGuard/wireguard-tools/blob/master/src/wg-quick/linux.bash

https://wiki.archlinux.org/title/WireGuard#wg-quick

forwarding

https://unix.stackexchange.com/a/722448

sever

home gateway

Tailscale

Free for Personal: https://tailscale.com/pricing/

  • Console: https://login.tailscale.com/admin/machines

  • relay: https://tailscale.com/kb/1118/custom-derp-servers/

Subnet

https://tailscale.com/kb/1019/subnets#connect-to-tailscale-as-a-subnet-router

  • Linux: Enable IP forwarding

  • Web: Edit route settings / Access Controls

zerotier

Moons

Own Roots (a.k.a. Moons): https://docs.zerotier.com/roots/

nebula - go

https://github.com/slackhq/nebula

Last updated

Was this helpful?