Wireguard
Hardware support
Setup
Usage
Start:
wg-quick up wg0
Network-manager integration
see ../network-manager.md
Server
sudo apt install wireguard wireguard-tools linux-headers-amd64
Generate keys
wg genkey | sudo tee /etc/wireguard/server_private.key | \
  wg pubkey | sudo tee /etc/wireguard/server_public.key
Server config:
[Interface]
Address = 10.11.12.1/24
ListenPort = 51820
PrivateKey = ...
[Peer]
PublicKey = ...
AllowedIPs = 10.11.12.2/32
Client
[Interface]
Address = 10.11.12.2/24
DNS = 10.10.10.1
PrivateKey = ...
[Peer]
PublicKey = ...
AllowedIPs = 0.0.0.0/0
Endpoint = 12.34.56.78:51820
PersistentKeepalive = 25
Run wireguard in a container
Together with transmission
- SebDanielsson/compose-transmission-wireguard)
 - aerickson/docker-transmission-wireguard: stale, last commit 2020-10
 
Mullvad Wireguard
Mullvad config
- Key: ..
 - Pub: ..
 - IP: 
10.99.86.112/32,fc00:bbbb:bbbb:bb01::5670/128 
Wireguard ansbible roles
- Wireguard roles in Galaxy
 - Thulium-Drake/ansible-role-wireguard
- Best role so far from looking at it.
 
 - githubixx/ansible-role-wireguard
- Very popular
 - Big downside: Removes config when ansible-playbook is run against a single endpoint
 
 - ansibleguy/infra_wireguard
- Looks complex, generates keys and places them in files on the controller
 
 - lablabs/ansible-collection-wireguard
- Debian 11 is supported but the system must use systemd-networkd networking service instead of Network Manager.
 
 - abelfodil/ansible_role_wireguard
- Wrong link to Github repo
 
 - mawalu/wireguard-private-networking
- Stale !