global: wireguard.io --> wireguard.com
Due to concerns with the .io TLD, we are switching to using wireguard.com instead. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
This commit is contained in:
parent
28f373e9cd
commit
aad91ae679
10 changed files with 14 additions and 14 deletions
|
@ -3,7 +3,7 @@
|
||||||
|
|
||||||
WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes **state-of-the-art cryptography**. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.
|
WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes **state-of-the-art cryptography**. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.
|
||||||
|
|
||||||
**More information may be found at [WireGuard.io](https://www.wireguard.io/).**
|
**More information may be found at [WireGuard.com](https://www.wireguard.com/).**
|
||||||
|
|
||||||
## License
|
## License
|
||||||
|
|
||||||
|
|
|
@ -51,7 +51,7 @@ func main() {
|
||||||
StaticKeypair: noise.DHKey{Private: ourPrivate, Public: ourPublic},
|
StaticKeypair: noise.DHKey{Private: ourPrivate, Public: ourPublic},
|
||||||
PeerStatic: theirPublic,
|
PeerStatic: theirPublic,
|
||||||
})
|
})
|
||||||
conn, err := net.Dial("udp", "demo.wireguard.io:12913")
|
conn, err := net.Dial("udp", "demo.wireguard.com:12913")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatalf("error dialing udp socket: %s", err)
|
log.Fatalf("error dialing udp socket: %s", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -57,7 +57,7 @@ unsafeMessage write mpsk msg ns = case operation msg ns of
|
||||||
|
|
||||||
main :: IO ()
|
main :: IO ()
|
||||||
main = do
|
main = do
|
||||||
let ip = "demo.wireguard.io"
|
let ip = "demo.wireguard.com"
|
||||||
port = "12913"
|
port = "12913"
|
||||||
myKeyB64 = "WAmgVYXkbT2bCtdcDwolI88/iVi/aV3/PHcUBTQSYmo=" -- private key
|
myKeyB64 = "WAmgVYXkbT2bCtdcDwolI88/iVi/aV3/PHcUBTQSYmo=" -- private key
|
||||||
serverKeyB64 = "qRCwZSKInrMAq5sepfCdaCsRJaoLe5jhtzfiw7CjbwM=" -- public key
|
serverKeyB64 = "qRCwZSKInrMAq5sepfCdaCsRJaoLe5jhtzfiw7CjbwM=" -- public key
|
||||||
|
|
|
@ -17,7 +17,7 @@ use pnet::packet::icmp::{MutableIcmpPacket, IcmpTypes, echo_reply, echo_request,
|
||||||
use std::net::*;
|
use std::net::*;
|
||||||
use std::str::FromStr;
|
use std::str::FromStr;
|
||||||
|
|
||||||
static TEST_SERVER: &'static str = "demo.wireguard.io:12913";
|
static TEST_SERVER: &'static str = "demo.wireguard.com:12913";
|
||||||
|
|
||||||
fn memcpy(out: &mut [u8], data: &[u8]) {
|
fn memcpy(out: &mut [u8], data: &[u8]) {
|
||||||
out[..data.len()].copy_from_slice(data);
|
out[..data.len()].copy_from_slice(data);
|
||||||
|
|
|
@ -140,7 +140,7 @@ int main(int argc, char *argv[])
|
||||||
const char *server = argv[1], *interface = argv[2];
|
const char *server = argv[1], *interface = argv[2];
|
||||||
|
|
||||||
if (argc < 3) {
|
if (argc < 3) {
|
||||||
fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.io wg0\n", argv[0], argv[0]);
|
fprintf(stderr, "Usage: %s SERVER WIREGUARD_INTERFACE\nExample:\n %s demo.wireguard.com wg0\n", argv[0], argv[0]);
|
||||||
return EINVAL;
|
return EINVAL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -11,6 +11,6 @@ That all said, this is a pretty cool example of just how
|
||||||
darn easy WireGuard can be.
|
darn easy WireGuard can be.
|
||||||
|
|
||||||
Disclaimer:
|
Disclaimer:
|
||||||
The `demo.wireguard.io` server in client.sh is for testing
|
The `demo.wireguard.com` server in client.sh is for testing
|
||||||
purposes only. You may not use this server for abusive or
|
purposes only. You may not use this server for abusive or
|
||||||
illegal purposes.
|
illegal purposes.
|
||||||
|
|
|
@ -6,13 +6,13 @@ set -e
|
||||||
[[ $UID == 0 ]] || { echo "You must be root to run this."; exit 1; }
|
[[ $UID == 0 ]] || { echo "You must be root to run this."; exit 1; }
|
||||||
umask 077
|
umask 077
|
||||||
trap 'rm -f /tmp/wg_private_key' EXIT INT TERM
|
trap 'rm -f /tmp/wg_private_key' EXIT INT TERM
|
||||||
exec 3<>/dev/tcp/demo.wireguard.io/42912
|
exec 3<>/dev/tcp/demo.wireguard.com/42912
|
||||||
wg genkey | tee /tmp/wg_private_key | wg pubkey >&3
|
wg genkey | tee /tmp/wg_private_key | wg pubkey >&3
|
||||||
IFS=: read -r status server_pubkey server_port internal_ip <&3
|
IFS=: read -r status server_pubkey server_port internal_ip <&3
|
||||||
[[ $status == OK ]]
|
[[ $status == OK ]]
|
||||||
ip link del dev wg0 2>/dev/null || true
|
ip link del dev wg0 2>/dev/null || true
|
||||||
ip link add dev wg0 type wireguard
|
ip link add dev wg0 type wireguard
|
||||||
wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.io:$server_port" persistent-keepalive 25
|
wg set wg0 private-key /tmp/wg_private_key peer "$server_pubkey" allowed-ips 0.0.0.0/0 endpoint "demo.wireguard.com:$server_port" persistent-keepalive 25
|
||||||
ip address add "$internal_ip"/24 dev wg0
|
ip address add "$internal_ip"/24 dev wg0
|
||||||
ip link set up dev wg0
|
ip link set up dev wg0
|
||||||
if [ "$1" == "default-route" ]; then
|
if [ "$1" == "default-route" ]; then
|
||||||
|
|
|
@ -114,7 +114,7 @@ traffic:
|
||||||
.br
|
.br
|
||||||
AllowedIPs = 0.0.0.0/0
|
AllowedIPs = 0.0.0.0/0
|
||||||
.br
|
.br
|
||||||
Endpoint = demo.wireguard.io:51820
|
Endpoint = demo.wireguard.com:51820
|
||||||
.br
|
.br
|
||||||
|
|
||||||
Notice that the `PostUp` and `PostDown` commands are used here to configure DNS using
|
Notice that the `PostUp` and `PostDown` commands are used here to configure DNS using
|
||||||
|
@ -193,6 +193,6 @@ was written by
|
||||||
Jason A. Donenfeld
|
Jason A. Donenfeld
|
||||||
.ME .
|
.ME .
|
||||||
For updates and more information, a project page is available on the
|
For updates and more information, a project page is available on the
|
||||||
.UR https://\:www.wireguard.io/
|
.UR https://\:www.wireguard.com/
|
||||||
World Wide Web
|
World Wide Web
|
||||||
.UE .
|
.UE .
|
||||||
|
|
|
@ -4,8 +4,8 @@ After=network-online.target
|
||||||
Wants=network-online.target
|
Wants=network-online.target
|
||||||
Documentation=man:wg-quick(8)
|
Documentation=man:wg-quick(8)
|
||||||
Documentation=man:wg(8)
|
Documentation=man:wg(8)
|
||||||
Documentation=https://www.wireguard.io/
|
Documentation=https://www.wireguard.com/
|
||||||
Documentation=https://www.wireguard.io/quickstart/
|
Documentation=https://www.wireguard.com/quickstart/
|
||||||
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg-quick.8
|
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg-quick.8
|
||||||
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg.8
|
Documentation=https://git.zx2c4.com/WireGuard/about/src/tools/wg.8
|
||||||
|
|
||||||
|
|
4
src/wg.8
4
src/wg.8
|
@ -200,7 +200,7 @@ ignored.
|
||||||
.br
|
.br
|
||||||
PublicKey = gN65BkIKy1eCE9pP1wdc8ROUtkHLF2PfAqYdyYBz6EA=
|
PublicKey = gN65BkIKy1eCE9pP1wdc8ROUtkHLF2PfAqYdyYBz6EA=
|
||||||
.br
|
.br
|
||||||
Endpoint = test.wireguard.io:18981
|
Endpoint = test.wireguard.com:18981
|
||||||
.br
|
.br
|
||||||
AllowedIPs = 10.10.10.230/32
|
AllowedIPs = 10.10.10.230/32
|
||||||
|
|
||||||
|
@ -225,6 +225,6 @@ was written by
|
||||||
Jason A. Donenfeld
|
Jason A. Donenfeld
|
||||||
.ME .
|
.ME .
|
||||||
For updates and more information, a project page is available on the
|
For updates and more information, a project page is available on the
|
||||||
.UR https://\:www.wireguard.io/
|
.UR https://\:www.wireguard.com/
|
||||||
World Wide Web
|
World Wide Web
|
||||||
.UE .
|
.UE .
|
||||||
|
|
Loading…
Reference in a new issue