Modifications to wireguard-go so it can (sorta) run on NetBSD
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
Jason A. Donenfeld 6b3b1c3b91
version: bump snapshot
5 years ago
ratelimiter ratelimiter: do not run GC with nothing to do 5 years ago
replay Move replay into subpackage 5 years ago
rwcancel Catch EINTR 5 years ago
tai64n global: Add SPDX tags and copyright header 5 years ago
tests Moved test-processes to background 5 years ago
tun Do not build tun device on ios 5 years ago
xchacha20poly1305 global: Add SPDX tags and copyright header 5 years ago
.gitignore Adopt GOPATH 5 years ago
COPYING Initial scaffolding 6 years ago
Gopkg.lock Update deps 5 years ago
Gopkg.toml Adopt GOPATH 5 years ago
Makefile version: bump snapshot 5 years ago
README.md Fix duplicated wording 5 years ago
allowedips.go Add copyright headers 5 years ago
allowedips_rand_test.go Add copyright headers 5 years ago
allowedips_test.go Add copyright headers 5 years ago
bind_test.go Add copyright headers 5 years ago
conn.go Cleanup 5 years ago
conn_default.go Support IPv6-less kernels 5 years ago
conn_linux.go Support IPv6-less kernels 5 years ago
constants.go Add copyright headers 5 years ago
cookie.go Catch EINTR 5 years ago
cookie_test.go Add copyright headers 5 years ago
device.go Adopt GOPATH 5 years ago
device_test.go Make successful tests silent 5 years ago
donotuseon_linux.go Adopt GOPATH 5 years ago
endpoint_test.go Add copyright headers 5 years ago
helper_test.go Fix tests 5 years ago
indextable.go Add copyright headers 5 years ago
ip.go Add copyright headers 5 years ago
kdf_test.go Add copyright headers 5 years ago
keypair.go Catch EINTR 5 years ago
logger.go Add copyright headers 5 years ago
main.go Print version number in log 5 years ago
misc.go Move replay into subpackage 5 years ago
noise-helpers.go Add copyright headers 5 years ago
noise-protocol.go Catch EINTR 5 years ago
noise-types.go Add copyright headers 5 years ago
noise_test.go Properly close DummyTUN to avoid deadlock in TestNoiseHandshake 5 years ago
peer.go Disappointing anti-sticky experiment 5 years ago
receive.go Disappointing anti-sticky experiment 5 years ago
send.go Make successful tests silent 5 years ago
timers.go Fix typo in timers 5 years ago
tun.go Adopt GOPATH 5 years ago
uapi.go Straighten out UAPI logging 5 years ago
uapi_bsd.go Infoleak ifnames and be more permissive 5 years ago
uapi_linux.go Catch EINTR 5 years ago
version.go version: bump snapshot 5 years ago

README.md

Go Implementation of WireGuard

This is an implementation of WireGuard in Go.

WARNING: This is a work in progress and not ready for prime time, with no official "releases" yet. It is extremely rough around the edges and leaves much to be desired. There are bugs and we are not yet in a position to make claims about its security. Beware.

Usage

Most Linux kernel WireGuard users are used to adding an interface with ip link add wg0 type wireguard. With wireguard-go, instead simply run:

$ wireguard-go wg0

This will create an interface and fork into the background. To remove the interface, use the usual ip link del wg0, or if your system does not support removing interfaces directly, you may instead remove the control socket via rm -f /var/run/wireguard/wg0.sock, which will result in wireguard-go shutting down.

To run wireguard-go without forking to the background, pass -f or --foreground:

$ wireguard-go -f wg0

When an interface is running, you may use wg(8) to configure it, as well as the usual ip(8) and ifconfig(8) commands.

To run with more logging you may set the environment variable LOG_LEVEL=debug.

Platforms

Linux

This will run on Linux; however YOU SHOULD NOT RUN THIS ON LINUX. Instead use the kernel module; see the installation page for instructions.

macOS

This runs on macOS using the utun driver. It does not yet support sticky sockets, and won't support fwmarks because of Darwin limitations. Since the utun driver cannot have arbitrary interface names, you must either use utun[0-9]+ for an explicit interface name or utun to have the kernel select one for you. If you choose utun as the interface name, and the environment variable WG_TUN_NAME_FILE is defined, then the actual name of the interface chosen by the kernel is written to the file specified by that variable.

Windows

It is currently a work in progress to strip out the beginnings of an experiment done with the OpenVPN tuntap driver and instead port to the new UWP APIs for tunnels. In other words, this does not yet work on Windows.

FreeBSD

This will run on FreeBSD. It does not yet support sticky sockets. Fwmark is mapped to SO_USER_COOKIE.

OpenBSD

This will run on OpenBSD. It does not yet support sticky sockets. Fwmark is mapped to SO_RTABLE. Since the tun driver cannot have arbitrary interface names, you must either use tun[0-9]+ for an explicit interface name or tun to have the program select one for you. If you choose tun as the interface name, and the environment variable WG_TUN_NAME_FILE is defined, then the actual name of the interface chosen by the kernel is written to the file specified by that variable.

Building

This requires an installation of go and of dep. If dep is not installed, it will be downloaded and built as part of the build process.

$ git clone https://git.zx2c4.com/wireguard-go
$ cd wireguard-go
$ make

License

This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License version 2 as
published by the Free Software Foundation.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License along
with this program; if not, write to the Free Software Foundation, Inc.,
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.

---------------------------------------------------------------------------
Additional Permissions For Submission to Apple App Store: Provided that you
are otherwise in compliance with the GPLv2 for each covered work you convey
(including without limitation making the Corresponding Source available in
compliance with Section 3 of the GPLv2), you are granted the additional
permission to convey through the Apple App Store non-source executable
versions of the Program as incorporated into each applicable covered work
as Executable Versions only under the Mozilla Public License version 2.0
(https://www.mozilla.org/en-US/MPL/2.0/).