wireguard-tools with wg-quick support for NetBSD
Go to file
Jason A. Donenfeld d9f06cbced wg.8: AllowedIPs isn't actually required
An empty allowed IPs is totally valid, for folks wishing to move IP
addresses between multiple peers atomically.

Suggested-by: Comex <comexk@gmail.com>
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2018-10-19 03:35:25 +02:00
contrib wg: don't fail if a netlink interface dump is inconsistent 2018-10-13 01:55:31 +02:00
src wg.8: AllowedIPs isn't actually required 2018-10-19 03:35:25 +02:00
.gitignore contrib: add extract-handshakes kprobe example 2018-03-04 18:50:25 +01:00
COPYING Initial commit 2016-06-25 16:48:39 +02:00
README.md global: wireguard.io --> wireguard.com 2017-07-20 03:37:39 +02:00

WireGuard — fast, modern, secure kernel VPN tunnel

by Jason A. Donenfeld of Edge Security

WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.

More information may be found at WireGuard.com.

License

This project is released under the GPLv2.