[HN Gopher] Wg-access-server: WireGuard VPN server and web UI fo...
       ___________________________________________________________________
        
       Wg-access-server: WireGuard VPN server and web UI for device
       management
        
       Author : Zdh4DYsGvdjJ
       Score  : 100 points
       Date   : 2022-01-23 16:27 UTC (6 hours ago)
        
 (HTM) web link (github.com)
 (TXT) w3m dump (github.com)
        
       | weejewel wrote:
       | Also check out wg-easy: https://github.com/weejewel/wg-easy.
       | 
       | Much more beautiful imo.
        
       | daemoens wrote:
       | Shout-out to PiVPN. It doesn't have a web ui but it's incredibly
       | quick to setup and any commands are extremely basic. Took me less
       | than 5m to setup and haven't had to touch it in almost a year.
        
       | gravypod wrote:
       | This would be great if it automatically generated
       | `<device>.<user>.search.domain.vpn` DNS names for all of the
       | devices.
        
         | easton wrote:
         | This is a thing in Netmaker, another WireGuard server that is
         | being built by a YC startup:
         | https://github.com/gravitl/netmaker
        
         | encryptluks2 wrote:
         | Something like this would be amazing.
        
         | TheGoliath wrote:
         | You can create a new issue with the feature request.
         | Alternatively PRs are always welcome :P
        
       | wpietri wrote:
       | Well this is not the kind of thing I want to see in a tool I'm
       | using to secure my networks:
       | 
       | > This is a fork of the original work of place1. Since the
       | upstream is currently poorly maintained, we try to add new
       | features and keep the project up to date and in a working state.
        
       | Zdh4DYsGvdjJ wrote:
       | Also see: https://github.com/freifunkMUC/wg-access-
       | server/blob/master/...
        
       | rythmshifter03 wrote:
       | I'd love to know how to deploy this with WireHole
        
         | nvr219 wrote:
         | I decided to just use adguard dns for my wireguard and it's
         | Good Enough for my needs.
        
       | teddyh wrote:
       | Note: This is _not_ about WireGuard itself, but about wg-access-
       | server, which "is a single binary file that contains a WireGuard
       | VPN server and a web user interface for device management."
        
         | tehbeard wrote:
         | Also of note is that this is a fork of wg-access-server from
         | the looks of it.
        
           | Zdh4DYsGvdjJ wrote:
           | Yes, it's a fork as the original project is dead for a year
           | already.
        
             | TheGoliath wrote:
             | We used the Upstream project for a while, but we were
             | missing some features like IPv6, so we started this fork
             | and added them ourselves, hoping it would be useful for a
             | few others as well.
        
         | ape4 wrote:
         | WireGuard itself has supported IPv6 since the start
        
         | dang wrote:
         | Ok, title changed to that from "WireGuard Access server now
         | supports IPv6". Thanks!
        
       | paulkon wrote:
       | What is the recommend wireguard mesh solution where peers can
       | easily join and leave and shortest connection paths are
       | automatically determined?
       | 
       | I want to setup a way to access my mobile home office subnet
       | (behind cellular which doesn't allow incoming) and two other
       | subnets sites and some mobile devices which come and go.
        
         | klysm wrote:
         | I don't think wireguard will do that shortest path routing for
         | you. Look into babel routing protocol and friends.
        
         | Youden wrote:
         | WireGuard on its own doesn't do that. WireGuard only sets up
         | tunnels between peers. If you want something like you describe,
         | you need another product that integrates WireGuard.
         | 
         | It's a bit boring but in a situation like yours the most
         | straightforward way would be to set up WireGuard gateways at
         | each of your sites and have them talk to each other and the
         | mobile devices.
        
         | lima wrote:
         | Tailscale works perfectly for this.
         | 
         | There's a third party open source server, too:
         | https://github.com/juanfont/headscale
         | 
         | (I just use the free hosted backend, obviously you trust them
         | to do the key exchange)
        
         | xoa wrote:
         | Have you taken a look at Nebula [0]? Might fit your needs. It
         | also uses the Noise Protocol Framework but adds the bells and
         | whistles on top needed to synthesize an overlay network like
         | you want. MIT licensed too fwiw, full self hosting. Worth a
         | look at any rate, WireGuard is much lower level though I'm sure
         | it could be built upon for the same purpose.
         | 
         | ----
         | 
         | 0: https://github.com/slackhq/nebula
        
       ___________________________________________________________________
       (page generated 2022-01-23 23:00 UTC)