[HN Gopher] Wg-access-server: WireGuard VPN server and web UI fo... ___________________________________________________________________ Wg-access-server: WireGuard VPN server and web UI for device management Author : Zdh4DYsGvdjJ Score : 100 points Date : 2022-01-23 16:27 UTC (6 hours ago) (HTM) web link (github.com) (TXT) w3m dump (github.com) | weejewel wrote: | Also check out wg-easy: https://github.com/weejewel/wg-easy. | | Much more beautiful imo. | daemoens wrote: | Shout-out to PiVPN. It doesn't have a web ui but it's incredibly | quick to setup and any commands are extremely basic. Took me less | than 5m to setup and haven't had to touch it in almost a year. | gravypod wrote: | This would be great if it automatically generated | `<device>.<user>.search.domain.vpn` DNS names for all of the | devices. | easton wrote: | This is a thing in Netmaker, another WireGuard server that is | being built by a YC startup: | https://github.com/gravitl/netmaker | encryptluks2 wrote: | Something like this would be amazing. | TheGoliath wrote: | You can create a new issue with the feature request. | Alternatively PRs are always welcome :P | wpietri wrote: | Well this is not the kind of thing I want to see in a tool I'm | using to secure my networks: | | > This is a fork of the original work of place1. Since the | upstream is currently poorly maintained, we try to add new | features and keep the project up to date and in a working state. | Zdh4DYsGvdjJ wrote: | Also see: https://github.com/freifunkMUC/wg-access- | server/blob/master/... | rythmshifter03 wrote: | I'd love to know how to deploy this with WireHole | nvr219 wrote: | I decided to just use adguard dns for my wireguard and it's | Good Enough for my needs. | teddyh wrote: | Note: This is _not_ about WireGuard itself, but about wg-access- | server, which "is a single binary file that contains a WireGuard | VPN server and a web user interface for device management." | tehbeard wrote: | Also of note is that this is a fork of wg-access-server from | the looks of it. | Zdh4DYsGvdjJ wrote: | Yes, it's a fork as the original project is dead for a year | already. | TheGoliath wrote: | We used the Upstream project for a while, but we were | missing some features like IPv6, so we started this fork | and added them ourselves, hoping it would be useful for a | few others as well. | ape4 wrote: | WireGuard itself has supported IPv6 since the start | dang wrote: | Ok, title changed to that from "WireGuard Access server now | supports IPv6". Thanks! | paulkon wrote: | What is the recommend wireguard mesh solution where peers can | easily join and leave and shortest connection paths are | automatically determined? | | I want to setup a way to access my mobile home office subnet | (behind cellular which doesn't allow incoming) and two other | subnets sites and some mobile devices which come and go. | klysm wrote: | I don't think wireguard will do that shortest path routing for | you. Look into babel routing protocol and friends. | Youden wrote: | WireGuard on its own doesn't do that. WireGuard only sets up | tunnels between peers. If you want something like you describe, | you need another product that integrates WireGuard. | | It's a bit boring but in a situation like yours the most | straightforward way would be to set up WireGuard gateways at | each of your sites and have them talk to each other and the | mobile devices. | lima wrote: | Tailscale works perfectly for this. | | There's a third party open source server, too: | https://github.com/juanfont/headscale | | (I just use the free hosted backend, obviously you trust them | to do the key exchange) | xoa wrote: | Have you taken a look at Nebula [0]? Might fit your needs. It | also uses the Noise Protocol Framework but adds the bells and | whistles on top needed to synthesize an overlay network like | you want. MIT licensed too fwiw, full self hosting. Worth a | look at any rate, WireGuard is much lower level though I'm sure | it could be built upon for the same purpose. | | ---- | | 0: https://github.com/slackhq/nebula ___________________________________________________________________ (page generated 2022-01-23 23:00 UTC)