[HN Gopher] Wg-access-server: WireGuard VPN server and web UI fo...
___________________________________________________________________
Wg-access-server: WireGuard VPN server and web UI for device
management
Author : Zdh4DYsGvdjJ
Score : 100 points
Date : 2022-01-23 16:27 UTC (6 hours ago)
(HTM) web link (github.com)
(TXT) w3m dump (github.com)
| weejewel wrote:
| Also check out wg-easy: https://github.com/weejewel/wg-easy.
|
| Much more beautiful imo.
| daemoens wrote:
| Shout-out to PiVPN. It doesn't have a web ui but it's incredibly
| quick to setup and any commands are extremely basic. Took me less
| than 5m to setup and haven't had to touch it in almost a year.
| gravypod wrote:
| This would be great if it automatically generated
| `<device>.<user>.search.domain.vpn` DNS names for all of the
| devices.
| easton wrote:
| This is a thing in Netmaker, another WireGuard server that is
| being built by a YC startup:
| https://github.com/gravitl/netmaker
| encryptluks2 wrote:
| Something like this would be amazing.
| TheGoliath wrote:
| You can create a new issue with the feature request.
| Alternatively PRs are always welcome :P
| wpietri wrote:
| Well this is not the kind of thing I want to see in a tool I'm
| using to secure my networks:
|
| > This is a fork of the original work of place1. Since the
| upstream is currently poorly maintained, we try to add new
| features and keep the project up to date and in a working state.
| Zdh4DYsGvdjJ wrote:
| Also see: https://github.com/freifunkMUC/wg-access-
| server/blob/master/...
| rythmshifter03 wrote:
| I'd love to know how to deploy this with WireHole
| nvr219 wrote:
| I decided to just use adguard dns for my wireguard and it's
| Good Enough for my needs.
| teddyh wrote:
| Note: This is _not_ about WireGuard itself, but about wg-access-
| server, which "is a single binary file that contains a WireGuard
| VPN server and a web user interface for device management."
| tehbeard wrote:
| Also of note is that this is a fork of wg-access-server from
| the looks of it.
| Zdh4DYsGvdjJ wrote:
| Yes, it's a fork as the original project is dead for a year
| already.
| TheGoliath wrote:
| We used the Upstream project for a while, but we were
| missing some features like IPv6, so we started this fork
| and added them ourselves, hoping it would be useful for a
| few others as well.
| ape4 wrote:
| WireGuard itself has supported IPv6 since the start
| dang wrote:
| Ok, title changed to that from "WireGuard Access server now
| supports IPv6". Thanks!
| paulkon wrote:
| What is the recommend wireguard mesh solution where peers can
| easily join and leave and shortest connection paths are
| automatically determined?
|
| I want to setup a way to access my mobile home office subnet
| (behind cellular which doesn't allow incoming) and two other
| subnets sites and some mobile devices which come and go.
| klysm wrote:
| I don't think wireguard will do that shortest path routing for
| you. Look into babel routing protocol and friends.
| Youden wrote:
| WireGuard on its own doesn't do that. WireGuard only sets up
| tunnels between peers. If you want something like you describe,
| you need another product that integrates WireGuard.
|
| It's a bit boring but in a situation like yours the most
| straightforward way would be to set up WireGuard gateways at
| each of your sites and have them talk to each other and the
| mobile devices.
| lima wrote:
| Tailscale works perfectly for this.
|
| There's a third party open source server, too:
| https://github.com/juanfont/headscale
|
| (I just use the free hosted backend, obviously you trust them
| to do the key exchange)
| xoa wrote:
| Have you taken a look at Nebula [0]? Might fit your needs. It
| also uses the Noise Protocol Framework but adds the bells and
| whistles on top needed to synthesize an overlay network like
| you want. MIT licensed too fwiw, full self hosting. Worth a
| look at any rate, WireGuard is much lower level though I'm sure
| it could be built upon for the same purpose.
|
| ----
|
| 0: https://github.com/slackhq/nebula
___________________________________________________________________
(page generated 2022-01-23 23:00 UTC)