• by paulkon on 1/23/2022, 9:48:13 PM

    What is the recommend wireguard mesh solution where peers can easily join and leave and shortest connection paths are automatically determined?

    I want to setup a way to access my mobile home office subnet (behind cellular which doesn't allow incoming) and two other subnets sites and some mobile devices which come and go.

  • by weejewel on 1/23/2022, 10:59:34 PM

    Also check out wg-easy: https://github.com/weejewel/wg-easy.

    Much more beautiful imo.

  • by gravypod on 1/23/2022, 8:09:09 PM

    This would be great if it automatically generated `<device>.<user>.search.domain.vpn` DNS names for all of the devices.

  • by wpietri on 1/23/2022, 10:35:28 PM

    Well this is not the kind of thing I want to see in a tool I'm using to secure my networks:

    > This is a fork of the original work of place1. Since the upstream is currently poorly maintained, we try to add new features and keep the project up to date and in a working state.

  • by KennyBlanken on 1/24/2022, 2:46:49 AM

    Looks very neat. What's userland wireguard performance like? I can't seem to find much talking about this, just that it's "slower". My guess is that it's probably not an issue for a 5-10Mbit-upstream home connection?

  • by daemoens on 1/23/2022, 9:39:10 PM

    Shout-out to PiVPN. It doesn't have a web ui but it's incredibly quick to setup and any commands are extremely basic. Took me less than 5m to setup and haven't had to touch it in almost a year.

  • by rythmshifter03 on 1/23/2022, 9:47:31 PM

    I’d love to know how to deploy this with WireHole

  • by dynamohk on 1/24/2022, 2:32:35 AM

    I find tailscale simple and setup exit node easy

  • by teddyh on 1/23/2022, 6:44:50 PM

    Note: This is not about WireGuard itself, but about wg-access-server, which “is a single binary file that contains a WireGuard VPN server and a web user interface for device management.”