by paulkon on 1/23/2022, 9:48:13 PM
by weejewel on 1/23/2022, 10:59:34 PM
Also check out wg-easy: https://github.com/weejewel/wg-easy.
Much more beautiful imo.
by gravypod on 1/23/2022, 8:09:09 PM
This would be great if it automatically generated `<device>.<user>.search.domain.vpn` DNS names for all of the devices.
by wpietri on 1/23/2022, 10:35:28 PM
Well this is not the kind of thing I want to see in a tool I'm using to secure my networks:
> This is a fork of the original work of place1. Since the upstream is currently poorly maintained, we try to add new features and keep the project up to date and in a working state.
by KennyBlanken on 1/24/2022, 2:46:49 AM
Looks very neat. What's userland wireguard performance like? I can't seem to find much talking about this, just that it's "slower". My guess is that it's probably not an issue for a 5-10Mbit-upstream home connection?
by daemoens on 1/23/2022, 9:39:10 PM
Shout-out to PiVPN. It doesn't have a web ui but it's incredibly quick to setup and any commands are extremely basic. Took me less than 5m to setup and haven't had to touch it in almost a year.
by Zdh4DYsGvdjJ on 1/23/2022, 8:43:08 PM
by rythmshifter03 on 1/23/2022, 9:47:31 PM
I’d love to know how to deploy this with WireHole
by dynamohk on 1/24/2022, 2:32:35 AM
I find tailscale simple and setup exit node easy
by teddyh on 1/23/2022, 6:44:50 PM
Note: This is not about WireGuard itself, but about wg-access-server, which “is a single binary file that contains a WireGuard VPN server and a web user interface for device management.”
What is the recommend wireguard mesh solution where peers can easily join and leave and shortest connection paths are automatically determined?
I want to setup a way to access my mobile home office subnet (behind cellular which doesn't allow incoming) and two other subnets sites and some mobile devices which come and go.