Wireguard

From Kicksecure
Revision as of 13:22, 20 October 2024 by Patrick (talk | contribs) (Created page with "{{stub}} open vpn {{CodeSelect|code= sudo wg-quick up wg0 }} close vpn {{CodeSelect|code= sudo wg-quick down wg0 }} {{CodeSelect|code= sudo systemctl enable wg-quick@wg0 }} {{Install Pacakge|package= wireguard wireguard-tools iptables resolvconf }} {{Open with root rights|filename= /etc/wireguard/wg0.conf }} Paste. Note: Adjust. {{CodeSelect|code= [Interface] PrivateKey = Address = DNS = DNS = [Peer] PublicKey = PresharedKey = AllowedIPs = Endpoint = P...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

open vpn

Click = Copy Copied to clipboard! sudo wg-quick up wg0

close vpn

Click = Copy Copied to clipboard! sudo wg-quick down wg0

Click = Copy Copied to clipboard! sudo systemctl enable wg-quick@wg0

Template:Install Pacakge

Open file /etc/wireguard/wg0.conf in an editor with root rights.

Kicksecure

See Open File with Root RightsOnion network Logo for detailed instructions on why to use sudoedit for better security and how to use it.

Note: Mousepad (or the chosen text editor) must be closed before running the sudoedit command.

Click = Copy Copied to clipboard! sudoedit /etc/wireguard/wg0.conf

Kicksecure for Qubes

NOTES:

Click = Copy Copied to clipboard! sudoedit /etc/wireguard/wg0.conf

  • After applying this change, shutdown the Template.
  • All App Qubes based on the Template need to be restarted if they were already running.
  • This is a general procedure required for Qubes and unspecific to Kicksecure for Qubes.

Others and Alternatives

  • This is just an example. Other tools could achieve the same goal.
  • If this example does not work for you or if you are not using Kicksecure, please refer to this link.

Click = Copy Copied to clipboard! sudoedit /etc/wireguard/wg0.conf

Paste.

Note: Adjust.

Click = Copy Copied to clipboard! [Interface] PrivateKey = Address = DNS = DNS = [Peer] PublicKey = PresharedKey = AllowedIPs = Endpoint = PersistentKeepalive = 25