Wireguard VPN

From Kicksecure
Revision as of 13:26, 20 October 2024 by Patrick (talk | contribs) (→‎Installation)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

todo

Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

Installation[edit]

Note: In Kicksecure 13 and above (Debian trixie based), likely iptables will be no longer required.

Install package(s) wireguard wireguard-tools iptables resolvconf following these instructions

1 Platform specific notice.

2 Update the package lists and upgrade the systemOnion network Logo.

Click = Copy Copied to clipboard! sudo apt update && sudo apt full-upgrade

3 Install the wireguard wireguard-tools iptables resolvconf package(s).

Using apt command line --no-install-recommends optionOnion network Logo is in most cases optional.

Click = Copy Copied to clipboard! sudo apt install --no-install-recommends wireguard wireguard-tools iptables resolvconf

4 Platform specific notice.

  • Kicksecure: No special notice.
  • Kicksecure-Qubes: Shut down Template and restart App Qubes based on it as per Qubes Template ModificationOnion network Logo.

5 Done.

The procedure of installing package(s) wireguard wireguard-tools iptables resolvconf is complete.

Configuration[edit]

Open file /etc/wireguard/wg0.conf in an editor with root rights.

Kicksecure

See Open File with Root RightsOnion network Logo for detailed instructions on why to use sudoedit for better security and how to use it.

Note: Mousepad (or the chosen text editor) must be closed before running the sudoedit command.

Click = Copy Copied to clipboard! sudoedit /etc/wireguard/wg0.conf

Kicksecure for Qubes

NOTES:

Click = Copy Copied to clipboard! sudoedit /etc/wireguard/wg0.conf

  • After applying this change, shutdown the Template.
  • All App Qubes based on the Template need to be restarted if they were already running.
  • This is a general procedure required for Qubes and unspecific to Kicksecure for Qubes.

Others and Alternatives

  • This is just an example. Other tools could achieve the same goal.
  • If this example does not work for you or if you are not using Kicksecure, please refer to this link.

Click = Copy Copied to clipboard! sudoedit /etc/wireguard/wg0.conf

Paste.

Note: Adjust.

Click = Copy Copied to clipboard! [Interface] PrivateKey = Address = DNS = DNS = [Peer] PublicKey = PresharedKey = AllowedIPs = Endpoint = PersistentKeepalive = 25

Start[edit]

open vpn

Click = Copy Copied to clipboard! sudo wg-quick up wg0

Stop[edit]

close vpn

Click = Copy Copied to clipboard! sudo wg-quick down wg0

Autostart[edit]

Click = Copy Copied to clipboard! sudo systemctl enable wg-quick@wg0

Notification image

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!