Download Wireguard Debian

1 view
Skip to first unread message

Theola Dolgas

unread,
Jul 22, 2024, 9:19:49 AM7/22/24
to Dragonfly

note, cannot install resolvconf inside lxd/lxc container because it breaks oth er things. commenting out the DNS entry in the wireguard and the sybmolic link mentioned above seems to work in lxc containers.

I have a "working" wireguard site-to-site config (thank you to the users/community for the tips in this post).
Every now and then, the connections bounce/drop etc, which causes WG to misbehave.
I can check this via CLI using
wg grep latest
and then check if the latest handshake is > say X(=2) mins. If that is the case, I normally just restart just the WireGuard interface via LUCI - and everything comes up again.
I would like to do this via CLI only though - but I can't find the right command. I am assuming that if there's a clickable, then there's a command (CLI) equivalent? or do I need to restart the LAN interface (I guess it's possible that the GUI click does this, but it's not 100% clear to me)?
Any pointers appreciated.
Thanks

download wireguard debian


Download » https://urluss.com/2zDDLr



I guess the difference is that when you do teardown/setup with netifd, the local listen port of wireguard interface change. From observers' point of view, it's new udp session. With ip link set down/up, the session is the same.

Wireguard is available in latest debian distributions for testing/unstable (this page in wiki has good explanation debian wiki - wireguard page. Probably the freedombox version you are running is based on an older/stable debian version. That means that the issue of wireguard package being unavailable is irrelevant with the hardware!

You can find for example images without preinstalled graphical interface here:
-ee.net/rootfs/debian-armhf/
The images for the x15 are named like this: am57xx-debian-11.1-iot-armhf-2021-12-15-4gb.img.xz

You may want to refer to the following packages that are part of the same source:wireguard-tools.You might like to refer to the wireguard package page, to the Package Tracking System, or to the source package src:wireguard's bug page.

Does anyone know how to get WireGuard running on an odroid xu4 with armbian debian bookworm? I have tried installing the generic kernel headers in armbian-config but it is not good enough. I believe that I need "linux-headers-5.4.243-odroidxu4" but it is unavailable in the preinstalled repositories.

You find my WireGuard Ansible role at frjo/ansible-roles. This will set up WireGuard as a VPN server allowing clients to connect and access the internet. I got a lot of help from iamckn/wireguard_ansible when I created my role.

You just paste the wireguard config for mullvad or whatever VPN and reboot. I think what you are looking for is something nice and fancy like this solution on Gitlab for Qubes called QOSVPN. I have never tested it.

For instance, if you are connected to se1-wireguard.mullvad.net on the ProxyVM and then want to exit via us177-wireguard.mullvad.net on Qube1, how would you configure Qube1 to use us177-wg.socks5.mullvad.net on port 1080 as your exit node?

This is a limitation of nm-applet lacking ability to add multiple wireguard servers/IPs in one configuration at once; (not the case with OpenVPN). They could easily allow this by enabling you to add multiple IPs with the other parameters the same - as for most VPN providers the keys and IP config provided are the same for each server.

In a qube that you want to use with the VPN, say the Untrusted qube, in Settings >> Basic, change the Net qube to sys-vpn-mullvad
Start a terminal in the Untrusted (or other) qube
Try ping google.com. If you end up with a name resolution error, then, following @cobordism:
In the AppVM, sys-vpn-mullvad, start a terminal
Run sudo /usr/lib/qubes/qubes-setup-dnat-to-ns
If name resolution now works in the Untrusted qube, then use the approach of @tngbng:
Start a terminal in the Mullvad TemplateVM, debian-11-mullvad
In the file /etc/NetworkManager/dispatcher.d/qubes-nmhook, insert the command sleep 5 before:
sudo /usr/lib/qubes/qubes-setup-dnat-to-ns
Restarting the AppVM and then the Untrusted qube, name resolution should work.

Loading new wireguard-0.0.20190406 DKMS files...
Building for 4.15.18-9-pve
Module build for kernel 4.15.18-9-pve was skipped since the
kernel headers for this kernel does not seem to be installed.
Setting up linux-headers-4.9.0-8-amd64 (4.9.144-3.1) ...

This guide will assume you use a new server which is not in use for anything else. I use Debian in this guide and include instructions on upgrading toDebian testing, but it should work on a recent Ubuntu as well. At the time of writing the wireguard package is available only in Ubuntu 19.10 and up (includingthe upcoming 20.04 LTS.) On Debian the current stable (10/buster) also doesnot contain wireguard, but testing and unstable do have it.

The guide first lets you install Freedombox, after that update the entire distro totesting and finaly install wireguard. This order makes sure that Freedombox is correctly installed and working before we go into uncharted areas (debian testing).

The installation of Freedombox is very easy because all the software is in the debian repositories. I do assume you use a new, clean server for this since Freedombox makes many changes to your system including network, firewall and user management.

The current debian 10 version does not have the wireguard package. It is in debian testing and in unstable. For this guide I'll assume you want to experimenta bit thus we will upgrade a 'normal' debian 10 instance to debian testing.

I do not recommend doing this to an existing system. Create a [new VPS][99] over at Digital Ocean (referal link) to test this. I do only have positiveexperiences with running Debian testing, but generally I know what I'm doingwith unstable linux systems. If you need a stable system, wait until wireguardis in Debian.

Save and enable the connection. You should see an extra item Transfer in the listwhich shows the amount of traffic via the VPN. If both rx and tx go up, the VPN works. If only tx goes up, check if you rebooted your server after installingwireguard. The kernel module might not be loaded and the network interface wg0might not be there.

Go to to the Wireguard config cd /etc/wireguard and then run the following command to generate the public and private keys for the server.
umask 077; wg genkey tee privatekey wg pubkey > publickey

Have been using wireguard for a while now with pia and pivpn and have only ever had good experiences with it, lower cpu usage on my pi and increased battery life on my devices. The only problem i have had is with pia and it not connecting at my school even when openvpn does but that is the only problem i have ever had with it do far.

I did all my testing with newer kernel versions and It appears that you are using the older kernel 5.4.0 and wireguard was added to to 5.6.x. I think you can load wireguard-dkms and that should allow it to work in the your older version.

I am aware of numerous other tutorials on installing/configuring wireguard on Debian and, as far as I can determine, the old saying 'There is more than one way to skin a cat' regrettably applies; mental confusion is inevitable, oh well. (I frankly was hoping one of the Q4OS experts went through the wireguard installation process already and would pass-on their experiences (pitfalls) and/or specific set-up instructions).

Wireguard has a MTU (maximum transmission unit / IP packet size) of 1420 by default
Docker bridge networks have a MTU of 1500
So the docker packets are too large to fit into the wireguard network and are discarded

I tried setting up a VPN using wireguard on a debian server and two arch linux and one android clients. On the android client using the official wireguard app everything works fine (HTTPS aswell), however when I attempt to curl a url using https or open it in a browser on the arch linux clients it just loads forever. Meanwhile accessing a url using plain HTTP works fine. Pinging websites etc. works aswell. When curling icanhazip.com I saw that my traffic is indeed going through the server as intended

760c119bf3
Reply all
Reply to author
Forward
0 new messages