Configure WireGuard on Qubes

140 views
Skip to first unread message

ale...@magenta.de

unread,
Jul 29, 2023, 6:11:58 PM7/29/23
to qubes...@googlegroups.com
I couldn't find a usable description of how to set up the most secure
WireGuard configuration on Qubes. I am aiming to create a flexible
network arrangement with chosen VMs going through WireGuard only and
others through Tor only.

I have tried the information at
https://github.com/tasket/Qubes-vpn-support but found it is out of date
and written before WireGuard was added to the kernel. I also thought it
was not written for a beginner to understand and adapt to their needs.

I have also tried the information at https://github.com/Qubes-Community/
but again it is not written well for a beginner.

Implementing WireGuard for secure network access is necessary before I
can connect this installation to the Internet so I hope someone can help
me to set this up.

klem klen

unread,
Jul 30, 2023, 7:41:12 AM7/30/23
to qubes-users

klem klen

unread,
Jul 30, 2023, 7:41:21 AM7/30/23
to qubes-users
I should have added.  We are on a similar path.   I am looking to use the gui app for Mullvad instead.  The app provides access to all the Mullvad Servers/Nodes all around the world.  Has Bridges.  Makes it easy to delete connections, I am allowed five, but use multiple computers and end up starting more than five.   

Can not get it to install on sys-vpn, yet. 

There is a post about using Mullvad VPN gui app in a single App Qube, that is not persistent.  Which is a problem with other third party software., persistent, in my humble opinion, also means, it needs a ready to open Tab. 


On Saturday, July 29, 2023 at 5:11:58 PM UTC-5 ale...@magenta.de wrote:

RSS

unread,
Jul 31, 2023, 5:06:29 AM7/31/23
to qubes...@googlegroups.com
I used

https://privsec.dev/posts/qubes/using-mullvad-vpn-on-qubes-os/

to setup a dedicated VPN VM with the Mullvad GUI. Has some
idiosyncrasies, but works really not bad. Been using it for a couple
weeks already as a daily drive.
> --
> You received this message because you are subscribed to the Google
> Groups "qubes-users" group. To unsubscribe from this group and stop
> receiving emails from it, send an email to
> qubes-users...@googlegroups.com. To view this discussion on
> the web visit
> https://groups.google.com/d/msgid/qubes-users/a90392bf-d63b-4e60-9ad1-7305bfc97493n%40googlegroups.com.

ale...@magenta.de

unread,
Aug 12, 2023, 12:54:15 PM8/12/23
to qubes...@googlegroups.com
RSS:
> I used
>
> https://privsec.dev/posts/qubes/using-mullvad-vpn-on-qubes-os/
>
> to setup a dedicated VPN VM with the Mullvad GUI. Has some
> idiosyncrasies, but works really not bad. Been using it for a couple
> weeks already as a daily drive.

Thanks, I will look at this link and see if it works for my setup.

On Sun, 30 Jul 2023 01:30:52 -0700 (PDT)
klem klen <klem...@gmail.com> wrote:
>
>> I should have added. We are on a similar path. I am looking to use
>> the gui app for Mullvad instead. The app provides access to all the
>> Mullvad Servers/Nodes all around the world. Has Bridges. Makes it
>> easy to delete connections, I am allowed five, but use multiple
>> computers and end up starting more than five.
>>

Yes the five connection limitation is the only problem I have with
Mullvad service. If we each make a request to Mullvad Support possibly
they will look at a different way of preventing account sharing that is
more flexible for user needs.

> https://forum.qubes-os.org/t/wireguard-vpn-setup/19141

Thanks for the link, I will see if works well for me. Let me know if you
find any solutions or improvements to this setup.
Reply all
Reply to author
Forward
0 new messages