This repository has been archived on 2024-01-23. You can view files and clone it, but cannot push or open issues or pull requests.
Go to file
Jason A. Donenfeld 3f7a31faea wg-quick: freebsd: allow loopback to work
FreeBSD adds a route for point-to-point destination addresses. We don't
really want to specify any destination address, but unfortunately we
have to. Before we tried to cheat by giving our own address as the
destination, but this had the unfortunate effect of preventing
loopback from working on our local ip address. We work around this with
yet another kludge: we set the destination address to 127.0.0.1. Since
127.0.0.1 is already assigned to an interface, this has the same effect
of not specifying a destination address, and therefore we accomplish the
intended behavior.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2019-01-24 03:28:54 +01:00
contrib netlink: use __kernel_timespec for handshake time 2019-01-23 14:29:44 +01:00
src wg-quick: freebsd: allow loopback to work 2019-01-24 03:28:54 +01:00
.gitignore contrib: add extract-handshakes kprobe example 2018-03-04 18:50:25 +01:00
COPYING Initial commit 2016-06-25 16:48:39 +02:00
README.md Kconfig: IPsec isn't IPSec 2019-01-23 14:29:44 +01:00

README.md

WireGuard — fast, modern, secure kernel VPN tunnel

by Jason A. Donenfeld of Edge Security

WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.

More information may be found at WireGuard.com.

License

This project is released under the GPLv2.