This repository has been archived on 2024-01-23. You can view files and clone it, but cannot push or open issues or pull requests.
Go to file
Jason A. Donenfeld 6262906e5c wg-quick: linux: use already configured addresses instead of in-memory
The ADDRESSES array might not have addresses added during PreUp. But
moreover, nft(8) and iptables(8) don't like ip addresses in the form
somev6prefix::someipv4suffix, such as fd00::1.2.3.4, while ip(8) can
handle it. So by adding these first and then asking for them back, we
always get normalized addresses suitable for nft(8) and iptables(8).

Reported-by: Silvan Nagl <mail@53c70r.de>
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2019-12-17 14:18:09 +01:00
contrib global: fix up spelling 2019-12-12 12:24:05 +01:00
src wg-quick: linux: use already configured addresses instead of in-memory 2019-12-17 14:18:09 +01:00
.gitignore contrib: add extract-handshakes kprobe example 2018-03-04 18:50:25 +01:00
COPYING Initial commit 2016-06-25 16:48:39 +02:00
README.md Kconfig: IPsec isn't IPSec 2019-01-23 14:29:44 +01:00

README.md

WireGuard — fast, modern, secure kernel VPN tunnel

by Jason A. Donenfeld of Edge Security

WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.

More information may be found at WireGuard.com.

License

This project is released under the GPLv2.