This repository has been archived on 2024-01-23. You can view files and clone it, but cannot push or open issues or pull requests.
Go to file
Jason A. Donenfeld 65db14706b wg: don't insist on having a private key
This lets us do flexible things from wg-quick such as:

PostUp = wg set %i private-key <(pass WireGuard/private-keys/%i)

It also was never a very sensible policy to enforce.

Suggested-by: Luis Ressel <aranea@aixah.de>
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2017-10-17 19:26:07 +02:00
contrib contrib: remove worthless build artifact 2017-10-02 16:32:20 +02:00
src wg: don't insist on having a private key 2017-10-17 19:26:07 +02:00
.gitignore gitignore: ignore split DWARF debug info 2017-07-03 23:06:27 +02:00
COPYING Initial commit 2016-06-25 16:48:39 +02:00
README.md global: wireguard.io --> wireguard.com 2017-07-20 03:37:39 +02:00

README.md

WireGuard — fast, modern, secure kernel VPN tunnel

by Jason A. Donenfeld of Edge Security

WireGuard is a novel VPN that runs inside the Linux Kernel and utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. It runs over UDP.

More information may be found at WireGuard.com.

License

This project is released under the GPLv2.