Skip to content

Self-hosted Wireguard Manager for CentOS, Debian, Ubuntu, Arch, Fedora, Redhat, Raspbian

Notifications You must be signed in to change notification settings

HappyShr00m/wireguard-manager

Β 
Β 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

72 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

WireGuard Manager πŸ‘‹

Release ShellCheck Issues Sponsors PullRequest License


🀷 What is VPN ?

A Virtual Private Network (VPN) allows users to send and receive data through shared or public networks as if their computing devices were directly connected to the private network. Thus, applications running on an end-system (PC, smartphone, etc.) over a VPN may benefit from individual network features, protection, and management. Encryption is a standard aspect of a VPN connection but not an intrinsic one.

πŸ“Ά What is WireGuard❓

WireGuard is a straightforward yet fast and modern VPN that utilizes state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPsec while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general-purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. Initially released for the Linux kernel, it is now cross-platform (Windows, macOS, BSD, iOS, Android) and widely deployable. It is currently under a massive development, but it already might be regarded as the most secure, most comfortable to use, and the simplest VPN solution in the industry.

β›³ Goals

  • robust and modern security by default
  • minimal config and critical management
  • fast, both low-latency and high-bandwidth
  • simple internals and small protocol surface area
  • simple CLI and seamless integration with system networking

🌲 Prerequisite

  • CentOS, Debian, Ubuntu, Arch, Fedora, Redhat, Raspbian
  • Linux Kernel 3.1 or newer
  • You will need superuser access or a user account with sudo privilege.

πŸ“² Installation

Lets first use curl and save the file in /etc/wireguard/

curl https://raw.githubusercontent.com/complexorganizations/wireguard-manager/master/wireguard-server.sh --create-dirs -o /etc/wireguard/wireguard-server.sh

Then let's make the script user executable (Optional)

chmod +x /etc/wireguard/wireguard-server.sh

It's finally time to execute the script

bash /etc/wireguard/wireguard-server.sh

In your /etc/wireguard/clients directory, you will have .conf files. These are the client configuration files. Download them from your WireGuard Interface and connect using your favorite WireGuard Peer.


πŸ’£ After Installation

  • Show WireGuard Interface
  • Start WireGuard Interface
  • Stop WireGuard Interface
  • Restart WireGuard Interface
  • Add WireGuard Peer
  • Remove WireGuard Peer
  • Uninstall WireGuard Interface
  • Update this script

πŸ”‘ Usage

usage: ./wireguard-server.sh [options]
  --install     Install WireGuard Interface
  --start       Start WireGuard Interface
  --stop        Stop WireGuard Interface
  --restart     Restart WireGuard Interface
  --list        Show WireGuard Peers
  --add         Add WireGuard Peer
  --remove      Remove WireGuard Peer
  --reinstall   Reinstall WireGuard Interface
  --uninstall   Uninstall WireGuard Interface
  --update      Update WireGuard Script
  --help        Show Usage Guide

πŸ₯° Features

  • Installs and configures a ready-to-use WireGuard Interface
  • (IPv4|IPv6) Supported, (IPv4|IPv6) Leak Protection
  • Iptables rules and forwarding managed in a seamless way
  • If needed, the script can cleanly remove WireGuard, including configuration and iptables rules
  • Variety of DNS resolvers to be pushed to the clients
  • The choice to use a self-hosted resolver with Unbound.
  • Preshared-key for an extra layer of security.
  • Block DNS leaks
  • Dynamic DNS supported
  • Many other little things!

πŸ’‘ Options

  • PRIVATE_SUBNET_V4 - private IPv4 subnet configuration 10.8.0.0/24 by default
  • PRIVATE_SUBNET_V6 - private IPv6 subnet configuration fd42:42:42::0/64 by default
  • SERVER_HOST_V4 - public IPv4 address, detected by default using curl
  • SERVER_HOST_V6 - public IPv6 address, detected by default using curl
  • SERVER_PUB_NIC - public nig address, detected by default
  • SERVER_PORT - public port for wireguard server, default is 51820
  • DISABLE_HOST - Disable or enable ipv4 and ipv6, default disabled
  • CLIENT_ALLOWED_IP - private or public IP range allowed in the tunnel
  • NAT_CHOICE - Keep sending packets to keep the tunnel alive 25
  • INSTALL_UNBOUND - Install unbound settings y/n
  • DNS_CHOICE - Without Unbound you have to use a public dns like 8.8.8.8
  • CLIENT_NAME - name of the client
  • MTU_CHOICE - the MTU the client will use to connect to DNS 1420

πŸ‘‰πŸ‘ˆ Compatibility with Linux Distro

OS Supported i386 amd64 armhf arm64
Ubuntu 14 ≀ ❌ ❌ ❌ ❌ ❌
Ubuntu 16 βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
Ubuntu 18 βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
Ubuntu 19 β‰₯ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
Debian 7 ≀ ❌ ❌ ❌ ❌ ❌
Debian 8 βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
Debian 9 βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
Debian 10 β‰₯ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
CentOS 6 ≀ ❌ ❌ ❌ ❌ ❌
CentOS 7 βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
CentOS 8 β‰₯ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
Fedora 29 ≀ ❌ ❌ ❌ ❌ ❌
Fedora 30 βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
Fedora 31 βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
Fedora 32 β‰₯ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
RedHat 6 ≀ ❌ ❌ ❌ ❌ ❌
RedHat 7 βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
RedHat 8 β‰₯ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
Arch βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ
Raspbian βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ βœ”οΈ

☁️ Compatibility with Cloud Providers

Cloud Supported
AWS βœ”οΈ
Google Cloud βœ”οΈ
Linode βœ”οΈ
Digital Ocean βœ”οΈ
Vultr βœ”οΈ
Microsoft Azure βœ”οΈ
OpenStack βœ”οΈ
Rackspace βœ”οΈ
Scaleway βœ”οΈ
EuroVPS βœ”οΈ
Hetzner Cloud ❌
Strato ❌

πŸ›‘οΈ Compatibility with Virtualization

Virtualization Supported
KVM βœ”οΈ
LXC ❌
OpenVZ ❌
Docker ❌

πŸ’» Compatibility with Linux Kernel

Kernel Supported
Kernel 5.4 β‰₯ βœ”οΈ
Kernel 4.19 βœ”οΈ
Kernel 4.14 βœ”οΈ
Kernel 4.9 βœ”οΈ
Kernel 4.4 βœ”οΈ
Kernel 3.16 βœ”οΈ
Kernel 3.1 ≀ ❌

πŸ™‹ Q&A

Which hosting provider do you recommend?

  • Google Cloud: Worldwide locations, starting at $10/month
  • Vultr: Worldwide locations, IPv6 support, starting at $3.50/month
  • Digital Ocean: Worldwide locations, IPv6 support, starting at $5/month
  • Linode: Worldwide locations, IPv6 support, starting at $5/month

Which WireGuard client do you recommend?

Is there WireGuard documentation?

How do I install a wireguard without the questions? (Headless Install) Server Only

  • HEADLESS_INSTALL=y /etc/wireguard/wireguard-server.sh

Official Links


πŸ“ Architecture

image


🀝 Developing

Using a browser based development environment:

Open in Gitpod

πŸ› Debugging

git clone https://github.com/complexorganizations/wireguard-manager /etc/wireguard/
bash -x /etc/wireguard/wireguard-(server|client).sh >> /etc/wireguard/wireguard-(server|client).log

πŸ‘€ Author


⛑️ Support

Give a ⭐️ and 🍴 if this project helped you!

Sponsors

  • BCH : qzq9ae4jlewtz7v7mn4tv7kav3dc9rvjwsg5f36099
  • BSV : ``
  • BTC : 3QgnfTBaW4gn4y8QPEdXNJY6Y74nBwRXfR
  • DAI : 0x8DAd9f838d5F2Ab6B14795d47dD1Fa4ED7D1AcaB
  • ETC : 0xd42D20D7E1fC0adb98B67d36691754E3F944478A
  • ETH : 0xe000C5094398dd83A3ef8228613CF4aD134eB0EA
  • LTC : MVwkmnnaLDq7UccDeudcpQYwFnnDwDxxmq
  • XRP : rw2ciyaNshpHe7bCHo4bRWq6pqqynnWKQg (1790476900)

❀️ Credits

Angristan l-n-s


πŸ“ License

Copyright Β© 2020 Prajwal

This project is MIT licensed.

About

Self-hosted Wireguard Manager for CentOS, Debian, Ubuntu, Arch, Fedora, Redhat, Raspbian

Resources

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Shell 100.0%