New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Wireguard iOS TestFlight - please help test this #1190
Comments
FYI - You need to have unique conf files if you're using multiple devices. |
I just ran a fresh Algo setup today & the latest Testflight version of WireGuard (0.0.20181104 (4)) worked out of the box. Pretty sweet. |
Sure hope Wireguard turns out to be more reliable than strongSwan and these connecting/reconnecting loops (#963) that are driving me crazy. |
@happy201807 It's not the right place to address app-related questions. Ask the wireguard developers instead |
@happy201807 While I understand why you would want to see iOS 10 supported, iOS 12 goes back to iPhone 5S, iPad mini 2 and even the iPod touch 6th gen. As far as startup of the VPN is concerned, those features are coming. Might even be in the upcoming TestFlight test. Here's the todo list if you want to stay informed: |
Hi all... just loaded the iOS app via Testflight and figured out how to import the current config for the app. On my Mac, I copied the wireguard folder from algo-master into my iCloud Drive. Then, I clicked the add new tunnel button and selected Create from file or archive. In the file selector, I clicked to open the folder I created on iCloud Drive. I then double clicked on the named config file and the app built the working tunnel. I tested it and it works like a charm. Very cool! |
Or... you could display the QR code image that Algo generated for you on your Mac, then capture it with the camera on your iOS device. That way's a bit quicker. 😃 |
I did not see the QR code anywhere. I must have setup Algo before the QR code but after the wireguard set went in the build. |
@marca56 QR codes for Wireguard are a relatively new feature in Algo. You can find them in <>/configs/<>/wireguard |
Some feedback is in order after testing a bit yesterday. I was transitioning from home WiFi to mobile broadband, to location or public WiFi and I see that the current implementation works on all but the automatic reconnect is not very good. What I mean is that a lot of times, the tunnel either does not connect or is dropped in the case of a network change. On the other hand, just stopping and starting it again establishes the tunnel properly. I am excited to say that the performance is very good and the battery drain is hardly noticeable. The phone does not get warm. I'm looking forward to impressive improvements in handover and reconnect. Then, it can be a full time thing and easy enough for my wife and other non-techie folks too. |
Fresh install on digital ocean, running Ubuntu 18.04. No problems yet. |
@mrapplegate did you experience any problems so far ? Seems like it doesn’t work well for me when changing Wi-Fi networks or from Wi-Fi to mobile network. |
Same here Disconnect/ connect helps |
@Rohmilchkaese I have had a few problems moving from my home WiFi to AT&T cellular. Like monouser7dig said disconnect/connect fixed it. |
Has anyone noticed increased bandwidth consumption? I rarely ever go over my cellular data's bandwidth limit, but I hit it in less than 15 days this month with no significant change in usage pattern and more than 70% of it was consumed by the WireGuard app. |
Try removing the |
Thanks, I'll try it out. |
@davidemyers AlgoVPN needs to change the default persistentkeepalive from 25 to 0. As it is, when you get the Wireguard profile it's set to 25 |
@mrapplegate Latest version of Wireguard should fix your connect/disconnect problem. |
You no longer need TestFlight, just search for "WireGuard" in the App Store. |
Then we close it :) Thanks to everyone |
Straight from the Wireguard mailing list....
Hey folks,
For the last few weeks, Roopesh and I have been hard at work on the
WireGuard for iOS app. Today we're happy to share a
likely-buggy-and-broken TestFlight that you can run on your phone:
https://testflight.apple.com/join/63I19SDT. As usual, use at your
own risk, especially since it's alpha quality.
Please let us know about any bugs as you find them -- you can send
them to me or to team@wireguard.com. Our current TODO list lives here
[1], linked via the main project TODO list [2], and if you're an iOS
person and want to contribute code, we'd be happy to have you on
board.
The app costs $3.99 and requires an email address to sign up; we
manage all your tunnels for you in the cloud. JUST KIDDING! Like the
rest of WireGuard, the iOS app is free and open source [3]. I make
this rather tasteless joke, because of the rather surprising
quantities of people encouraging me to do the iOS stuff as proprietary
paid software, because "apple users will pay" or because "open source
is cool, but iphone folks don't care about it so you can get away with
charging" or because "none of the other vpn players are doing open
source mobile implementations" or even because "apple is more likely
to accept paid software into its app store" and so on and so forth.
But, as usual, I much prefer for this to be a community project than a
closed one, and so like everything else, it's FLOSS.
Enjoy! And do let us know about the bugs as you run into them. I'm
sure there are plenty.
Regards,
Jason
[1] https://docs.google.com/document/d/1BnzImOF8CkungFnuRlWhnEpY2OmEHSckat62aZ6LYGY
[2] https://www.wireguard.com/todo/
[3] https://git.zx2c4.com/wireguard-ios/
The text was updated successfully, but these errors were encountered: