Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Wireguard iOS TestFlight - please help test this #1190

Closed
digeratus opened this issue Nov 6, 2018 · 22 comments
Closed

Wireguard iOS TestFlight - please help test this #1190

digeratus opened this issue Nov 6, 2018 · 22 comments

Comments

@digeratus
Copy link

Straight from the Wireguard mailing list....

Hey folks,

For the last few weeks, Roopesh and I have been hard at work on the
WireGuard for iOS app. Today we're happy to share a
likely-buggy-and-broken TestFlight that you can run on your phone:
https://testflight.apple.com/join/63I19SDT. As usual, use at your
own risk, especially since it's alpha quality.

Please let us know about any bugs as you find them -- you can send
them to me or to team@wireguard.com. Our current TODO list lives here
[1], linked via the main project TODO list [2], and if you're an iOS
person and want to contribute code, we'd be happy to have you on
board.

The app costs $3.99 and requires an email address to sign up; we
manage all your tunnels for you in the cloud. JUST KIDDING! Like the
rest of WireGuard, the iOS app is free and open source [3]. I make
this rather tasteless joke, because of the rather surprising
quantities of people encouraging me to do the iOS stuff as proprietary
paid software, because "apple users will pay" or because "open source
is cool, but iphone folks don't care about it so you can get away with
charging" or because "none of the other vpn players are doing open
source mobile implementations" or even because "apple is more likely
to accept paid software into its app store" and so on and so forth.
But, as usual, I much prefer for this to be a community project than a
closed one, and so like everything else, it's FLOSS.

Enjoy! And do let us know about the bugs as you run into them. I'm
sure there are plenty.

Regards,
Jason

[1] https://docs.google.com/document/d/1BnzImOF8CkungFnuRlWhnEpY2OmEHSckat62aZ6LYGY
[2] https://www.wireguard.com/todo/
[3] https://git.zx2c4.com/wireguard-ios/

@digeratus
Copy link
Author

FYI - You need to have unique conf files if you're using multiple devices.

@hakusaro
Copy link

hakusaro commented Nov 9, 2018

I just ran a fresh Algo setup today & the latest Testflight version of WireGuard (0.0.20181104 (4)) worked out of the box. Pretty sweet.

@TC1977
Copy link
Contributor

TC1977 commented Nov 10, 2018

Sure hope Wireguard turns out to be more reliable than strongSwan and these connecting/reconnecting loops (#963) that are driving me crazy.

@jackivanov
Copy link
Collaborator

@happy201807 It's not the right place to address app-related questions. Ask the wireguard developers instead

@digeratus
Copy link
Author

@happy201807 While I understand why you would want to see iOS 10 supported, iOS 12 goes back to iPhone 5S, iPad mini 2 and even the iPod touch 6th gen.

As far as startup of the VPN is concerned, those features are coming. Might even be in the upcoming TestFlight test. Here's the todo list if you want to stay informed:
https://docs.google.com/document/d/1BnzImOF8CkungFnuRlWhnEpY2OmEHSckat62aZ6LYGY/mobilebasic

@marca56
Copy link

marca56 commented Nov 13, 2018

Hi all... just loaded the iOS app via Testflight and figured out how to import the current config for the app. On my Mac, I copied the wireguard folder from algo-master into my iCloud Drive. Then, I clicked the add new tunnel button and selected Create from file or archive. In the file selector, I clicked to open the folder I created on iCloud Drive. I then double clicked on the named config file and the app built the working tunnel. I tested it and it works like a charm. Very cool!

@davidemyers
Copy link
Contributor

Or... you could display the QR code image that Algo generated for you on your Mac, then capture it with the camera on your iOS device. That way's a bit quicker. 😃

@marca56
Copy link

marca56 commented Nov 14, 2018

I did not see the QR code anywhere. I must have setup Algo before the QR code but after the wireguard set went in the build.

@digeratus
Copy link
Author

@marca56 QR codes for Wireguard are a relatively new feature in Algo. You can find them in <>/configs/<>/wireguard

@marca56
Copy link

marca56 commented Nov 15, 2018

image

Must have been done in a later version :) But OK, it would be easier with a QR code

@marca56
Copy link

marca56 commented Nov 15, 2018

Some feedback is in order after testing a bit yesterday. I was transitioning from home WiFi to mobile broadband, to location or public WiFi and I see that the current implementation works on all but the automatic reconnect is not very good. What I mean is that a lot of times, the tunnel either does not connect or is dropped in the case of a network change. On the other hand, just stopping and starting it again establishes the tunnel properly. I am excited to say that the performance is very good and the battery drain is hardly noticeable. The phone does not get warm. I'm looking forward to impressive improvements in handover and reconnect. Then, it can be a full time thing and easy enough for my wife and other non-techie folks too.

@mrapplegate
Copy link

Fresh install on digital ocean, running Ubuntu 18.04. No problems yet.

@Rohmilchkaese
Copy link

@mrapplegate did you experience any problems so far ? Seems like it doesn’t work well for me when changing Wi-Fi networks or from Wi-Fi to mobile network.

@ghost
Copy link

ghost commented Nov 27, 2018

Seems like it doesn’t work well for me when changing Wi-Fi networks or from Wi-Fi to mobile network.

Same here

Disconnect/ connect helps

@mrapplegate
Copy link

@Rohmilchkaese I have had a few problems moving from my home WiFi to AT&T cellular. Like monouser7dig said disconnect/connect fixed it.

@kristallizer
Copy link

Has anyone noticed increased bandwidth consumption? I rarely ever go over my cellular data's bandwidth limit, but I hit it in less than 15 days this month with no significant change in usage pattern and more than 70% of it was consumed by the WireGuard app.

@davidemyers
Copy link
Contributor

Try removing the PersistentKeepalive option from your client config. Most users shouldn't need it and perhaps it should be avoided for devices that use metered data.

@kristallizer
Copy link

Thanks, I'll try it out.

@digeratus
Copy link
Author

@davidemyers AlgoVPN needs to change the default persistentkeepalive from 25 to 0. As it is, when you get the Wireguard profile it's set to 25

@digeratus
Copy link
Author

@mrapplegate Latest version of Wireguard should fix your connect/disconnect problem.

@davidemyers
Copy link
Contributor

You no longer need TestFlight, just search for "WireGuard" in the App Store.

@jackivanov
Copy link
Collaborator

jackivanov commented Dec 20, 2018

Then we close it :) Thanks to everyone

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

9 participants