Discussion:
wireguard?
(too old to reply)
Edmund
2024-11-15 13:50:05 UTC
Permalink
wireguard?

One for the experts.
Installed wireguard via the repository.
Now it nowhere to be found on my computer
the only thing that show something is "locate wireguard"

============
usr/lib/modules/5.15.0-124-generic/kernel/drivers/net/wireguard/wireguard.ko
/usr/lib/modules/5.15.0-125-generic/kernel/drivers/net/wireguard
/usr/lib/modules/5.15.0-125-generic/kernel/drivers/net/wireguard/wireguard.ko
/usr/lib/modules/5.15.0-56-generic/kernel/drivers/net/wireguard
/usr/lib/modules/5.15.0-56-generic/kernel/drivers/net/wireguard/wireguard.ko
/usr/share/doc/wireguard
/usr/share/doc/wireguard-tools
/usr/share/doc/netplan/examples/wireguard.yaml
/usr/share/doc/wireguard/NEWS.Debian.gz
/usr/share/doc/wireguard/TODO.Debian
/usr/share/doc/wireguard/changelog.Debian.gz
/usr/share/doc/wireguard/copyright
/usr/share/doc/wireguard-tools/NEWS.Debian.gz
/usr/share/doc/wireguard-tools/README.Debian
/usr/share/doc/wireguard-tools/changelog.Debian.gz
/usr/share/doc/wireguard-tools/copyright
/usr/share/doc/wireguard-tools/examples
/usr/share/doc/wireguard-tools/examples/dns-hatchet
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library
/usr/share/doc/wireguard-tools/examples/extract-handshakes
/usr/share/doc/wireguard-tools/examples/extract-keys
/usr/share/doc/wireguard-tools/examples/highlighter
/usr/share/doc/wireguard-tools/examples/json
/usr/share/doc/wireguard-tools/examples/keygen-html
/usr/share/doc/wireguard-tools/examples/launchd
/usr/share/doc/wireguard-tools/examples/nat-hole-punching
/usr/share/doc/wireguard-tools/examples/ncat-client-server
/usr/share/doc/wireguard-tools/examples/reresolve-dns
/usr/share/doc/wireguard-tools/examples/sticky-sockets
/usr/share/doc/wireguard-tools/examples/synergy
/usr/share/doc/wireguard-tools/examples/dns-hatchet/README
/usr/share/doc/wireguard-tools/examples/dns-hatchet/apply.sh
/usr/share/doc/wireguard-tools/examples/dns-hatchet/hatchet.bash
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library/Makefile
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library/README
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library/test.c
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library/wireguard.c
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library/wireguard.h
/usr/share/doc/wireguard-tools/examples/extract-handshakes/Makefile
/usr/share/doc/wireguard-tools/examples/extract-handshakes/README
/usr/share/doc/wireguard-tools/examples/extract-handshakes/extract-handshakes.sh
/usr/share/doc/wireguard-tools/examples/extract-handshakes/offset-finder.c
/usr/share/doc/wireguard-tools/examples/extract-keys/Makefile
/usr/share/doc/wireguard-tools/examples/extract-keys/README
/usr/share/doc/wireguard-tools/examples/extract-keys/config.c
/usr/share/doc/wireguard-tools/examples/extract-keys/extract-keys.c
/usr/share/doc/wireguard-tools/examples/highlighter/Makefile
/usr/share/doc/wireguard-tools/examples/highlighter/README
/usr/share/doc/wireguard-tools/examples/highlighter/fuzz.c
/usr/share/doc/wireguard-tools/examples/highlighter/gui
/usr/share/doc/wireguard-tools/examples/highlighter/highlight.c
/usr/share/doc/wireguard-tools/examples/highlighter/highlighter.c
/usr/share/doc/wireguard-tools/examples/highlighter/highlighter.h
/usr/share/doc/wireguard-tools/examples/highlighter/gui/highlight.cpp
/usr/share/doc/wireguard-tools/examples/highlighter/gui/highlight.pro
/usr/share/doc/wireguard-tools/examples/json/README
/usr/share/doc/wireguard-tools/examples/json/wg-json
/usr/share/doc/wireguard-tools/examples/keygen-html/README
/usr/share/doc/wireguard-tools/examples/keygen-html/keygen.html
/usr/share/doc/wireguard-tools/examples/keygen-html/wireguard.js
/usr/share/doc/wireguard-tools/examples/launchd/README
/usr/share/doc/wireguard-tools/examples/launchd/com.wireguard.wg0.plist
/usr/share/doc/wireguard-tools/examples/nat-hole-punching/README
/usr/share/doc/wireguard-tools/examples/nat-hole-punching/nat-punch-client.c
/usr/share/doc/wireguard-tools/examples/nat-hole-punching/nat-punch-server.c
/usr/share/doc/wireguard-tools/examples/ncat-client-server/README
/usr/share/doc/wireguard-tools/examples/ncat-client-server/client-quick.sh
/usr/share/doc/wireguard-tools/examples/ncat-client-server/client.sh
/usr/share/doc/wireguard-tools/examples/ncat-client-server/server.sh
/usr/share/doc/wireguard-tools/examples/reresolve-dns/README
/usr/share/doc/wireguard-tools/examples/reresolve-dns/reresolve-dns.sh
/usr/share/doc/wireguard-tools/examples/sticky-sockets/README
/usr/share/doc/wireguard-tools/examples/sticky-sockets/sticky-sockets.c
/usr/share/doc/wireguard-tools/examples/synergy/README
/usr/share/doc/wireguard-tools/examples/synergy/synergy-client.sh
/usr/share/doc/wireguard-tools/examples/synergy/synergy-server.sh
/usr/share/lintian/overrides/wireguard-tools
/usr/src/linux-headers-5.15.0-124/drivers/net/wireguard
/usr/src/linux-headers-5.15.0-124/drivers/net/wireguard/Makefile
/usr/src/linux-headers-5.15.0-124/include/uapi/linux/wireguard.h
/usr/src/linux-headers-5.15.0-124/tools/testing/selftests/wireguard
/usr/src/linux-headers-5.15.0-124/tools/testing/selftests/wireguard/netns.sh
/usr/src/linux-headers-5.15.0-124/tools/testing/selftests/wireguard/qemu
/usr/src/linux-headers-5.15.0-124/tools/testing/selftests/wireguard/qemu/Makefile
/usr/src/linux-headers-5.15.0-125/drivers/net/wireguard
/usr/src/linux-headers-5.15.0-125/drivers/net/wireguard/Makefile
/usr/src/linux-headers-5.15.0-125/include/uapi/linux/wireguard.h
/usr/src/linux-headers-5.15.0-125/tools/testing/selftests/wireguard
/usr/src/linux-headers-5.15.0-125/tools/testing/selftests/wireguard/netns.sh
/usr/src/linux-headers-5.15.0-125/tools/testing/selftests/wireguard/qemu
/usr/src/linux-headers-5.15.0-125/tools/testing/selftests/wireguard/qemu/Makefile
/usr/src/linux-headers-5.15.0-56/drivers/net/wireguard
/usr/src/linux-headers-5.15.0-56/drivers/net/wireguard/Makefile
/usr/src/linux-headers-5.15.0-56/include/uapi/linux/wireguard.h
/usr/src/linux-headers-5.15.0-56/tools/testing/selftests/wireguard
/usr/src/linux-headers-5.15.0-56/tools/testing/selftests/wireguard/netns.sh
/usr/src/linux-headers-5.15.0-56/tools/testing/selftests/wireguard/qemu

================

Looks great, anyone know what to do with it?
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
Arti F. Idiot
2024-11-15 14:57:45 UTC
Permalink
it's for VPNs; some commercial providers like Proton support the
wireguard protocol.
Edmund
2024-11-15 15:21:52 UTC
Permalink
Post by Arti F. Idiot
it's for VPNs; some commercial providers like Proton support the
wireguard protocol.
That is not what I mean, I mean how do I start it.

Even the wireguard website is vague and unclear about it.
As usual, there are click and ready tools for everything but linux.

Most things I find on youtube is how to install a wireguard SERVER.
I don't need a server, I need a client so I can connect to my server.
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
Arti F. Idiot
2024-11-15 15:58:31 UTC
Permalink
Post by Edmund
Post by Arti F. Idiot
it's for VPNs; some commercial providers like Proton support the
wireguard protocol.
That is not what I mean, I mean how do I start it.
Even the wireguard website is vague and unclear about it.
As usual, there are click and ready tools for everything but linux.
Most things I find on youtube is how to install a wireguard SERVER.
I don't need a server, I need a client so I can connect to my server.
Maybe you should stick to Windows?
Edmund
2024-11-15 16:15:46 UTC
Permalink
Post by Arti F. Idiot
Post by Edmund
Post by Arti F. Idiot
it's for VPNs; some commercial providers like Proton support the
wireguard protocol.
That is not what I mean, I mean how do I start it.
Even the wireguard website is vague and unclear about it.
As usual, there are click and ready tools for everything but linux.
Most things I find on youtube is how to install a wireguard SERVER.
I don't need a server, I need a client so I can connect to my server.
Maybe you should stick to Windows?
I see you have a perfect name for yourself
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
yossarian >
2024-11-15 17:02:10 UTC
Permalink
On Fri, 15 Nov 2024 14:50:05 +0100
Post by Edmund
Looks great, anyone know what to do with it?
Maybe look on this tutorial, there is no GUI only CLI :)

--
Running Linux Mint 21.3 (Virginia) using Kernel=6.5.0-45-generic on x86_64 ,
Cinnamon, lightdm, x11
AMD Ryzen 7 5700G with Radeon Graphics (16) @ 5.288GHz
Edmund
2024-11-15 19:05:30 UTC
Permalink
Post by yossarian >
On Fri, 15 Nov 2024 14:50:05 +0100
Post by Edmund
Looks great, anyone know what to do with it?
Maybe look on this tutorial, there is no GUI only CLI :)
http://youtu.be/bVKNSf1p1d0
Thanks I found that one and hoped there was something more user friendly.

For fun, look at the wireguard website, choose anything but linux.
Install it by ONE click, open it by clicking the wireguard icon,
paste the KEYS generated by your VPN server click connect and you are done!

Now go to linux and get fucked, not even a manual. ( for humans )
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
Mike Easter
2024-11-15 20:59:53 UTC
Permalink
Post by Edmund
For fun, look at the wireguard website, choose anything but linux.
Install it by ONE click, open it by clicking the wireguard icon,
paste the KEYS generated by your VPN server click connect and you are done!
The 'friendliness' depends on how your VPN server/provider chooses to
be, depending on various factors, the protocols, the plans, the countries.

VPN can commonly be any one of a variety of protocols, most often
openvpn or wireguard these days, previously IPsec & IKEv2.

In the specific example of proton, it offers more protocols for Win &
Mac than for linux, but it does offer openvpn & wg for linux. Some
other platforms may have (or not) the protonvpn 'Stealth'.
Post by Edmund
Stealth does this by using obfuscated TLS tunneling over TCP. This is
different from most popular VPN protocols that typically use UDP,
making them easier to detect and block. Without going into too much
detail, Stealth also establishes VPN connections in a specific and
unique way that avoids alerting internet filters.
Some providers are not 'helpful' to linux at all and everything has to
be created manually, whereas there was some linux distro I booted live
not so long ago which had a default VPN installed; I forget which that
was and just now I didn't use a good enough search term to find out what
it was.
--
Mike Easter
Edmund
2024-11-15 21:21:12 UTC
Permalink
Post by Mike Easter
Post by Edmund
For fun, look at the wireguard website, choose anything but linux.
Install it by ONE click, open it by clicking the wireguard icon, paste
the KEYS generated by your VPN server click connect and you are
done!
The 'friendliness' depends on how your VPN server/provider chooses to
be, depending on various factors, the protocols, the plans, the countries.
Nope, the VPN and/or provider has nothing to do with how wireguard
CLIENT must be operated.
Wireguard works with one click in both windows and android, only in
linux it is a horrorshow.
Post by Mike Easter
VPN can commonly be any one of a variety of protocols, most often
openvpn or wireguard these days, previously IPsec & IKEv2.
In the specific example of proton, it offers more protocols for Win &
Mac than for linux, but it does offer openvpn & wg for linux.  Some
other platforms may have (or not) the protonvpn 'Stealth'.
Post by Edmund
Stealth does this by using obfuscated TLS tunneling over TCP. This is
different from most popular VPN protocols that typically use UDP,
making them easier to detect and block. Without going into too much
detail, Stealth also establishes VPN connections in a specific and
unique way that avoids alerting internet filters.
Some providers are not 'helpful' to linux at all and everything has to
be created manually, whereas there was some linux distro I booted live
not so long ago which had a default VPN installed; I forget which that
was and just now I didn't use a good enough search term to find out what
it was.
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
Mike Easter
2024-11-15 21:28:56 UTC
Permalink
Post by Edmund
Nope, the VPN and/or provider has nothing to do with how wireguard
CLIENT must be operated.
Wireguard works with one click in both windows and android, only in
linux it is a horrorshow.
That is not correct. The provider can provide anything from a
configuration file to a GUI app or 'nothing' for linux. What type of
'stressful' requirements you are seeing depend on which provider you are
trying to use w/ which protocol on linux.

Also, I discovered the distro w/ a built-in vpn I mentioned earlier, it
is sparky w/ RiseUp, which methodology I haven't figured out yet.
--
Mike Easter
Mike Easter
2024-11-15 23:20:37 UTC
Permalink
Post by Mike Easter
sparky w/ RiseUp,
Sparky RiseUp uses openvpn. It has 6 choices 3 US, 1 .ca, 1 .fr, so
it is a simplistic free vpn. I don't know about speed as it didn't test it.

RiseUpVPN can be downloaded as a snap package or as a Deb stable .deb
package. It adds an icon to the notification area, but doesn't replace
the NM.

In the package manager, it is described as: it sends all user's internet
traffic thru' and encryptted connection to riseup.net, where it then
goes out onto the public internet. I'm not sure exactly how to
interpret that.
--
Mike Easter
Edmund
2024-11-16 11:08:24 UTC
Permalink
Post by Mike Easter
Post by Edmund
Nope, the VPN and/or provider has nothing to do with how wireguard
CLIENT must be operated.
Wireguard works with one click in both windows and android, only in
linux it is a horrorshow.
That is not correct.
Yes it is!
Post by Mike Easter
  The provider can provide anything from a
configuration file to a GUI app or 'nothing' for linux.  What type of
'stressful' requirements you are seeing depend on which provider you are
trying to use w/ which protocol on linux.
Read the item "WIREGUARD"
Wireguard -server- gives the conf file which obvious is "identical" for
not matter what client OS.

it is the linux client part that fuck up like big time.
Post by Mike Easter
Also, I discovered the distro w/ a built-in vpn I mentioned earlier, it
is sparky w/ RiseUp, which methodology I haven't figured out yet.
I am very happy for you, although I do not have the faintest idea how
that solve the problem.
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
Mike Easter
2024-11-16 15:29:19 UTC
Permalink
I do not have the faintest idea how that solve the problem.
Apparently your problem is that you are trying to use wireguard on a
particular VPN who doesn't provide much for linux.

My information about 3 other providers, proton, windscribe, & riseup
using the protocols wireguard and openvpn was to illustrate to you a
range of linux GUI facilitation by those providers.

Your faint idea is to whine about the inclination for some linux
services to be accessed by configuration files and command line while
Win is generally more thoroughly served graphically.
--
Mike Easter
Mike Easter
2024-11-16 16:23:47 UTC
Permalink
Post by Mike Easter
I do not have the faintest idea how that solve the problem.
Apparently your problem is that you are trying to use wireguard on a
particular VPN who doesn't provide much for linux.
I might add that exploration of this issue also exposes or illustrates
another gripe of yours, that the freedom of linux to provide 'plenty' of
different DEs and WMs creates more demands on those who would dev
graphical s/w to facilitate VPN services in some different protocols,
incl wireguard and openvpn.

If a linux user is 'shopping around' for a VPN service to use, and he is
'restrained' by the linux 'feature' than would mean that he might need
to create his own configuration and 'text-based' interface for some
particular provider, that dilemma illustrates your gripe that linux has
'too many' different DEs and interfaces among its many distributions.

Also, that hurdle makes it harder for the individual who doesn't have
the kinds of skills necessary to do that.

Example: proton's GUIs for linux say they are designed for Fedora,
Ubuntu, or Deb Gnome; that is pretty limited. Their page of
instructions for doing it manually using such as wireguard tells how to
do it using the command line and network manager, besides or
alternatively to their GUI.
https://protonvpn.com/support/wireguard-linux

I don't agree that linux has too much freedom in that regard, but i
acknowledge that it makes some graphical dev harder, which puts a
'strain' on some users.
--
Mike Easter
Edmund
2024-11-16 17:11:37 UTC
Permalink
Post by Mike Easter
Post by Mike Easter
I do not have the faintest idea how that solve the problem.
Apparently your problem is that you are trying to use wireguard on a
particular VPN who doesn't provide much for linux.
I might add that exploration of this issue also exposes or illustrates
another gripe of yours, that the freedom of linux to provide 'plenty' of
different DEs and WMs creates more demands on those who would dev
graphical s/w to facilitate VPN services in some different protocols,
incl wireguard and openvpn.
If a linux user is 'shopping around' for a VPN service to use, and he is
'restrained' by the linux 'feature' than would mean that he might need
to create his own configuration and 'text-based' interface for some
particular provider, that dilemma illustrates your gripe that linux has
'too many' different DEs and interfaces among its many distributions.
Also, that hurdle makes it harder for the individual who doesn't have
the kinds of skills necessary to do that.
Example: proton's GUIs for linux say they are designed for Fedora,
Ubuntu, or Deb Gnome; that is pretty limited.  Their page of
instructions for doing it manually using such as wireguard tells how to
do it using the command line and network manager, besides or
alternatively to their GUI.
https://protonvpn.com/support/wireguard-linux
I don't agree that linux has too much freedom in that regard, but i
acknowledge that it makes some graphical dev harder, which puts a
'strain' on some users.
You don't have the faintest idea what is going on here, you don't even
read what I said or asked, you don't even understand the problem at all.
You obviously didn't check the wireguard website but keep rambling about
totally different things that do not help to solve the problem in any way.
You can bet your house that if I struggle with it, 99% of the people
here cannot use it and that includes you.
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
Mike Easter
2024-11-16 17:26:35 UTC
Permalink
Post by Edmund
You obviously didn't check the wireguard website but keep rambling about
totally different things that do not help to solve the problem in any way.
I don't think the wireguard website is the 'place' to find out how to
use wireguard for a VPN, so I haven't even visited that site in all of
my use of wireguard.

Wireguard is 'baked into' the linux kernel as a module. The only
'user-facing tool' available to the user is the wg tool which gives the
user access to some commands.

For practical purposes for a user such as yourself and myself, there is
no need to visit the wireguard page except 'academically' -- not
'functionally'. I read the wp article on wireguard, that is enough info
for me about the academics.
--
Mike Easter
Edmund
2024-11-16 18:24:23 UTC
Permalink
Post by Mike Easter
Post by Edmund
You obviously didn't check the wireguard website but keep rambling
about totally different things that do not help to solve the problem
in any way.
I don't think the wireguard website is the 'place' to find out how to
use wireguard for a VPN
Interesting :-)
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
Mike Easter
2024-11-16 19:47:47 UTC
Permalink
Post by Edmund
Post by Mike Easter
I don't think the wireguard website is the 'place' to find out how to
use wireguard for a VPN
Interesting :-)
Here's something you can 'learn' from the wg site:

- the linux 'instructions' to dl 'wireguard' package (which is a
commandline tool to use commands for the linux kernel module are to dl
the wg or wg-tools which is 'tiny' a few tens of kB
- the win dl is a similarly 'tiny' .exe which in turn dl/s a
relatively 'massive' .msi which is 2.7 meg in size; a completely
different 'concept' than that of linux

If you are trying to figure out the diff between how wg is implemented
in Win and in linux, it would be more practical to get your education
somewhere else than the wg site.

If you are trying to use wg for linux for a particular VPN, if you are
lucky and the VPN is very instructive about linux such as proton's, you
would be best to get your info from the VPN site; otherwise you might be
best to get your info here by telling us which VPN you are trying to use
wg for.
--
Mike Easter
Mike Easter
2024-11-16 20:07:39 UTC
Permalink
Post by Mike Easter
If you are trying to figure out the diff between how wg is
implemented in Win and in linux, it would be more practical to get
your education somewhere else than the wg site.
Here's a good one from a mailing list announcement in '21 Aug:

https://lists.zx2c4.com/pipermail/wireguard/2021-August/006887.html
Post by Mike Easter
[ANNOUNCE] WireGuardNT, a high-performance WireGuard implementation
for the Windows kernel
In the beginning, wg was linux. Now it is 'every' practical platform.
--
Mike Easter
Mike Easter
2024-11-16 20:34:16 UTC
Permalink
In the beginning, wg was linux.  Now it is 'every' practical platform.
There's a lot of interesting stuff at the wireguard site, but not really
'practical' in terms of 'just' implementing wg for a particular VPN.
--
Mike Easter
Edmund
2024-11-16 21:52:07 UTC
Permalink
Post by Mike Easter
In the beginning, wg was linux.  Now it is 'every' practical platform.
There's a lot of interesting stuff at the wireguard site, but not really
'practical' in terms of 'just' implementing wg for a particular VPN.
You don't know what you talking about, wireguard IS a VPN.
I know you don't read or understand anything I write but I got it
working as I told you before, it works fine, capice?
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
Mike Easter
2024-11-17 03:20:48 UTC
Permalink
Post by Edmund
You don't know what you talking about, wireguard IS a VPN.
wg is a protocol for VPN; it is not a VPN provider or service. A
provider can provide wg or not, openvpn or not, and so forth.
Post by Edmund
I know you don't read or understand anything I write but I got it
working as I told you before, it works fine, capice?
You may be using wg for some VPN service, but the service is NOT being
provided by anything at wireguard.com. That site is responsible for the
dev of wg, but they are not the 'people' who provide the VPN service
that you use for VPN. They are the people who dev the open source
software which is used to perform the wg protocol for a VPN provider.

This is a good example of what wg the 'project' does:

https://www.wireguard.com/repositories/
Post by Edmund
Source Code Repositories and Official Projects
WireGuard is divided into several sub-projects and repositories. The
following is a list of official and supported WireGuard projects,
along with their status and maintainer. Most repositories are hosted
on git.zx2c4.com using free software, though some are hosted on
GitHub, at the preference of the maintainer.
--
Mike Easter
Mike Easter
2024-11-16 20:33:57 UTC
Permalink
Post by Mike Easter
If you are trying to use wg for linux for a particular VPN, if you
are lucky and the VPN is very instructive about linux such as
proton's, you would be best to get your info from the VPN site;
My wg dabbling has been w/ free vpn, here's an example of a pay provider
that provides linux support, again fedora & Ub gui, but also config files.

https://mullvad.net/en/download/vpn/linux
Post by Mike Easter
If you cannot use the Mullvad VPN app, you can download
configuration files to use with the official OpenVPN or WireGuard
clients.
Ubuntu
Debian
Fedora
Raspberry Pi OS (formerly Raspbian) (32-bit only)
Linux Mint
Arch
Don’t see your Linux distro? ExpressVPN also offers setup
instructions for Kali, Zorin OS, Pop!_OS, and other OSes.
--
Mike Easter
Killadebug
2024-11-17 15:03:45 UTC
Permalink
Post by Mike Easter
Post by Mike Easter
If you are trying to use wg for linux for a particular VPN, if you are
lucky and the VPN is very instructive about linux such as proton's, you
would be best to get your info from the VPN site;
My wg dabbling has been w/ free vpn, here's an example of a pay provider
that provides linux support, again fedora & Ub gui, but also config files.
https://mullvad.net/en/download/vpn/linux
I use Mullvad....thier Linux app is one of the best.....it looks just like
yhe IOS app yet has more functions available than the IOS app....
Post by Mike Easter
Post by Mike Easter
If you cannot use the Mullvad VPN app, you can download configuration
files to use with the official OpenVPN or WireGuard clients.
Ubuntu
Debian
Fedora
Raspberry Pi OS (formerly Raspbian) (32-bit only)
Linux Mint
Arch
Don’t see your Linux distro? ExpressVPN also offers setup instructions
for Kali, Zorin OS, Pop!_OS, and other OSes.
--
Pull my finger
Edmund
2024-11-17 17:29:57 UTC
Permalink
Post by Killadebug
Post by Mike Easter
Post by Mike Easter
If you are trying to use wg for linux for a particular VPN, if you are
lucky and the VPN is very instructive about linux such as proton's, you
would be best to get your info from the VPN site;
My wg dabbling has been w/ free vpn, here's an example of a pay provider
that provides linux support, again fedora & Ub gui, but also config files.
https://mullvad.net/en/download/vpn/linux
I use Mullvad....thier Linux app is one of the best.....it looks just like
yhe IOS app yet has more functions available than the IOS app....
Companies lure their victims with fancy webpages and convenient options
promises promises ....
And then you might find out you've been had.

https://www.reddit.com/r/mullvadvpn/comments/10v4e4n/mullvad_accused_of_logging_data_according_to/?rdt=38070

There is another VPN provider with no log policy!! hacked and their
log's where stolen :-)
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
Mike Easter
2024-11-17 18:04:35 UTC
Permalink
Post by Edmund
Companies lure their victims with fancy webpages and convenient options
promises promises ....
I am of the opinion that vpn is 'overhyped' and most people don't need
vpn. OTOH it is a useful tech for some purposes, which I consider
mostly 'uncommon'.

I live in the .us; some people may assume being 'spied on' by their own
country or ISP; I don't know what that feels like.

If I were up to something nefarious and liable to attract the attention
of law enforcement, I would need to hide myself much better than VPN.
--
Mike Easter
Dan Purgert
2024-11-19 12:22:51 UTC
Permalink
Post by Edmund
Post by Killadebug
Post by Mike Easter
Post by Mike Easter
If you are trying to use wg for linux for a particular VPN, if you are
lucky and the VPN is very instructive about linux such as proton's, you
would be best to get your info from the VPN site;
My wg dabbling has been w/ free vpn, here's an example of a pay provider
that provides linux support, again fedora & Ub gui, but also config files.
https://mullvad.net/en/download/vpn/linux
I use Mullvad....thier Linux app is one of the best.....it looks just like
yhe IOS app yet has more functions available than the IOS app....
Companies lure their victims with fancy webpages and convenient options
promises promises ....
And then you might find out you've been had.
https://www.reddit.com/r/mullvadvpn/comments/10v4e4n/mullvad_accused_of_logging_data_according_to/?rdt=38070
There is another VPN provider with no log policy!! hacked and their
log's where stolen :-)
Huh, that question links to a 'vpntester.org' article that basically
goes "we determined they log" at one point, then in the FAQs goes "we
don't assume they do". At best, that site seems to be just your generic
ad farm...

There's no "hack" or "stolen logs" assertion anywhere between the reddit
thread or the other site ... so how'd you make that determination?
--
|_|O|_|
|_|_|O| Github: https://github.com/dpurgert
|O|O|O| PGP: DDAB 23FB 19FA 7D85 1CC1 E067 6D65 70E5 4CE7 2860
Mike Easter
2024-11-19 15:12:01 UTC
Permalink
Post by Dan Purgert
Huh, that question links to a 'vpntester.org' article that basically
goes "we determined they log" at one point, then in the FAQs goes
"we don't assume they do". At best, that site seems to be just your
generic ad farm...
There's no "hack" or "stolen logs" assertion anywhere between the
reddit thread or the other site ... so how'd you make that
determination?
I always liked the way COTSE openly and transparently addressed the
bogus 'no logs' issue:

https://www.cotse.net/logging.html
Post by Dan Purgert
I guess those that claim no logs really mean "No logs...except for
these...oh and these...oh and those too...but they don't really
count, what's important is that we don't log your datastream". We
really do understand that they are using this term "no logs" to mean
only the data stream. They don't log the data stream and probably not
your ip when using the proxy (it's theirs or 127.0.0.1).
We don't log the datastream either and your IP in our SSH tunnels
accessing the proxies is 127.0.0.1 and comes out as ours (these are
standard setups and nobody is doing something special that others
can't), but there are many other things that log on a system and to
just ignore them all and say "No logs" is lying.
--
Mike Easter
Dan Purgert
2024-11-20 13:19:01 UTC
Permalink
Post by Mike Easter
Post by Dan Purgert
Huh, that question links to a 'vpntester.org' article that basically
goes "we determined they log" at one point, then in the FAQs goes
"we don't assume they do". At best, that site seems to be just your
generic ad farm...
There's no "hack" or "stolen logs" assertion anywhere between the
reddit thread or the other site ... so how'd you make that
determination?
I always liked the way COTSE openly and transparently addressed the
https://www.cotse.net/logging.html
Yeah, that's a quite clear representation of policy. More companies
being explicitly clear like that would be nice, but we have what we
have.

I was more making the point that, by these two statements, the "vpn
review" website that the prompted the reddit question discredited itself
entirely.


1. we've proved they log (more than the bare minimum that any service
would log) AND
2. we're not going to assume they log (more than the bare minimum
any service provider would log).
--
|_|O|_|
|_|_|O| Github: https://github.com/dpurgert
|O|O|O| PGP: DDAB 23FB 19FA 7D85 1CC1 E067 6D65 70E5 4CE7 2860
Mike Easter
2024-11-16 17:32:58 UTC
Permalink
Post by Edmund
You don't have the faintest idea what is going on here, you don't even
read what I said or asked, you don't even understand the problem at all.
The reason I don't 'follow' you in trying to address your 'problem' is
that you are frequently 'misguided'. The path you are/were on isn't
really helpful to try to steer you.

You probably should've started w/ what VPN you are trying to use w/ wg,
not talking about the wireguard.com site.

I'm slightly curious to visit the site, but not for purposes of
addressing anything in this thread.
--
Mike Easter
Mike Easter
2024-11-16 17:41:36 UTC
Permalink
Post by Mike Easter
I'm slightly curious to visit the site, but not for purposes of
addressing anything in this thread.
There's a serious '20 Jun academic paper on wireguard here, but not for
my digestion

https://www.wireguard.com/papers/wireguard.pdf
--
Mike Easter
Edmund
2024-11-16 16:59:52 UTC
Permalink
Post by Mike Easter
I do not have the faintest idea how that solve the problem.
Apparently your problem is that you are trying to use wireguard on a
particular VPN who doesn't provide much for linux.
I thought I was pretty clear in describing the problem, which has
absolutely nothing to do with the VPN server but 100% with the lack of
info/manual on the wireguard CLIENT side.
Post by Mike Easter
My information about 3 other providers, proton, windscribe, & riseup
using the protocols wireguard and openvpn was to illustrate to you a
range of linux GUI facilitation by those providers.
again I don't need providers I need the client configuration.
Post by Mike Easter
Your faint idea is to whine about the inclination for some linux
services to be accessed by configuration files and command line while
Win is generally more thoroughly served graphically.
I try to stay polite but you are pressing it.
Go to wireguard.com read it, and tell me how I configure linux, for fun,
compare that with MAC Android or windows.
Then explain why they do it that stupid.

Your remark about yet again another Linux flavor that includes a totally
different VPN, is absurd, why don't we develop yet again another linux
flavor that includes a text-editor and yet again another linux flavor
that includes a calculator.....
Tjeezzzzz.

OH FYI, in the mean time I've got it solved, its working fine.
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
Brian Gregory
2024-11-20 23:05:48 UTC
Permalink
Post by Edmund
Post by Mike Easter
I do not have the faintest idea how that solve the problem.
Apparently your problem is that you are trying to use wireguard on a
particular VPN who doesn't provide much for linux.
I thought I was pretty clear in describing the problem, which has
absolutely nothing to do with the VPN server but 100% with the lack of
info/manual on the wireguard CLIENT side.
Post by Mike Easter
My information about 3 other providers, proton, windscribe, & riseup
using the protocols wireguard and openvpn was to illustrate to you a
range of linux GUI facilitation by those providers.
again I don't need providers I need the client configuration.
Post by Mike Easter
Your faint idea is to whine about the inclination for some linux
services to be accessed by configuration files and command line while
Win is generally more thoroughly served graphically.
I try to stay polite but you are pressing it.
Go to wireguard.com read it, and tell me how I configure linux, for fun,
compare that with MAC Android or windows.
Then explain why they do it that stupid.
Your remark about yet again another Linux flavor that includes a totally
different VPN, is absurd, why don't we develop yet again another linux
flavor that includes a text-editor and yet again another linux flavor
that includes a calculator.....
Tjeezzzzz.
OH FYI, in the mean time I've got it solved, its working fine.
Out of interest did you install a client? Which one?

On Linux installing wireguard usually just installer the drivers in the
OS and you still need to separately choose and install a client.
--
Brian Gregory (in England).
Edmund
2024-11-20 23:23:53 UTC
Permalink
Post by Brian Gregory
Post by Edmund
Post by Mike Easter
I do not have the faintest idea how that solve the problem.
Apparently your problem is that you are trying to use wireguard on a
particular VPN who doesn't provide much for linux.
I thought I was pretty clear in describing the problem, which has
absolutely nothing to do with the VPN server but 100% with the lack of
info/manual on the wireguard CLIENT side.
Post by Mike Easter
My information about 3 other providers, proton, windscribe, & riseup
using the protocols wireguard and openvpn was to illustrate to you a
range of linux GUI facilitation by those providers.
again I don't need providers I need the client configuration.
Post by Mike Easter
Your faint idea is to whine about the inclination for some linux
services to be accessed by configuration files and command line while
Win is generally more thoroughly served graphically.
I try to stay polite but you are pressing it.
Go to wireguard.com read it, and tell me how I configure linux, for
fun, compare that with MAC Android or windows.
Then explain why they do it that stupid.
Your remark about yet again another Linux flavor that includes a
totally different VPN, is absurd, why don't we develop yet again
another linux flavor that includes a text-editor and yet again another
linux flavor that includes a calculator.....
Tjeezzzzz.
OH FYI, in the mean time I've got it solved, its working fine.
Out of interest did you install a client? Which one?
On Linux installing wireguard usually just installer the drivers in the
OS and you still need to separately choose and install a client.
Made a wg file with the wg0.conf from the server and made a launcher
with wg-quick down wg0 and up.

After I have done that I saw on my laptop there is a option for a
Wireguard VPN and importing a config file :-)

So after all maybe I didn't need to do what I did and could have used
the build-in VPN option.
--
-------------

Godspeed for Assange
Amnesty for Snowden
Rehabilitation for heroes

Edmund
Mike Easter
2024-11-20 23:46:45 UTC
Permalink
Post by Edmund
Made a wg file with the wg0.conf from the server and made a launcher
with wg-quick down wg0 and up.
Good.
Post by Edmund
After I have done that I saw on my laptop there is a option for a
Wireguard VPN and importing a config file :-)
My recollection is that in the 'default' LM 22, until you start 'doing
something' related to wg, there isn't anything in the NM about wg. I'm
not sure exactly how it gets put there, depending on what 'style' VPN wg
you have employed.

Hmmm. I just booted a 'clean' LM 22 live and the NM does have wg in the
'connection type' option in the section for Virtual; whereas/but not in
the VPN section where there is only OpenVPN.
Post by Edmund
So after all maybe I didn't need to do what I did and could have used
the build-in VPN option.
If I were going to use a particular VPN, I would go to the VPN's site
and see what they offer and instruct about how they accommodate linux.
For some, it is all just instructional related to installing such as wg,
for some others, they help w/ a wg conf file, for others they make
available a GUI for linux if you have a distro and desktop they've
prepared for.

In the example of proton, altho' they *say* their GUI is for Ub (and 1
for Fed) Gnome, the UbGnome works fine for a Deb such as Sparky and MATE.
--
Mike Easter
Mike Easter
2024-11-15 17:39:55 UTC
Permalink
Post by Edmund
Looks great, anyone know what to do with it?
I've used wireguard as a protocol for a VPN.

It is not actually necessary to 'install' wg/wireguard to use the wg
protocol.

I have used wg protocol w/ both windscribe vpn and proton vpn w/o
installing wg by installing the GUI apps provided by proton &/or windscribe.

The proton site says that their gui app is designed for Ub Gnome or
Fedora Gnome DE but I've installed and used it successfully w/ both LM
22 Cinnamon and a Sparky MATE.

After the installation of (today) both windscribe and proton's VPN apps,
my network manager shows an 'additional' item in its interface named
Wireguard. My synaptic does not show wireguard or wireguard tools to be
installed and if I command:

wg --version

... the shell says command wg not found, but advises that installing
wireguard-tools will enable it.

I virtually /never/ use a VPN for anything; I just sometimes mess w/ it
to explore.
--
Mike Easter
Mike Easter
2024-11-15 18:07:47 UTC
Permalink
Post by Mike Easter
... the shell says command wg not found, but advises that installing
wireguard-tools will enable it.
Proton again.

The proton site also has instructions for using the wg protocol
'manually' using their VPN service by installing wg, then dl from proton
a configuration file (by having reg'd w/ proton) to put that into the wg
dir. and then the commands to use to connect to the particular proton
vpn using the wg protocol.

I'm not a big fan of all that typing. I prefer pasting into the
commandline :-)

I'm not crystal-clear on what are the similarities and differences
between wireguard per se and wireguard-tools. When I install
wireguard-tools, and command wg --version, it gives the v. of wg-tools
and then when I command wg -help it tells me about available
sub-commands. It seems to me that wg-tools is 'the equivalent' of wg
per se.
--
Mike Easter
Mike Easter
2024-11-15 18:29:20 UTC
Permalink
It seems to me that wg-tools is 'the equivalent' of wg per se.
The 'package' wg sez depends wg-tools; 'but' having installed wg-tools
does not show wg as being installed as a 'package' in such as synaptic.

And, to add further to the/my confusion, the proton instructions for the
manual use of wg w/ proton has a series of instructions for the
different distro/s, some of which it advises to install by installing wg
and some others by installing wg-tools.

Basically this seems to be a package-nomenclature 'issue' which could be
improved by somebody. wp doesn't talk about wg-tools, just wg.
Package: wireguard-tools
fast, modern, secure kernel VPN tunnel (userland utilities)
WireGuard is a novel VPN that runs inside the Linux Kernel and uses
state-of-the-art cryptography (the "Noise" protocol). It aims to be
faster, simpler, leaner, and more useful than IPSec, while avoiding
the massive headache. It intends to be considerably more performant
than OpenVPN. WireGuard is designed as a general purpose VPN for
running on embedded interfaces and super computers alike, fit for
many different circumstances. It runs over UDP.
This package contains command-line tools to interact with the
wg: set and retrieve configuration of WireGuard interfaces
The /actual/ 'works' are a kernel module which comm w/ you exercise w/
the wg command which is provided by wg-tools.
--
Mike Easter
Dan C
2024-11-15 18:40:08 UTC
Permalink
Post by Edmund
Godspeed for Assange
Fuck Assange.
Post by Edmund
Amnesty for Snowden
Fuck Snowden.
Post by Edmund
Rehabilitation for heroes
Heroes don't need rehabilitation. Libtards and Euro-commies do.
Fuck off.
--
"Ubuntu" -- an African word, meaning "Slackware is too hard for me".
"Bother!" said Pooh, as he wiped the vomit from his chin.
Usenet Improvement Project: http://twovoyagers.com/improve-usenet.org/
Thanks, Obama: Loading Image...
j***@invalid.invalid
2024-11-15 19:21:09 UTC
Permalink
Post by Edmund
Post by Edmund
Looks great, anyone know what to do with it?
<snip>
Post by Edmund
For fun, look at the wireguard website, choose anything but linux.
Install it by ONE click, open it by clicking the wireguard icon,
paste the KEYS generated by your VPN server click connect and you are done!
Now go to linux and get fucked, not even a manual. ( for humans )
Here's a GUI but you'll still need to spend some time in the CLI to
get it set up:

https://rawtext.club/~woog/protonvpn/

The offical ProtonVPN Linux client now supports Wireguard but still
appears to require a Gnome Keyring which lighter distros might not have
installed so something like this is a kind of bridge between striaght
CLI and a full-fledged GUI.

Also IIRC Debian + Gnome now have Wireguard support built into Network
Manager. For a service like ProtonVPN you'll likely still have to manually
download and place the Wireguard peer configuration files, but once there
it should be pretty easy to use.

-J
Mike Easter
2024-11-15 19:37:58 UTC
Permalink
Post by j***@invalid.invalid
The offical ProtonVPN Linux client now supports Wireguard but still
appears to require a Gnome Keyring which lighter distros might not have
installed so something like this is a kind of bridge between striaght
CLI and a full-fledged GUI.
That keyring business is optional. The proton vpn can call for the
keyring to provide the user/pass, but it isn't 'necessary' to use it.
You can give the app the user/pass 'manually'.

Just like some browsers want to employ the keyring 'for you', but you
don't have to.
Post by j***@invalid.invalid
Also IIRC Debian + Gnome now have Wireguard support built into Network
Manager. For a service like ProtonVPN you'll likely still have to manually
download and place the Wireguard peer configuration files, but once there
it should be pretty easy to use.
Correct.

Proton handles the wg 'credentialling' like it does the openvpn
credentialling for its servers, it facilitates the creation of a conf
file by providing its website interface to make the file/s for either.
That is, the website can graphically help you create any number of
openvpn or wg conf files for its numerous vpn servers in numerous countries.
--
Mike Easter
Mike Easter
2024-11-15 19:52:49 UTC
Permalink
Post by Mike Easter
Proton handles the wg 'credentialling' like it does the openvpn
credentialling for its servers, it facilitates the creation of a conf
file by providing its website interface to make the file/s for either.
That is, the website can graphically help you create any number of
openvpn or wg conf files for its numerous vpn servers in numerous countries.
Windscribe's graphical linux tool is a little 'slicker' than proton's,
but it has some 'vpn' disadvantages compared to proton, if you are
considering both 'free'/pay and 'eyes'.

Windscribe is .ca, plenty of eyes, whereas proton is .ch, not as many
eyes but Swiss rules. Windscribes free usage is limited in gigs;
proton's VPN plus provides more features and countries than its free
plan which isn't limited in gigs.
--
Mike Easter
Brian Gregory
2024-11-17 23:12:16 UTC
Permalink
Post by Edmund
wireguard?
One for the experts.
Installed wireguard via the repository.
Now it nowhere to be found on my computer
the only thing that show something is "locate wireguard"
============
usr/lib/modules/5.15.0-124-generic/kernel/drivers/net/wireguard/
wireguard.ko
/usr/lib/modules/5.15.0-125-generic/kernel/drivers/net/wireguard
/usr/lib/modules/5.15.0-125-generic/kernel/drivers/net/wireguard/
wireguard.ko
/usr/lib/modules/5.15.0-56-generic/kernel/drivers/net/wireguard
/usr/lib/modules/5.15.0-56-generic/kernel/drivers/net/wireguard/
wireguard.ko
/usr/share/doc/wireguard
/usr/share/doc/wireguard-tools
/usr/share/doc/netplan/examples/wireguard.yaml
/usr/share/doc/wireguard/NEWS.Debian.gz
/usr/share/doc/wireguard/TODO.Debian
/usr/share/doc/wireguard/changelog.Debian.gz
/usr/share/doc/wireguard/copyright
/usr/share/doc/wireguard-tools/NEWS.Debian.gz
/usr/share/doc/wireguard-tools/README.Debian
/usr/share/doc/wireguard-tools/changelog.Debian.gz
/usr/share/doc/wireguard-tools/copyright
/usr/share/doc/wireguard-tools/examples
/usr/share/doc/wireguard-tools/examples/dns-hatchet
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library
/usr/share/doc/wireguard-tools/examples/extract-handshakes
/usr/share/doc/wireguard-tools/examples/extract-keys
/usr/share/doc/wireguard-tools/examples/highlighter
/usr/share/doc/wireguard-tools/examples/json
/usr/share/doc/wireguard-tools/examples/keygen-html
/usr/share/doc/wireguard-tools/examples/launchd
/usr/share/doc/wireguard-tools/examples/nat-hole-punching
/usr/share/doc/wireguard-tools/examples/ncat-client-server
/usr/share/doc/wireguard-tools/examples/reresolve-dns
/usr/share/doc/wireguard-tools/examples/sticky-sockets
/usr/share/doc/wireguard-tools/examples/synergy
/usr/share/doc/wireguard-tools/examples/dns-hatchet/README
/usr/share/doc/wireguard-tools/examples/dns-hatchet/apply.sh
/usr/share/doc/wireguard-tools/examples/dns-hatchet/hatchet.bash
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library/Makefile
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library/README
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library/test.c
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library/wireguard.c
/usr/share/doc/wireguard-tools/examples/embeddable-wg-library/wireguard.h
/usr/share/doc/wireguard-tools/examples/extract-handshakes/Makefile
/usr/share/doc/wireguard-tools/examples/extract-handshakes/README
/usr/share/doc/wireguard-tools/examples/extract-handshakes/extract-
handshakes.sh
/usr/share/doc/wireguard-tools/examples/extract-handshakes/offset-finder.c
/usr/share/doc/wireguard-tools/examples/extract-keys/Makefile
/usr/share/doc/wireguard-tools/examples/extract-keys/README
/usr/share/doc/wireguard-tools/examples/extract-keys/config.c
/usr/share/doc/wireguard-tools/examples/extract-keys/extract-keys.c
/usr/share/doc/wireguard-tools/examples/highlighter/Makefile
/usr/share/doc/wireguard-tools/examples/highlighter/README
/usr/share/doc/wireguard-tools/examples/highlighter/fuzz.c
/usr/share/doc/wireguard-tools/examples/highlighter/gui
/usr/share/doc/wireguard-tools/examples/highlighter/highlight.c
/usr/share/doc/wireguard-tools/examples/highlighter/highlighter.c
/usr/share/doc/wireguard-tools/examples/highlighter/highlighter.h
/usr/share/doc/wireguard-tools/examples/highlighter/gui/highlight.cpp
/usr/share/doc/wireguard-tools/examples/highlighter/gui/highlight.pro
/usr/share/doc/wireguard-tools/examples/json/README
/usr/share/doc/wireguard-tools/examples/json/wg-json
/usr/share/doc/wireguard-tools/examples/keygen-html/README
/usr/share/doc/wireguard-tools/examples/keygen-html/keygen.html
/usr/share/doc/wireguard-tools/examples/keygen-html/wireguard.js
/usr/share/doc/wireguard-tools/examples/launchd/README
/usr/share/doc/wireguard-tools/examples/launchd/com.wireguard.wg0.plist
/usr/share/doc/wireguard-tools/examples/nat-hole-punching/README
/usr/share/doc/wireguard-tools/examples/nat-hole-punching/nat-punch-
client.c
/usr/share/doc/wireguard-tools/examples/nat-hole-punching/nat-punch-
server.c
/usr/share/doc/wireguard-tools/examples/ncat-client-server/README
/usr/share/doc/wireguard-tools/examples/ncat-client-server/client-quick.sh
/usr/share/doc/wireguard-tools/examples/ncat-client-server/client.sh
/usr/share/doc/wireguard-tools/examples/ncat-client-server/server.sh
/usr/share/doc/wireguard-tools/examples/reresolve-dns/README
/usr/share/doc/wireguard-tools/examples/reresolve-dns/reresolve-dns.sh
/usr/share/doc/wireguard-tools/examples/sticky-sockets/README
/usr/share/doc/wireguard-tools/examples/sticky-sockets/sticky-sockets.c
/usr/share/doc/wireguard-tools/examples/synergy/README
/usr/share/doc/wireguard-tools/examples/synergy/synergy-client.sh
/usr/share/doc/wireguard-tools/examples/synergy/synergy-server.sh
/usr/share/lintian/overrides/wireguard-tools
/usr/src/linux-headers-5.15.0-124/drivers/net/wireguard
/usr/src/linux-headers-5.15.0-124/drivers/net/wireguard/Makefile
/usr/src/linux-headers-5.15.0-124/include/uapi/linux/wireguard.h
/usr/src/linux-headers-5.15.0-124/tools/testing/selftests/wireguard
/usr/src/linux-headers-5.15.0-124/tools/testing/selftests/wireguard/
netns.sh
/usr/src/linux-headers-5.15.0-124/tools/testing/selftests/wireguard/qemu
/usr/src/linux-headers-5.15.0-124/tools/testing/selftests/wireguard/
qemu/Makefile
/usr/src/linux-headers-5.15.0-125/drivers/net/wireguard
/usr/src/linux-headers-5.15.0-125/drivers/net/wireguard/Makefile
/usr/src/linux-headers-5.15.0-125/include/uapi/linux/wireguard.h
/usr/src/linux-headers-5.15.0-125/tools/testing/selftests/wireguard
/usr/src/linux-headers-5.15.0-125/tools/testing/selftests/wireguard/
netns.sh
/usr/src/linux-headers-5.15.0-125/tools/testing/selftests/wireguard/qemu
/usr/src/linux-headers-5.15.0-125/tools/testing/selftests/wireguard/
qemu/Makefile
/usr/src/linux-headers-5.15.0-56/drivers/net/wireguard
/usr/src/linux-headers-5.15.0-56/drivers/net/wireguard/Makefile
/usr/src/linux-headers-5.15.0-56/include/uapi/linux/wireguard.h
/usr/src/linux-headers-5.15.0-56/tools/testing/selftests/wireguard
/usr/src/linux-headers-5.15.0-56/tools/testing/selftests/wireguard/netns.sh
/usr/src/linux-headers-5.15.0-56/tools/testing/selftests/wireguard/qemu
================
Looks great, anyone know what to do with it?
https://www.wireguard.com/quickstart/
--
Brian Gregory (in England).
Loading...